CN110049054A - The plaintext shared data auditing method and system for supporting privacy information hiding - Google Patents
The plaintext shared data auditing method and system for supporting privacy information hiding Download PDFInfo
- Publication number
- CN110049054A CN110049054A CN201910332582.6A CN201910332582A CN110049054A CN 110049054 A CN110049054 A CN 110049054A CN 201910332582 A CN201910332582 A CN 201910332582A CN 110049054 A CN110049054 A CN 110049054A
- Authority
- CN
- China
- Prior art keywords
- file
- private key
- signature
- privacy information
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a kind of plaintext shared data auditing method for supporting that privacy information is hiding and systems, which comprises (1) private key generates center and initializes to system;(2) user terminal generates center extraction private key from private key;(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;(4) management end examines file according to the braille part, file label and corresponding signature that receive, and braille part, file label and corresponding signature are uploaded to cloud when passing;(5) auditing by third party end carries out integrality audit to file according to braille part, file label and the corresponding signature on cloud.Privacy information Hiding Mechanism proposed by the present invention can defend malice manager to file illegal operation, any illegal operation all can beyond the clouds school inspection file when detected.
Description
Technical field
The present invention relates to cloud computing security technology area, especially a kind of plaintext shared data for supporting that privacy information is hiding
Auditing method and system.
Background technique
With the explosive growth for carrying out data volume this year, more and more personal, commercial companies and tissue will not counted
According to be stored in itself erection server in, but selection be stored in possess it is powerful calculating and storage capacity cloud platform on.Cloud
Platform provides the storage service that one more flexible, expansion is strong, and by cloud storage service, user can give data sharing
Other people.For example Ali, Di Dideng commercial company share out some business datum collection, carry out data analysis for academia, allow
Data generate bigger derived value.
However, cloud storage service is not completely reliable, some unpredictable hardware or software error, artificial mistake
Operation can still make data be destroyed.Also, the considerations of cloud service provider is for commercial interest can conceal data to user
The fact that be destroyed allows users to the integrality that detection is stored in data on cloud, prevents so needing to propose audit technique
The deceptive practices of insincere cloud service provider.In addition to this, shared data and huge derived value cause various tissues, quotient
The extensive concern of industry company, colleges and universities, but traditional data integrity techniques are not appropriate for shared data.Because of shared data
In may include privacy information, these privacies once be leaked to other people, it will to the public credibility and correlation of data sharing side
Individual privacy cause irremediable loss, so shared data cannot fully be shared in stored in clear to cloud.It passes
The audit program of system, which can be realized, completely detects ciphertext data, but data are encrypted to the use effect for influencing data completely
Ciphertext is such as input in neural network by rate, and obtained model prediction accuracy rate can significantly decline.The public key that will be used to decrypt
It is supplied to data consumer's seemingly a solution, but this will increase heavy code key management and limits sharing
Flexibility.
It is seldom by correlation investigation and research, the invention for solving problem above.It is asked in existing solution there are following
Topic:
1. data sharing is usually to be initiated by company or large organization (hereinafter referred to as organizing), in these tissues often
It has related management personnel and control is carried out to shared data.In the existing solution, the mistake that these administrative staff are endowed
Big right will not be found in the inspection of data school and audit process even if the data that they modify, this makes shared number
According to reliability and integrality can not be trusted completely.
2. the manager in existing program undertakes excessive calculating and transmission pressure.This makes this node of manager become whole
Bottleneck in a scheme can make entire data publication audit process hinder in the environment of facing mass data and high concurrent
Plug.
3. the hiding private data mechanism of existing program needs for one random number of each file generated, and data are raw
At needing these random numbers being stored in local, so as to the private data after restored processed.This can bring not to user
Small storage overhead, once and random number lose book private data and will not can be resumed.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the above problems, it is hidden to provide a kind of support privacy information
The plaintext shared data auditing method and system of hiding can support that hiding private data and prevention does not believe manager to data simultaneously
Malice tampering.
The technical solution adopted by the invention is as follows:
A kind of plaintext shared data auditing method for supporting that privacy information is hiding, comprising:
(1) private key generates center and initializes to system;
(2) user terminal generates center extraction private key from private key;
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is examining
By when by braille part, file label and it is corresponding signature be uploaded to cloud;
(5) auditing by third party end has carried out file according to braille part, file label and the corresponding signature on cloud
Whole property audit.
Realize the plaintext shared data auditing system of the hiding plaintext shared data auditing method of above-mentioned support privacy information,
Include:
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates braille part, file label and the correspondence of file
Signature, and submit to management end;
Management end is being examined for being examined according to the braille part, file label and corresponding signature that receive file
Look by when by braille part, file label and it is corresponding signature be uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, for being carried out according to braille part, file label and the corresponding signature on cloud to file
Integrality audit.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1, privacy information Hiding Mechanism proposed by the present invention can defend malice manager to file illegal operation, Ren Hefei
Method operation all can beyond the clouds school inspection file when detected.Even if cloud and management end are worked in collusion, can also be examined in third party
Discovery illegally distorting to file during the audit of meter end.
2, the present invention proposes that audit program possesses more reasonable system model.By to the again fixed of manager's responsibility
Justice, can reduce manager's node becomes the probability of Calculation bottleneck.In addition, user can directly fetch required number from cloud
According to further reducing manager's node becomes the probability of communication bottleneck.It can be seen that the invention has more preferably in practical applications
Efficiency, be more suitable high concurrent and mass data the case where.
3, privacy information hidden algorithm proposed by the present invention is the part private key for directlying adopt user, avoids user's storage
Random value bring storage overhead, and can be avoided due to accidentally being deleted the situation for causing file irrecoverable at random.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the flow diagram of Data Audit of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention, i.e., described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is logical
The component for the embodiment of the present invention being often described and illustrated herein in the accompanying drawings can be arranged and be designed with a variety of different configurations.
Therefore, claimed invention is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but be merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
Feature and performance of the invention are described in further detail with reference to embodiments.
Embodiment 1
The plaintext shared data of the plaintext shared data auditing method provided in this embodiment for supporting that privacy information is hiding is examined
Meter systems, as shown in Figure 1, comprising:
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates braille part, file label and the correspondence of file
Signature, and submit to management end;
Management end is being examined for being examined according to the braille part, file label and corresponding signature that receive file
Look by when by braille part, file label and it is corresponding signature be uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, for being carried out according to braille part, file label and the corresponding signature on cloud to file
Integrality audit.
The hiding plaintext shared data auditing party of the support privacy information realized on the plaintext shared data auditing system
Method, comprising:
(1) private key generates center and initializes to system:
(1.1) two multiplicative group G with identical Prime Orders p are randomly choosed1And GTAnd corresponding bilinear map e:G1
×G1=GT;
(1.2) from finite fieldMiddle selection random number x, from multiplicative group G1In randomly select two elements of g and u;Private key is raw
Retain main private key msk=x at center, it is ensured that master key msk is not revealed to anyone, then calculates its public key Ppub=gx;
(1.3) hash function H, H are chosen0,H1:{0,1}*→G1, and
(1.4) delivery system common parameter Para=(G1,GT,p,g,u,H,H0,H1,Hs,H2,Ppub)。
(2) user terminal extracts private key
(2.1) user terminal generates center side to private key and sends private key request, and generates center to private key and submit its own
User ID;
(2.2) private key generates center and generates corresponding private key using User ID, and the private key of generation is sent to corresponding
User terminal;Corresponding private key sk is generated using User IDIDCalculation formula are as follows:
skID=(sk 'ID,sk″ID)=(H0(ID||0)x,H1(ID||1)x)
Wherein, ID indicates User ID, and x is the main private key that private key generates center;
Further, this step further include:
(2.3) integrality and legitimacy for the private key that user terminal is received by the verifying of following two equation:
e(sk′ID, g) and=e (H0(ID||0),Ppub)
e(sk″ID, g) and=e (H1(ID||1),Ppub)
If two equatioies are set up, user terminal receives the private key, otherwise re-execute the steps (2.1)~
(2.2)。
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to pipe
Manage end;
(3.1) file M is divided into n block by user terminal, is expressed as M={ m1,m2,…,mn, whereinAnd define one
Element in a set SIS, set SIS is the index of the blocks of files comprising privacy information;
(3.2) user terminal is to each blocks of files miIt performs the following operation:
A. braille part M ' is generated:
As the index i ∈ SIS of blocks of files, i.e., this document block includes privacy information;For the blocks of files comprising privacy information
Calculate a hiding factorWherein, Mname be this document M unique identification and
In order to hide privacy information, by original document block add hide the factor cryptographic Hash and modulus after obtain hiding it is hidden
The blocks of files m ' of personal letter breathi=mi+H2(ai) mod p, then the braille part M '={ m ' generated1,m′2,…,m′n, and it is found that
As i ∈ SIS, m 'i≠mi;WhenWhen, m 'i=mi;
B. file label τ is generated:
Randomly select an elementAnd one is thus calculated for verifying the validation value R=g of file Mr;
Generate the metatag τ of file0=Mname | | n | | R;
Generate file label τ=τ0||IDS(τ0, ssk) | | spk, wherein IDS (τ0, ssk) and it is one for Computing Meta mark
Sign τ0Signature safety method, ssk be signature private key, spk then be signature public key;
C. signature Φ is generated:
For each blocks of files m ' of braille part M 'iCalculate the signature σi:
After the signature that all blind blocks of files have been calculated, a signature set Φ={ σ is obtainedi}1≤i≤n;
D. { M ', Φ, τ } is submitted to management end by user terminal.
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is examining
By when by braille part, file label and it is corresponding signature be uploaded to cloud:
(4.1) the metatag τ of file is obtained from file label τ0, and utilize metatag τ0It verifies whether to test by signature
Card method IDV (τ0,spk,IDS(τ0,ssk));
(4.2) as metatag τ0When being verified, from metatag τ0Middle acquisition validation value R, and text is verified by following equation
The integrality and legitimacy of part:
If equation is invalid, management end refuses the submission of this file;If so, then the integrality and legitimacy of file are tested
Card passes through.In addition it is also necessary to verify with the presence or absence of not hiding privacy information in file, verification method is that detection index belongs to
Whether the blocks of files of SIS still includes privacy information field (such as address name, Business Name) in plain text.If it exists, then it manages
End is refused this file and is submitted, and { M ', Φ, τ } is otherwise uploaded to cloud.
Further, cloud itself also can according to receive braille part, file label and it is corresponding signature to file into
Row examines that checking method is consistent with method of the management end to inspection of documents, prevents malice manager to the illegal behaviour of file with this
Make.
(5) auditing by third party end has carried out file according to braille part, file label and the corresponding signature on cloud
Whole property audit:
(5.1) braille part and file label τ are received from cloud, and the metatag τ of file is obtained from file label τ0, and
Pass through signature verification method IDV (τ0,spk,IDS(τ0, ssk)) verifying metatag τ0Legitimacy;When passing through signature verification method
When, obtain the unique identification Mname of file, the number n of blocks of files, and from metatag τ0Middle acquisition validation value R;
(5.2) a random index set I is generated, the length of the index set is c, each element in index set
Belong to [1, n];
(5.3) random value is chosen for each element in index set I
(5.4) auditing by third party end sends challenge request chal={ i, v to cloudi}i∈I;
(5.5) after cloud is according to challenge request is received, one is generated according to the braille part of storage and corresponding signature
Integrity certificationAnd integrity certification P is returned into third party
Audit end;
(5.6) integrity certification of file is verified at auditing by third party end by following equation:
If equation is set up, then it represents that the file on cloud is complete, and otherwise file has been damaged.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of plaintext shared data auditing method for supporting that privacy information is hiding characterized by comprising
(1) private key generates center and initializes to system;
(2) user terminal generates center extraction private key from private key;
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is passing
When by braille part, file label and it is corresponding signature be uploaded to cloud;
(5) auditing by third party end carries out integrality to file according to braille part, file label and the corresponding signature on cloud
Audit.
2. the plaintext shared data auditing method according to claim 1 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (1) comprises the following processes:
(1.1) two multiplicative group G with identical Prime Orders p are randomly choosed1And GTAnd corresponding bilinear map e:G1×G1
=GT;
(1.2) from finite fieldMiddle selection random number x, from multiplicative group G1In randomly select two elements of g and u;During private key generates
The heart retains main private key msk=x, it is ensured that master key msk is not revealed to anyone, then calculates its public key Ppub=gx;
(1.3) hash function H, H are chosen0,H1:{0,1}*→G1And Hs,H2:
(1.4) delivery system common parameter Para=(G1,GT,p,g,u,H,H0,H1,Hs,H2,Ppub)。
3. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (2) comprise the following processes:
(2.1) user terminal generates center side to private key and sends private key request, and generates the user that its own is submitted in center to private key
ID;
(2.2) private key generates center and generates corresponding private key using User ID, and the private key of generation is sent to corresponding user
End;Corresponding private key sk is generated using User IDIDCalculation formula are as follows:
skID=(sk 'ID, sk "ID)=(H0(ID||0)x, H1(ID||1)x)
Wherein, ID indicates User ID, and x is the main private key that private key generates center.
4. the plaintext shared data auditing method according to claim 3 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (2) further include:
(2.3) integrality and legitimacy for the private key that user terminal is received by the verifying of following two equation:
e(sk′ID, g) and=e (H0(ID | | 0), Ppub)
e(sk″ID, g) and=e (H1(ID | | 1), Ppub)
If two equatioies are set up, user terminal receives the private key, otherwise re-execute the steps (2.1)~(2.2).
5. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (3) comprise the following processes:
(3.1) file M is divided into n block by user terminal, is expressed as M={ m1, m2..., mn, whereinAnd define a collection
SIS is closed, the element in set SIS is the index of the blocks of files comprising privacy information;
(3.2) user terminal is to each blocks of files miIt performs the following operation:
A. braille part M ' is generated:
A hiding factor is calculated for the blocks of files comprising privacy informationWherein,
Mname be this document M unique identification and
Hiding privacy information obtains blocks of files m 'i=mi+H2(ai) mod p, then the braille part M '={ m ' generated1, m '2..., m
′n, as i ∈ SIS, m 'i≠mi;WhenWhen, m 'i=mi;
B. file label τ is generated:
Randomly select an elementAnd one is thus calculated for verifying the validation value R=g of file Mr;
Generate the metatag τ of file0=Mname | | n | | R;
Generate file label τ=τ0||IDS(τ0, ssk) | | spk, wherein IDS (τ0, ssk) and it is one for calculating metatag τ0's
The safety method of signature, ssk are the private key of signature, and spk is then the public key of signature;
C. signature Φ is generated:
It include the blocks of files m ' of privacy information for each of braille part M 'iCalculate the signature σi:
According to each blocks of files m ' comprising privacy informationiCalculate the signature obtains a signature set Φ={ σi}1≤i≤n;
D. { M ', Φ, τ } is submitted to management end by user terminal.
6. the plaintext shared data auditing method according to claim 5 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (4) comprise the following processes:
(4.1) the metatag τ of file is obtained from file label τ0, and utilize metatag τ0It verifies whether through signature verification side
Method IDV (τ0, spk, IDS (τ0, ssk));
(4.2) when passing through signature verification method, from metatag τ0Middle acquisition validation value R, and file is verified by following equation
Integrality and legitimacy:
If equation is set up, management end refuses the submission of this file;Otherwise, { M ', Φ, τ } is uploaded to cloud.
7. the plaintext shared data auditing method according to claim 6 for supporting that privacy information is hiding, which is characterized in that when
When the equation of the integrality and legitimacy of verifying file is set up, it is also necessary to verify in file with the presence or absence of not hiding privacy letter
Breath, and if it exists, then management end refuses the submission of this file, and { M ', Φ, τ } is otherwise uploaded to cloud.
8. the plaintext shared data auditing method according to claim 6 for supporting that privacy information is hiding, which is characterized in that cloud
File can also be examined according to the braille part, file label and corresponding signature received by holding itself.
9. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step
Suddenly (5) comprise the following processes:
(5.1) braille part and file label τ are received from cloud, and the metatag τ of file is obtained from file label τ0, and utilize
Metatag τ0It verifies whether through signature verification method IDV (τ0, spk, IDS (τ0, ssk));When passing through signature verification method,
Unique identification Mname, the number n of blocks of files of file are obtained, and from metatag τ0Middle acquisition validation value R;
(5.2) a random index set I is generated, the length of the index set is c, and each element in index set belongs to
[1, n];
(5.3) random value is chosen for each element in index set I
(5.4) auditing by third party end sends challenge request chal={ i, v to cloudi}i∈I;
(5.5) after cloud is according to challenge request is received, one is generated completely according to the braille part of storage and corresponding signature
Property provesAnd integrity certification P is returned into auditing by third party
End;
(5.6) integrity certification of file is verified at auditing by third party end by following equation:
If equation is set up, then it represents that the file on cloud is complete, and otherwise file has been damaged.
10. realizing that the plaintext of the hiding plaintext shared data auditing method of support privacy information described in claim 1-9 is shared
Data accountability system characterized by comprising
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates the braille part, file label and corresponding label of file
Name, and submit to management end;
Management end, it is logical examining for being examined according to the braille part, file label and corresponding signature that receive file
It is out-of-date that braille part, file label and corresponding signature are uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, it is complete for being carried out according to braille part, file label and the corresponding signature on cloud to file
Property audit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910332582.6A CN110049054B (en) | 2019-04-24 | 2019-04-24 | Plaintext shared data auditing method and system supporting privacy information hiding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910332582.6A CN110049054B (en) | 2019-04-24 | 2019-04-24 | Plaintext shared data auditing method and system supporting privacy information hiding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110049054A true CN110049054A (en) | 2019-07-23 |
CN110049054B CN110049054B (en) | 2021-07-06 |
Family
ID=67278990
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910332582.6A Active CN110049054B (en) | 2019-04-24 | 2019-04-24 | Plaintext shared data auditing method and system supporting privacy information hiding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110049054B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259449A (en) * | 2020-01-19 | 2020-06-09 | 深圳市博威创盛科技有限公司 | Processing method of private data, cleaner and cloud storage system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8750123B1 (en) * | 2013-03-11 | 2014-06-10 | Seven Networks, Inc. | Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network |
CN104994110A (en) * | 2015-07-16 | 2015-10-21 | 电子科技大学 | Method for assigning verifier for auditing cloud storage data |
CN105227317A (en) * | 2015-09-02 | 2016-01-06 | 青岛大学 | A kind of cloud data integrity detection method and system supporting authenticator privacy |
CN105791321A (en) * | 2016-05-03 | 2016-07-20 | 西南石油大学 | Cloud storage data common auditing method possessing secret key leakage resistance characteristic |
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
-
2019
- 2019-04-24 CN CN201910332582.6A patent/CN110049054B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8750123B1 (en) * | 2013-03-11 | 2014-06-10 | Seven Networks, Inc. | Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network |
CN104994110A (en) * | 2015-07-16 | 2015-10-21 | 电子科技大学 | Method for assigning verifier for auditing cloud storage data |
CN105227317A (en) * | 2015-09-02 | 2016-01-06 | 青岛大学 | A kind of cloud data integrity detection method and system supporting authenticator privacy |
CN105791321A (en) * | 2016-05-03 | 2016-07-20 | 西南石油大学 | Cloud storage data common auditing method possessing secret key leakage resistance characteristic |
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259449A (en) * | 2020-01-19 | 2020-06-09 | 深圳市博威创盛科技有限公司 | Processing method of private data, cleaner and cloud storage system |
Also Published As
Publication number | Publication date |
---|---|
CN110049054B (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106254374B (en) | A kind of cloud data public audit method having duplicate removal function | |
CN104917609B (en) | A kind of highly effective and safe data duplicate removal method and system perceived based on user | |
CN107147720B (en) | Traceable effective public audit method and system in a kind of cloud storage data sharing | |
US20210203481A1 (en) | Systems and methods for storage, generation and verification of tokens used to control access to a resource | |
CN110059494A (en) | A kind of method for secret protection and block catenary system of block chain transaction data | |
CN110602147B (en) | Data encryption safe storage method, system and storage medium based on cloud platform | |
JP2020511017A (en) | System and method for implementing blockchain-based digital certificates | |
EP3863220A1 (en) | System and method for generating digital marks | |
CN109286490A (en) | Support close state data deduplication and integrity verification method and system | |
CN105227317B (en) | A kind of cloud data integrity detection method and system for supporting authenticator privacy | |
CN107423637B (en) | Integrity auditing method supporting traceability of electronic medical record data on cloud | |
CN108229208A (en) | A kind of public audit method of more copy datas in cloud storage service | |
CN102170356A (en) | Authentication system realizing method supporting exclusive control of digital signature key | |
CN109104419A (en) | A kind of generation method and system of block chain account | |
CN110113334A (en) | Contract processing method, equipment and storage medium based on block chain | |
He et al. | Public integrity auditing for dynamic regenerating code based cloud storage | |
CN109902508A (en) | A kind of method for authenticating entities and system of the anonymity of voucher label originator | |
Kohad et al. | Scalability issues of blockchain technology | |
Mas’ud et al. | A review of digital forensics framework for blockchain in cryptocurrency technology | |
CN110012024A (en) | A kind of data sharing method, system, equipment and computer readable storage medium | |
CN103795548B (en) | A kind of distributed data base system and its implementation based on group ranking algorithm | |
CN109450636A (en) | The integrity verification method of group data in a kind of cloud storage | |
CN110049054A (en) | The plaintext shared data auditing method and system for supporting privacy information hiding | |
CN110912702A (en) | Block chain asset management method based on hidden social relationship | |
CN114169888B (en) | Universal type cryptocurrency custody method supporting multiple signatures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |