A blockchain-based cloud storage data integrity detection method

A technology of data integrity and detection methods, applied in the field of cloud storage, can solve problems such as lack of trust between cloud service providers and users, and achieve the effects of ensuring transparency and open auditing, ensuring correctness and effectiveness, and reducing computing difficulty

Active Publication Date: 2022-04-08
亿海兰特科技发展(长沙)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to propose a block chain-based cloud storage data integrity detection method and system for the problem of insufficient trust between cloud service providers and users and the disadvantages of the traditional three-party authentication model, using block chain as a trusted third party The three parties replace the traditional third party, effectively solving the trust problem between cloud service providers and users, and avoiding the credibility problem of the traditional third party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based cloud storage data integrity detection method
  • A blockchain-based cloud storage data integrity detection method
  • A blockchain-based cloud storage data integrity detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] The present invention provides a blockchain-based cloud storage data integrity verification method, the process of which is as follows figure 1 As shown, it mainly includes:

[0043] S101: Generate system public parameters and user public and private keys.

[0044] Specifically, first generate public parameters P={q, m, n, σ, I n , M}, these public parameters are not confidential, and are the basic data required for other subsequent calculations.

[0045] Then generate a random matrix As the user's private key, generate the matrix As the user's public key, the matrix A needs to satisfy AS=A(-S)=qI n (mod 2q).

[0046] The private key is kept by the user locally, and the public key can be published to the blockchain together with the public parameters, or can be sent to the cloud server together with the file.

[0047] S102: The user divides the file into file blocks.

[0048] Specifically: the user divides the file into several file blocks with the same size b...

Embodiment 2

[0075] The present invention also provides a blockchain-based cloud storage data integrity verification system, such as Figure 4 As shown, the system mainly includes: users, cloud servers, and blockchain. in,

[0076] The user is the file owner, and the local storage space is limited, so the file is entrusted to be stored on the cloud server. There are many users in the system, so users can also interact with each other, such as downloading files publicized by other users, acting as a proxy for integrity verification requests of other users, etc.

[0077] Cloud servers, with large storage space and strong computing power, provide users with storage and computing services, enabling users to upload and download data anytime and anywhere. Similarly, there can be multiple cloud servers in the system, and when a user uploads a file, the file blocks divided from the same file should be uploaded to one cloud server in a unified manner.

[0078] Blockchain, a communication and sup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based cloud storage data integrity detection method and system. The user terminal mainly uses a lattice signature algorithm to sign files, which can effectively resist the threat of quantum computing and ensure that the signature is not cracked. Then, by building a Merkle tree, the signature value of the file is aggregated into a Merkle tree and combined with the cuckoo filter, on the one hand, it can meet the requirements of dynamic file operation, and on the other hand, the complex signature verification process is simplified to a simple one. The query process of the cuckoo filter significantly improves the verification efficiency. At the same time, the introduction of the blockchain network to replace the traditional TPA can effectively avoid the collusion between the TPA and the other party, improve the transparency of information, and further improve the security of the scheme.

Description

technical field [0001] The invention belongs to the technical field of cloud storage, and in particular relates to a blockchain-based cloud storage data integrity detection method and system. Background technique [0002] With the rapid development of the Internet and the rapid expansion of data resources, the storage and computing capabilities of the local platforms of individual users and enterprises are relatively limited, and the cost of expanding the local platforms is relatively high. Therefore, businesses provide computing capabilities by providing cloud computing platforms to users. And storage capacity has become a mainstream solution. In this model, merchants make profits by providing services, and users also avoid the huge cost of upgrading hardware, achieving mutual benefit and win-win results. However, while data outsourcing brings convenience to users, users also lose hardware control of data, and the issue of data security has become a problem that cannot be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/06G06F21/64G06F16/14
CPCH04L63/123H04L63/0435G06F21/64H04L9/3247H04L9/0863H04L9/0869H04L9/0643G06F21/645G06F16/152H04L67/1097
Inventor 刘玉玲谢高鹏
Owner 亿海兰特科技发展(长沙)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products