Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Integrity dynamic auditing method based on improved multi-branch tree in cloud environment

A multi-branch, cloud environment technology, applied in computing, digital data protection, instruments, etc., can solve the problem of data block query taking a long time, increasing the cost of users and third-party auditors, and excessive auxiliary information, etc. Shorten the length of the authentication path, improve the node utilization, and improve the effect of dynamic update

Pending Publication Date: 2021-07-09
BEIJING UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the existing data integrity audit methods have paid attention to these three aspects, most of the data integrity inspection structures based on third-party audits rely on the public key infrastructure. Users need to generate and manage public key certificates, and auditors need to Verify the certificate, which increases the overhead of users and third-party auditors, and affects the efficiency of integrity auditing. Most dynamic auditing schemes use the Merkle hash tree authentication structure. With the increase of data blocks, there is a gap in the authentication process. Therefore, it takes a long time for the cloud service provider to query the data block during the verification and update process, which brings additional computing and communication overhead to the cloud service provider.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity dynamic auditing method based on improved multi-branch tree in cloud environment
  • Integrity dynamic auditing method based on improved multi-branch tree in cloud environment
  • Integrity dynamic auditing method based on improved multi-branch tree in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0037] The specific implementation process of the identity-based data integrity dynamic audit method of the present invention is as follows: figure 2 shown, including the following steps:

[0038] Step 1: The user sends his user identity ID to the key generator PKG.

[0039] Step 2: Private key generation.

[0040] (1) PKG performs system initialization, and generates system public parameter PP and master key msk with a security parameter λ as input.

[0041] (2) PKG generates the corresponding private key for the user according to the identity information provided by the user, takes the public parameter PP, master key msk and user ID as input, outputs the private key skID corresponding to the ID and sends it through a secure channel to the user.

[0042] Step 3: Private key verification.

[0043] The user receives the private key sent by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an integrity dynamic auditing method based on an improved multi-branch tree in a cloud environment, which comprises two parts of an identity-based dynamic integrity auditing method and an improved multi-branch tree construction method, adopts an identity-based integrity auditing architecture, and provides an improved multi-branch tree authentication structure. Data block information is stored on non-leaf nodes of an authentication tree to improve the node utilization rate, an auxiliary root node is selected to describe the integrity of the node and all descendant nodes below the node, the concept of the locality principle is introduced into construction of a multi-branch tree, and the access frequency is added to the node to record the access frequency of the data block. When the cloud service provider carries out data block query on the verification request sent by the TPA, the authentication tree is traversed according to the access frequency, the whole authentication tree does not need to be traversed, searching is only carried out at the corresponding auxiliary root node, and then the length of an authentication path is shortened. And the communication overhead in the verification process is reduced while dynamic auditing is realized.

Description

technical field [0001] The invention belongs to the technical field of cloud computing security, and specifically relates to a dynamic integrity audit method based on an improved multi-branch tree in a cloud environment. The method proposes two technologies, an identity-based dynamic integrity audit method and an improved multi-branch tree construction. It can realize the dynamic update of files by users in the process of cloud integrity audit, and can improve the efficiency of integrity audit in cloud environment and reduce computing and communication overhead. Background technique [0002] With the rapid development of information technology and network technology, user data is growing explosively. The emergence of cloud services solves the limitations of local computing and storage of large-scale data. However, when data is outsourced and stored in the cloud, users lose access to Absolute control of data, cloud data may be tampered or destroyed intentionally or unintentio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/13G06F16/16G06F16/172G06F21/64
CPCG06F16/137G06F16/16G06F16/172G06F16/162G06F21/64
Inventor 林莉檀文婷储振兴张笑盈
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products