Cloud data integrity verification scheme based on blockchain

An integrity verification, blockchain technology, applied in the direction of user identity/authority verification, digital transmission system, public key for secure communication, etc., to achieve the effect of reducing communication complexity, computational complexity, and overhead

Active Publication Date: 2021-10-26
BEIHANG UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the basis of the existing integrity verification system, blockchain, bilinear mapping, digital signature and other technical means are used to solve the security and privacy problems existing in the current cloud data integrity verification process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data integrity verification scheme based on blockchain
  • Cloud data integrity verification scheme based on blockchain
  • Cloud data integrity verification scheme based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, solutions and effects of the embodiments of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0018] The specific implementation steps of the present invention are as follows:

[0019] S1: The data owner C runs the key generation algorithm: selects the corresponding security parameter κ according to the needs of the data owner to reach the required security level. In this embodiment, the security parameter κ=80bits is taken, and then the large prime number p=2κ=160bits is taken to form a group Choose an additive cyclic group with Weil pairing (bilinear map) of order p g is elements in , and then choose a multiplicative cyclic group with the same order p Also, build a secure hash, H:{0,1} * →{0,1} λ . in the group randomly select a number α as the secret key, pk=αg is the public key. Finally, a key pair (pk,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cloud data integrity verification scheme based on a blockchain, which uses the technical means of digital short signature, bilinear mapping, the blockchain and the like to solve the problems of integrity of cloud storage data, uncredibility of a third-party auditor and the like at present. When a data owner interacts with a cloud server, the data owner C generates a key pair, performs block processing on its own data and generates a homomorphic verification tag by using a digital signature. The data owner C uploads the data block and a homomorphic verification tag set to the cloud server S, and uploads a hash value set corresponding to the data block to a smart contract on the blockchain, and the smart contract verifies the data of the data owner. The smart contract sends a challenge to verify whether the integrity of the data, and S generates a response proof according to the challenge. Finally, the smart contract verifies whether the proof is correct. Due to the fact that the blockchain has the characteristics of non-tampering, decentration and the like, the integrity and privacy of the scheme are strongly guaranteed.

Description

technical field [0001] The invention relates to the technical field of blockchain and cloud storage security, in particular to a cloud data integrity verification scheme based on the cloud. Background technique [0002] Due to the characteristics of flexibility, on-demand allocation of storage and the ability to save local space resources and management resources, cloud storage has been widely used. Traditional data integrity verification methods usually use encryption to protect data in the cloud, relying on trusted third-party auditors (TPA) to verify the data. But in practical applications, TPA is not completely trustworthy. For example, malicious third parties may conspire with cloud servers to falsify audit results, or may extract data information by continuously auditing the same data segments. The decentralized, distributed, persistent, and non-tamperable properties of the blockchain make the blockchain the preferred method for data integrity verification with priva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/08H04L9/00
CPCH04L63/123H04L67/10H04L9/3247H04L9/008H04L9/0861H04L9/3073H04L9/50Y02D10/00
Inventor 罗喜伶柏艺王晓超
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products