Multi-backup secure deletion method and system based on blockchain
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A security deletion, blockchain technology, applied in the field of information security, can solve the problem of not being able to guarantee that the data in the cloud will not be cracked
Inactive Publication Date: 2021-03-19
CHONGQING UNIV OF POSTS & TELECOMM
View PDF2 Cites 9 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, these solutions are based on the current encryption technology to ensure that the data outsourced to the cloud server cannot be recovered, but the ciphertext is still in the cloud. With the rapid development of various technologies, there is no guarantee that the data in the cloud will not be cracked in the future.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0047] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.
[0048] The technical scheme that the present invention solves the problems of the technologies described above is:
[0049] Attached below figure 1 Describe the framework of the system.
[0050](1) Data owner: After generating the file number and master key, encrypt and upload the file that needs to be uploaded to the cloud server to the cloud server, and extract the file keyword and calculate it as a file index and upload it to the smart contract; in the deletion stage, the data owner A deletion request can be sent to the cloud server, and the cloud server can receive deletion feedback after deletion; in the verification phase, the data owner can verify deletion according to the deletion feedback sent b...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a multi-backup secure deletion method and system based on a blockchain, and the method comprises the following steps: setting a backup number and a corresponding backup addressthrough a cloud server after the initialization of the system and the generation of a secret key, transmitting the backup number and the corresponding backup address to a data owner, and generating apre-deletion sequence; encrypting a file by using different keys to generate a plurality of ciphertext backups, and generating an index according to keywords in the file; generating, by the data owner, preparatory integrity and delete evidences; in a ciphertext query stage, calculating, by a user, a trap door and uploading the trap door to a smart contract, and calculating, by the smart contract,a corresponding decryption key and querying a file number; sending, by the cloud server, a ciphertext backup to the user according to the file number, and decrypting, by the user, the ciphertext by using a decryption key; in a deleting stage, sending a deleting request to a cloud server, and deleting, by the cloud server, all backups of the corresponding file according to the request, generatingdeleting evidences, sending the evidences to the data owner and storing the evidences into the blockchain; and verifying, by the data owner, whether the cloud server deletes the evidences according tothe received evidences, and tracking the corresponding responsibility of the cloud server and the user according to the evidences of the evidence chain. According to the method, the requirements of cloud data sharing and safe deletion can be well met, and searchable encryption is provided for valid users.
Description
technical field [0001] The invention belongs to the technical field of information security, and relates to a searchable and encrypted multi-backup safe deletion method of a block chain, which can provide searchable encryption of cloud server ciphertext data, multi-backup verifiable safe deletion and traceable responsibility. Background technique [0002] As a new service model, cloud computing makes data storage and data sharing more convenient and economical. Users can access a shared pool of configurable computing and storage resources anytime, anywhere. Due to its low management overhead and instant access, more and more people are willing to store data in the cloud and enjoy the convenience brought by cloud services. However, there are still many new problems and challenges in the cloud environment, especially in terms of security and availability. [0003] First of all, due to natural disasters and uncertain failures of cloud storage devices, data owners back up data...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.