Unlock instant, AI-driven research and patent intelligence for your innovation.

Cloud data auditing method and device, electronic equipment and computer readable storage medium

A cloud data and data technology, applied in computing, data processing applications, secure communication devices, etc., can solve problems such as denial of service and easy to be attacked by adversaries

Pending Publication Date: 2022-05-13
ZHEJIANG LAB
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing schemes basically assume that the third-party auditor TPA is credible. However, in practical applications, the third-party auditor is not completely credible, and due to the early disclosure of identity, it is easy to be attacked by the opponent, such as denial of service. (Denial of Service, DoS) attack and collusion attack (Collusion Attack), etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data auditing method and device, electronic equipment and computer readable storage medium
  • Cloud data auditing method and device, electronic equipment and computer readable storage medium
  • Cloud data auditing method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] An embodiment of the present invention provides a cloud data audit method, such as figure 1 with figure 2 As shown, the cloud data auditing method involves the data owner, the cloud server and the blockchain network, and these three form a system, wherein the blockchain network is composed of a group of third-party auditors, and the third-party auditors lead nodes and the committee of third-party auditors are both nodes, refer to image 3 , the method may include the following steps:

[0080] Step S11, the terminal owning the data builds a verifiable label locally for data integrity audit;

[0081] Specifically, there are many ways to construct verifiable labels in the current outsourced data auditing scheme, but in view of the high efficiency of verifiable labels generated by algebraic signatures, here we take the use of algebraic signatures to generate verifiable labels as an example. But the method for generating verifiable tags is not limited thereto.

[0082] ...

Embodiment 2

[0145] refer to Figure 5 , this embodiment provides a cloud data audit method, which is applied to a terminal with data, including:

[0146] Step S21, building a verifiable label locally for data integrity audit;

[0147] Step S22, storing the data and its verifiable label in the cloud server;

[0148] Step S23, authorizing a third-party auditor to perform an integrity audit on the data stored on the cloud server, so that when there is an audit task, one of a group of third-party auditors is selected as the leader node of the third-party auditor, by The leader node of the third-party auditor sends a challenge to the cloud server, and the cloud server uses stored data and verifiable labels to generate evidence of data integrity according to the requirements of the challenge, and uses a verifiable random function from a group of first Among the three-party auditors, several third-party auditors are randomly selected to form a third-party auditor committee, and the third-party...

Embodiment 3

[0157] refer to Figure 7 , the present embodiment provides a cloud data auditing method applied to a cloud server, comprising the following steps:

[0158] Step S31, receiving and storing data and its verifiable label, wherein the data comes from a terminal that owns the data, and the verifiable label is constructed locally by the terminal that owns the data, and is used for data integrity audit;

[0159]Step S32, receiving the challenge sent by the leader node of the third-party auditor, wherein the leader node of the third-party auditor is selected from a group of third-party auditors, and the third-party auditor is authorized by the terminal that owns the data, To perform an integrity audit on the data stored on the cloud server, when there is an audit task, select one from a group of third-party auditors as the leader node of the third-party auditor, and the leader node of the third-party auditor sends The cloud server issues a challenge;

[0160] Step S33, according to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud data auditing method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps that a terminal with data constructs a verifiable label for integrity auditing for the data, and then the data and the label are stored in a cloud server; in order to ensure the integrity of the stored data, the third-party auditor is authorized to perform integrity verification on the data stored in the cloud server. A third-party auditor is not completely credible, so that the cloud data auditing method is provided, and an auditor committee for randomly selecting members is established for each auditing operation to complete the auditing operation. As auditor committee members are randomly selected, denial of service attacks and collusion attacks can be resisted.

Description

technical field [0001] This application relates to the field of cloud data auditing, in particular to a cloud data auditing method and device, electronic equipment, and a computer-readable storage medium. Background technique [0002] Cloud computing is a new computing model based on shared IT resources. With the continuous development of information technology, the data scale has shown exponential growth, and the average daily new data has reached the level of PB or even EB. In order to cope with the growing demand for data storage, more and more companies or individuals choose to outsource local data to Cloud storage server, which can greatly save economic and management costs. However, when the user stores the data on the cloud server, he loses the physical control over the data, which leads to some new security problems, such as hardware failure of the storage device, malicious tampering by the cloud storage service provider, etc. In particular, in recent years, freque...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32H04L9/40H04L67/10H04L67/12G06F16/27G06F21/64G06Q40/04
CPCH04L9/002H04L9/0869H04L9/3239H04L9/3247H04L63/0442H04L63/1458H04L67/10H04L67/12G06F16/27G06F21/64G06Q40/04
Inventor 陈兰香曾令仿陈光
Owner ZHEJIANG LAB