Cloud data auditing method and device, electronic equipment and computer readable storage medium
A cloud data and data technology, applied in computing, data processing applications, secure communication devices, etc., can solve problems such as denial of service and easy to be attacked by adversaries
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] An embodiment of the present invention provides a cloud data audit method, such as figure 1 with figure 2 As shown, the cloud data auditing method involves the data owner, the cloud server and the blockchain network, and these three form a system, wherein the blockchain network is composed of a group of third-party auditors, and the third-party auditors lead nodes and the committee of third-party auditors are both nodes, refer to image 3 , the method may include the following steps:
[0080] Step S11, the terminal owning the data builds a verifiable label locally for data integrity audit;
[0081] Specifically, there are many ways to construct verifiable labels in the current outsourced data auditing scheme, but in view of the high efficiency of verifiable labels generated by algebraic signatures, here we take the use of algebraic signatures to generate verifiable labels as an example. But the method for generating verifiable tags is not limited thereto.
[0082] ...
Embodiment 2
[0145] refer to Figure 5 , this embodiment provides a cloud data audit method, which is applied to a terminal with data, including:
[0146] Step S21, building a verifiable label locally for data integrity audit;
[0147] Step S22, storing the data and its verifiable label in the cloud server;
[0148] Step S23, authorizing a third-party auditor to perform an integrity audit on the data stored on the cloud server, so that when there is an audit task, one of a group of third-party auditors is selected as the leader node of the third-party auditor, by The leader node of the third-party auditor sends a challenge to the cloud server, and the cloud server uses stored data and verifiable labels to generate evidence of data integrity according to the requirements of the challenge, and uses a verifiable random function from a group of first Among the three-party auditors, several third-party auditors are randomly selected to form a third-party auditor committee, and the third-party...
Embodiment 3
[0157] refer to Figure 7 , the present embodiment provides a cloud data auditing method applied to a cloud server, comprising the following steps:
[0158] Step S31, receiving and storing data and its verifiable label, wherein the data comes from a terminal that owns the data, and the verifiable label is constructed locally by the terminal that owns the data, and is used for data integrity audit;
[0159]Step S32, receiving the challenge sent by the leader node of the third-party auditor, wherein the leader node of the third-party auditor is selected from a group of third-party auditors, and the third-party auditor is authorized by the terminal that owns the data, To perform an integrity audit on the data stored on the cloud server, when there is an audit task, select one from a group of third-party auditors as the leader node of the third-party auditor, and the leader node of the third-party auditor sends The cloud server issues a challenge;
[0160] Step S33, according to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


