Hierarchical data possession proving method capable of public auditing

A holding and hierarchical technology, applied in the field of information security, can solve problems such as loss of data control, poor scalability, complex operation and maintenance, etc., to achieve the effect of safeguarding rights and interests, ensuring security, and improving proof efficiency

Pending Publication Date: 2021-11-09
SHANGHAI INST OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid growth of the amount of data transmitted on the network, traditional storage technologies are faced with the problems of high construction costs, complex operation and maintenance, and poor scalability
With the development of cloud storage technology, more users store data on cloud servers in order to reduce local storage and computing costs, but at the same time lose data control, resulting in the inability to ensure the integrity and security of cloud storage data
Although there are many data integrity auditing schemes to audit whether the remote data is complete or not, most of them only return the result of whether the user's data is complete or damaged, and it is for the user to find out which data is damaged still very difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical data possession proving method capable of public auditing
  • Hierarchical data possession proving method capable of public auditing
  • Hierarchical data possession proving method capable of public auditing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] 1. The three roles of this method

[0047] like figure 1 As shown, this method involves three roles, user, cloud storage service provider and third-party audit:

[0048] (1) User: The user is the data owner. The user outsources and stores their data on the cloud server and accesses the data later. In order to reduce the computing and communication pressure of users, users will hire a third-party auditor to replace themselves to verify the integrity of outsourced storage data.

[0049] (2) Cloud stora...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hierarchical data possession proving method capable of public auditing. A user processes a file to be stored by layering and then partitioning, and the method mainly comprises the following steps that: (1) the user generates a verification label for each data block, and then sends the data blocks and the corresponding labels to a cloud storage service provider; (2) the third-party audit initiates challenges to the cloud storage service provider; (3) the data storage party generates possession evidence by using the stored data block information and the corresponding label information, and sends the evidence to the third party for auditing; (4) the third-party audit judges whether the data is complete or not by using public information and possession evidence of the user; and (5) if a data block is damaged, fine granularity authentication is performed by taking the damaged data block as a center until the detection granularity is minimum.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hierarchical data possession certification method that can be publicly audited. Background technique [0002] With the rapid growth of the amount of data transmitted on the network, traditional storage technologies face the problems of high construction costs, complex operation and maintenance, and poor scalability. With the development of cloud storage technology, more users store data on cloud servers in order to reduce local storage and computing costs, but at the same time lose data control, resulting in the inability to ensure the integrity and security of cloud storage data. Although there are many data integrity auditing schemes to audit whether the remote data is complete or not, most of them only return the result of whether the user's data is complete or damaged, and it is for the user to find out which data is damaged Still very difficult. Therefore, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06G06F21/60G06F21/62G06F21/64
CPCG06F3/062G06F3/0619G06F3/064G06F3/067G06F21/602G06F21/6218G06F21/64G06F2221/2107
Inventor 马海峰王俊华薛庆水张继时雪磊王晨阳崔墨香薛震周雨卫
Owner SHANGHAI INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products