Anti-leakage forward security cloud data integrity remote verification method and system

A forward security and integrity technology, applied in the field of cloud data verification

Inactive Publication Date: 2020-11-13
SHANDONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the existing integrity verification protocol, our method solves the security of the cloud data integrity verification protocol in the case of key leakage, and can provide stronger security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leakage forward security cloud data integrity remote verification method and system
  • Anti-leakage forward security cloud data integrity remote verification method and system
  • Anti-leakage forward security cloud data integrity remote verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides an anti-leak forward secure cloud data integrity remote verification method;

[0032] Anti-leak forward security cloud data integrity remote verification method, including:

[0033] S101: key generation step: the data owner uses security parameters to generate its own public-private key pair;

[0034] S102: Data authentication generation step: the data owner uses his private key to generate authentication information of the outsourced data, and uploads the outsourced data and the authentication information to the cloud storage server;

[0035] S103: Outsourced data verification step: the data owner generates challenge information Chal, and sends the challenge information Chal to the cloud storage server; the cloud storage server uses the data owner's public key, challenge information Chal, outsourced data file F and authentication information set Generate verification certificate information and return the verification certificate information t...

Embodiment 2

[0144] This embodiment provides an anti-leak forward secure cloud data integrity remote verification system;

[0145] Such as Figure 4 As shown, the anti-leak forward secure cloud data integrity remote verification system includes: data owner and cloud storage server;

[0146] The data owner uses the security parameters to generate its own public-private key pair; the data owner uses its own private key to generate the authentication information of the outsourced data, and uploads the outsourced data and authentication information to the cloud storage server; the data owner generates the challenge information Chal, And send the challenge information Chal to the cloud storage server;

[0147] The cloud storage server uses the public key of the data owner, the challenge information Chal, the outsourced data file F and the authentication information set to generate verification proof information, and returns the verification proof information to the data owner;

[0148]The dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-leakage forward security cloud data integrity remote verification method and system. A data owner generates a public and private key pair of the data owner by using security parameters; the data owner generates authentication information of the outsourcing data by using a private key of the data owner, and uploads the outsourcing data and the authentication information to a cloud storage server; the data owner generates challenge information and sends the challenge information to the cloud storage server; the cloud storage server generates verification certification information by utilizing the public key of the data owner, the challenge information, the outsourcing data file and the authentication information set, and returns the verification certificationinformation to the data owner; the data owner verifies the integrity of the outsourcing data file by using the own public key, challenge information and verification certification information to obtain a verification result. The data owner obtains the current time period and updates the current time period to the next time period; the data owner acquires the key representing the node in the current time period, updates the key into a random new key and covers the original key.

Description

technical field [0001] The present application relates to the technical field of cloud data verification, and in particular to an anti-leak forward secure cloud data integrity remote verification method and system. Background technique [0002] The statements in this section merely mention the background art related to this application, and do not necessarily constitute the prior art. [0003] Cloud storage allows data owners to store data remotely on a cloud server, and at the same time obtain the data conveniently and efficiently from the cloud server. However, this new data hosting service faces an important security challenge, namely data integrity. Once the user's data is stored on the cloud server, the data owner loses control over the stored data. If the service provider is untrustworthy or semi-trustworthy, the cloud server may conceal data loss accidents from the data owner, or discard data that has not been accessed for a long time or is rarely accessed. Therefo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3247H04L63/0442H04L63/083H04L63/123H04L67/10H04L67/1097
Inventor 胡程瑜郭山清鞠雷
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products