Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Efficient cloud storage replica proof method, system and application supporting public verification

A technology for public verification and cloud storage, applied in the field of cloud storage security, can solve the problems of cloud storage system inefficiency, high computing overhead, and no support for efficient dynamic updates, and achieve the effect of improving coding efficiency

Active Publication Date: 2021-11-16
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) In the existing copy storage proof scheme PRI-POREP, there is a chosen message attack
[0005] (2) In the existing copy storage proof scheme PRI-POREP, the practicability is poor, and the calculation overhead of storing the copy is huge. For example, if it is assumed that the complete exponentiation operation of a 1024-bit RSA module takes 1 millisecond, then provided in 1MB The RSA decryption operation on the file takes about 8.2 seconds
So it takes the client about 2.18 years to make a copy of a 1MB file, which is very inefficient for a practical cloud storage system
[0006] (3) In the existing copy storage proof scheme PRI-POREP, efficient dynamic updates are not supported, and to update files, all copies need to be downloaded
Therefore, the computational cost is proportional to the file size and the number of copies, and the overhead is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient cloud storage replica proof method, system and application supporting public verification
  • Efficient cloud storage replica proof method, system and application supporting public verification
  • Efficient cloud storage replica proof method, system and application supporting public verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0062] Aiming at the problems existing in the prior art, the present invention provides an efficient cloud storage copy certification method, system and application supporting public verification. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] like figure 1 As shown, the efficient cloud storage copy certification method supporting public verification provided by the present invention includes the following steps:

[0064] S101: GenIAE, a key generation algorithm, generates a corresponding copy encapsulation key;

[0065] S102: rEncap, a copy encapsulation a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud storage security, and discloses an efficient cloud storage copy certification method, system and application supporting public verification, generating a corresponding copy packaging key according to a key generation protocol; generating a corresponding copy according to an IAE packaging algorithm ; According to the IAE decapsulation algorithm, restore the corresponding file. Under the random oracle model, it is proved that the existing encrypted storage scheme (i.e. the PRI-POREP scheme) is not safe for the chosen message attack, and it is proved that the μPRI-POREP of the present invention can initiate a chosen message attack in the random oracle model as a whole The opponent is safe. Compared with the multi-round encoding of the existing scheme (PRI-POREP), the replica encoding algorithm of the present invention can complete the encapsulation in only one round, which greatly improves the encoding efficiency of the replica. Additionally, the invention shows how the system of the invention can be extended to support efficient dynamic updates, ie to support block-level file updates.

Description

technical field [0001] The invention belongs to the technical field of cloud storage security, and in particular relates to an efficient cloud storage copy proof method, system and application supporting public verification. Background technique [0002] Present: Cloud storage services offer individuals and businesses a cost-effective, high service availability, and on-demand scaling alternative to outsourcing data without costly upfront investments. However, the potential for dishonest storage service providers, internal / external attackers, and many other malicious actions makes outsourcing files a serious security risk. Among them, secure proof of storage is a key aspect. Over the past decade, various proof-of-storage solutions have been devised to meet customers' need to verify outsourced data integrity / retrievability, such as Provable Data Possession (PDP) [Ateniese, et al.: Provable datapossession at untrusted stores, CCS 2007.] and Proofs of Retrievability (POR) [Sha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L9/0861H04L63/1441H04L63/20H04L67/1097
Inventor 姜涛徐航成琼孔藤
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products