Anti-key exposure cloud data integrity verification method supporting fair payment

An integrity verification, cloud data technology, applied in the field of data security, can solve the problems of forgery of integrity verification certificates, unguaranteed data security, damage to message authentication labels, non-tampering, etc., to reduce computational overhead and communication. Overhead, effect of strong security

Pending Publication Date: 2022-07-12
ZHENGZHOU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The message authentication tag is consistent with the corresponding data block, and no one can change the message authentication tag without knowing the key
The exposure of the key will destroy the immutability of the message authentication label, and the integrity verification certificate is more likely to be forged by a malicious adversary, which in turn affects the authenticity of the data integrity verification result
[0006] It can be seen that the existing technical methods cannot resist the key exposure attack while ensuring the fairness of the transaction, and the security of the data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-key exposure cloud data integrity verification method supporting fair payment
  • Anti-key exposure cloud data integrity verification method supporting fair payment
  • Anti-key exposure cloud data integrity verification method supporting fair payment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The embodiments of the present invention will be described in detail below with reference to the examples, and the implementation process of how the present invention applies technical means to solve technical problems and achieve technical effects will be specifically shown.

[0056] The main idea of ​​the present invention is as follows:

[0057] A cloud data integrity check method that supports fair payment and resists key exposure. The system model of this method is figure 1 As shown, there are three types of entities: data owner, cloud service provider, and verifier;

[0058] Data owner: The data owner uses the security parameters to generate a public key-private key pair and public parameters for integrity verification before data outsourcing; the data owner uses the private key to generate an audit key, and uses the audit key to calculate the authentication of the file tags, and then upload the data together with the set of authentication tags to the cloud serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-key exposure cloud data integrity verification method supporting fair payment. The method comprises the following steps: a data owner selects a security parameter and generates a public and private key pair and a public parameter; the data owner generates an audit key; the data owner uploads the data block and the authentication code to the cloud server; the cloud service provider and the data owner deploy an intelligent auditing contract together; and the cloud service provider generates a random challenge by using the current block head and the public parameter, writes the proof and the auxiliary information into an activation contract and deploys the activation contract to the block chain, and after the intelligent audit contract is activated, verifies the proof and executes a preset transaction according to a verification result. And the data owner randomly selects the secret information in the current time period to update the auditing key and the authentication code. According to the invention, fair transaction under the condition that a data owner and a cloud service provider do not trust each other is realized, the forward and backward security problems of outsourcing data under key exposure attack are solved, and audit key updating and authentication code updating are supported.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a cloud data integrity check method that supports fair payment and is resistant to key exposure. Background technique [0002] Cloud storage is a cloud computing system that can provide infinitely scalable data storage space and management services. Cloud storage is favored by businesses, organizations, and individuals due to its low latency, high scalability, and high flexibility. However, when users upload data remotely to a server provided by a cloud service provider, they lose physical control of the data. Once the cloud server has problems, its data will face serious security threats. Data integrity is one of the core elements of data security, and cloud storage is the focus of users and cloud service providers. [0003] In the process of implementing the present invention, the inventor of the present application found that the method of the prior art has at least t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L9/40H04L67/10
CPCH04L63/123H04L63/083H04L63/06H04L9/302H04L9/3249H04L67/10
Inventor 任景莉杨盼
Owner ZHENGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products