Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud storage data integrity detection method and system based on blockchain

A technology of data integrity and detection methods, applied in the field of cloud storage, can solve problems such as insufficient trust between cloud service providers and users, and achieve the effects of ensuring transparency and open auditing, high efficiency, and reducing computing difficulty

Active Publication Date: 2021-03-26
亿海兰特科技发展(长沙)有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to propose a block chain-based cloud storage data integrity detection method and system for the problem of insufficient trust between cloud service providers and users and the disadvantages of the traditional three-party authentication model, using block chain as a trusted third party The three parties replace the traditional third party, effectively solving the trust problem between cloud service providers and users, and avoiding the credibility problem of the traditional third party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud storage data integrity detection method and system based on blockchain
  • Cloud storage data integrity detection method and system based on blockchain
  • Cloud storage data integrity detection method and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The present invention provides a blockchain-based cloud storage data integrity verification method, the process of which is as follows figure 1 As shown, it mainly includes:

[0043] S101: Generate system public parameters and user public and private keys.

[0044] Specifically, first generate public parameters P={q, m, n, σ, I n , M}, these public parameters are not confidential, and are the basic data required for other subsequent calculations.

[0045] Then generate a random matrix As the user's private key, generate the matrix As the user's public key, the matrix A needs to satisfy AS=A(-S)=qI n (mod 2q).

[0046] The private key is kept by the user locally, and the public key can be published to the blockchain together with the public parameters, or can be sent to the cloud server together with the file.

[0047] S102: The user divides the file into file blocks.

[0048] Specifically: the user divides the file into several file blocks with the same size by...

Embodiment 2

[0075] The present invention also provides a blockchain-based cloud storage data integrity verification system, such as Figure 4 As shown, the system mainly includes: users, cloud servers, and blockchain. in,

[0076] The user is the file owner, and the local storage space is limited, so the file is entrusted to be stored on the cloud server. There are many users in the system, so users can also interact with each other, such as downloading files publicized by other users, acting as a proxy for integrity verification requests of other users, etc.

[0077] Cloud servers, with large storage space and strong computing power, provide users with storage and computing services, enabling users to upload and download data anytime and anywhere. Similarly, there can be multiple cloud servers in the system, and when a user uploads a file, the file blocks divided from the same file should be uploaded to one cloud server in a unified manner.

[0078] Blockchain, a communication and sup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud storage data integrity detection method and system based on a blockchain, and the method mainly employs a lattice signature algorithm to sign a file at a user side, caneffectively resist the threat of quantum computing, and guarantees that a signature is not cracked. According to the method, the Merkel tree is constructed, the signature value of the file is aggregated into the Merkel tree and combined with the cuckoo filter, on one hand, the requirement of dynamic operation of the file can be met, on the other hand, a complex signature verification process is simplified into a simple cuckoo filter query process, and the verification efficiency is remarkably improved. And meanwhile, the block chain network is introduced to replace the traditional TPA, so that the situation that the TPA colludes with the other party can be effectively avoided, the transparency of the information is improved, and the security of the scheme is further improved.

Description

technical field [0001] The invention belongs to the technical field of cloud storage, and in particular relates to a blockchain-based cloud storage data integrity detection method and system. Background technique [0002] With the rapid development of the Internet and the rapid expansion of data resources, the storage and computing capabilities of the local platforms of individual users and enterprises are relatively limited, and the cost of expanding the local platforms is relatively high. Therefore, businesses provide computing capabilities by providing cloud computing platforms to users. And storage capacity has become a mainstream solution. In this model, merchants make profits by providing services, and users also avoid the huge cost of upgrading hardware, achieving mutual benefit and win-win results. However, while data outsourcing brings convenience to users, users also lose hardware control of data, and the issue of data security has become a problem that cannot be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/08H04L9/06G06F21/64G06F16/14
CPCH04L63/123H04L63/0435G06F21/64H04L9/3247H04L9/0863H04L9/0869H04L9/0643G06F21/645G06F16/152H04L67/1097
Inventor 刘玉玲谢高鹏
Owner 亿海兰特科技发展(长沙)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products