Data file encryption and integrity verification method and system for untrusted server environment

A technology for integrity verification and data files, which is applied in digital transmission systems, transmission systems, digital data protection, etc., can solve the problems of ciphertext file integrity verification without mentioning, and achieve high confidentiality and semantic security. Effect

Active Publication Date: 2021-03-12
ANHUI UNIVERSITY OF TECHNOLOGY +2
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In recent years, a protection method that combines PDP integrity protocol and homomorphic encryption technology to protect the integrity and confidentiality of data files on the server has emerged, but the integrity verification of ciphertext files based on the BGN homomorphic encryption algorithm has not been mentioned yet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data file encryption and integrity verification method and system for untrusted server environment
  • Data file encryption and integrity verification method and system for untrusted server environment
  • Data file encryption and integrity verification method and system for untrusted server environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions of the embodiments of the present invention in conjunction with the drawings of the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the described embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention. Unless otherwise defined, the technical terms or scientific terms used herein shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0046] "First", "second" and similar words used in the patent application specification and claims of the present invention do not indicate any order, quantity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data file encryption and integrity verification method and system for an untrusted server environment, and relates to the technical field of data privacy protection, and the method comprises the steps: 1) initializing a system; 2) generating public and private keys of a BGN homomorphic encryption algorithm; 3) constructing public and private keys of the data signature; 4)encrypting the data file by adopting a BGN homomorphic encryption algorithm public key; 5) respectively constructing labels for all file blocks in the data file according to the private key of the data signature; 6) uploading the set of encrypted files and labels to a cloud server; 7) sending a file integrity challenge to the cloud server to return a label and a file block sum; 8) verifying the label sum by using the file block sum and the public key of the data signature so as to judge the integrity of the ciphertext file stored in the cloud server. According to the method, a BGN homomorphicencryption algorithm and a PDP data holding proof protocol are combined, data signatures are constructed to achieve integrity check of the encrypted files, and privacy protection and availability of the data files in an untrusted server environment are improved.

Description

technical field [0001] The invention relates to the technical field of data privacy protection, in particular to a method and system for data file encryption and integrity verification in an untrustworthy server environment. Background technique [0002] With the advent of the big data era, cloud computing has been widely used, and then cloud storage is derived. This important storage mode can provide enterprises and individuals with a large-capacity storage platform, and has the characteristics of easy management, high scalability, and low cost. With the emergence of the cloud storage model, storage users no longer need to purchase expensive equipment, and only need to pay a small fee to store their data on the cloud server, which is more convenient and faster. Data outsourcing actually means that the user gives up the ultimate control over the data, and the security and integrity of the data become the main influencing factors for the user to choose cloud storage. For ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06H04L29/08G06F21/60G06F21/64
CPCH04L9/008H04L9/0825H04L9/0861H04L9/0869H04L63/0442H04L63/123H04L67/06H04L67/1097G06F21/602G06F21/64
Inventor 郑啸曹银梁越永童琨汤伟王磊周亦工陈启航张婷婷
Owner ANHUI UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products