CN110049054A - The plaintext shared data auditing method and system for supporting privacy information hiding - Google Patents

The plaintext shared data auditing method and system for supporting privacy information hiding Download PDF

Info

Publication number
CN110049054A
CN110049054A CN201910332582.6A CN201910332582A CN110049054A CN 110049054 A CN110049054 A CN 110049054A CN 201910332582 A CN201910332582 A CN 201910332582A CN 110049054 A CN110049054 A CN 110049054A
Authority
CN
China
Prior art keywords
file
private key
signature
privacy information
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910332582.6A
Other languages
Chinese (zh)
Other versions
CN110049054B (en
Inventor
廖永健
范煜
周世杰
陈虹洁
乐代波
张刚林
黄文�
郑皓文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201910332582.6A priority Critical patent/CN110049054B/en
Publication of CN110049054A publication Critical patent/CN110049054A/en
Application granted granted Critical
Publication of CN110049054B publication Critical patent/CN110049054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a kind of plaintext shared data auditing method for supporting that privacy information is hiding and systems, which comprises (1) private key generates center and initializes to system;(2) user terminal generates center extraction private key from private key;(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;(4) management end examines file according to the braille part, file label and corresponding signature that receive, and braille part, file label and corresponding signature are uploaded to cloud when passing;(5) auditing by third party end carries out integrality audit to file according to braille part, file label and the corresponding signature on cloud.Privacy information Hiding Mechanism proposed by the present invention can defend malice manager to file illegal operation, any illegal operation all can beyond the clouds school inspection file when detected.

Description

The plaintext shared data auditing method and system for supporting privacy information hiding
Technical field
The present invention relates to cloud computing security technology area, especially a kind of plaintext shared data for supporting that privacy information is hiding Auditing method and system.
Background technique
With the explosive growth for carrying out data volume this year, more and more personal, commercial companies and tissue will not counted According to be stored in itself erection server in, but selection be stored in possess it is powerful calculating and storage capacity cloud platform on.Cloud Platform provides the storage service that one more flexible, expansion is strong, and by cloud storage service, user can give data sharing Other people.For example Ali, Di Dideng commercial company share out some business datum collection, carry out data analysis for academia, allow Data generate bigger derived value.
However, cloud storage service is not completely reliable, some unpredictable hardware or software error, artificial mistake Operation can still make data be destroyed.Also, the considerations of cloud service provider is for commercial interest can conceal data to user The fact that be destroyed allows users to the integrality that detection is stored in data on cloud, prevents so needing to propose audit technique The deceptive practices of insincere cloud service provider.In addition to this, shared data and huge derived value cause various tissues, quotient The extensive concern of industry company, colleges and universities, but traditional data integrity techniques are not appropriate for shared data.Because of shared data In may include privacy information, these privacies once be leaked to other people, it will to the public credibility and correlation of data sharing side Individual privacy cause irremediable loss, so shared data cannot fully be shared in stored in clear to cloud.It passes The audit program of system, which can be realized, completely detects ciphertext data, but data are encrypted to the use effect for influencing data completely Ciphertext is such as input in neural network by rate, and obtained model prediction accuracy rate can significantly decline.The public key that will be used to decrypt It is supplied to data consumer's seemingly a solution, but this will increase heavy code key management and limits sharing Flexibility.
It is seldom by correlation investigation and research, the invention for solving problem above.It is asked in existing solution there are following Topic:
1. data sharing is usually to be initiated by company or large organization (hereinafter referred to as organizing), in these tissues often It has related management personnel and control is carried out to shared data.In the existing solution, the mistake that these administrative staff are endowed Big right will not be found in the inspection of data school and audit process even if the data that they modify, this makes shared number According to reliability and integrality can not be trusted completely.
2. the manager in existing program undertakes excessive calculating and transmission pressure.This makes this node of manager become whole Bottleneck in a scheme can make entire data publication audit process hinder in the environment of facing mass data and high concurrent Plug.
3. the hiding private data mechanism of existing program needs for one random number of each file generated, and data are raw At needing these random numbers being stored in local, so as to the private data after restored processed.This can bring not to user Small storage overhead, once and random number lose book private data and will not can be resumed.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the above problems, it is hidden to provide a kind of support privacy information The plaintext shared data auditing method and system of hiding can support that hiding private data and prevention does not believe manager to data simultaneously Malice tampering.
The technical solution adopted by the invention is as follows:
A kind of plaintext shared data auditing method for supporting that privacy information is hiding, comprising:
(1) private key generates center and initializes to system;
(2) user terminal generates center extraction private key from private key;
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is examining By when by braille part, file label and it is corresponding signature be uploaded to cloud;
(5) auditing by third party end has carried out file according to braille part, file label and the corresponding signature on cloud Whole property audit.
Realize the plaintext shared data auditing system of the hiding plaintext shared data auditing method of above-mentioned support privacy information, Include:
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates braille part, file label and the correspondence of file Signature, and submit to management end;
Management end is being examined for being examined according to the braille part, file label and corresponding signature that receive file Look by when by braille part, file label and it is corresponding signature be uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, for being carried out according to braille part, file label and the corresponding signature on cloud to file Integrality audit.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1, privacy information Hiding Mechanism proposed by the present invention can defend malice manager to file illegal operation, Ren Hefei Method operation all can beyond the clouds school inspection file when detected.Even if cloud and management end are worked in collusion, can also be examined in third party Discovery illegally distorting to file during the audit of meter end.
2, the present invention proposes that audit program possesses more reasonable system model.By to the again fixed of manager's responsibility Justice, can reduce manager's node becomes the probability of Calculation bottleneck.In addition, user can directly fetch required number from cloud According to further reducing manager's node becomes the probability of communication bottleneck.It can be seen that the invention has more preferably in practical applications Efficiency, be more suitable high concurrent and mass data the case where.
3, privacy information hidden algorithm proposed by the present invention is the part private key for directlying adopt user, avoids user's storage Random value bring storage overhead, and can be avoided due to accidentally being deleted the situation for causing file irrecoverable at random.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the flow diagram of Data Audit of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention, i.e., described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is logical The component for the embodiment of the present invention being often described and illustrated herein in the accompanying drawings can be arranged and be designed with a variety of different configurations. Therefore, claimed invention is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but be merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
Feature and performance of the invention are described in further detail with reference to embodiments.
Embodiment 1
The plaintext shared data of the plaintext shared data auditing method provided in this embodiment for supporting that privacy information is hiding is examined Meter systems, as shown in Figure 1, comprising:
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates braille part, file label and the correspondence of file Signature, and submit to management end;
Management end is being examined for being examined according to the braille part, file label and corresponding signature that receive file Look by when by braille part, file label and it is corresponding signature be uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, for being carried out according to braille part, file label and the corresponding signature on cloud to file Integrality audit.
The hiding plaintext shared data auditing party of the support privacy information realized on the plaintext shared data auditing system Method, comprising:
(1) private key generates center and initializes to system:
(1.1) two multiplicative group G with identical Prime Orders p are randomly choosed1And GTAnd corresponding bilinear map e:G1 ×G1=GT
(1.2) from finite fieldMiddle selection random number x, from multiplicative group G1In randomly select two elements of g and u;Private key is raw Retain main private key msk=x at center, it is ensured that master key msk is not revealed to anyone, then calculates its public key Ppub=gx
(1.3) hash function H, H are chosen0,H1:{0,1}*→G1, and
(1.4) delivery system common parameter Para=(G1,GT,p,g,u,H,H0,H1,Hs,H2,Ppub)。
(2) user terminal extracts private key
(2.1) user terminal generates center side to private key and sends private key request, and generates center to private key and submit its own User ID;
(2.2) private key generates center and generates corresponding private key using User ID, and the private key of generation is sent to corresponding User terminal;Corresponding private key sk is generated using User IDIDCalculation formula are as follows:
skID=(sk 'ID,sk″ID)=(H0(ID||0)x,H1(ID||1)x)
Wherein, ID indicates User ID, and x is the main private key that private key generates center;
Further, this step further include:
(2.3) integrality and legitimacy for the private key that user terminal is received by the verifying of following two equation:
e(sk′ID, g) and=e (H0(ID||0),Ppub)
e(sk″ID, g) and=e (H1(ID||1),Ppub)
If two equatioies are set up, user terminal receives the private key, otherwise re-execute the steps (2.1)~
(2.2)。
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to pipe
Manage end;
(3.1) file M is divided into n block by user terminal, is expressed as M={ m1,m2,…,mn, whereinAnd define one Element in a set SIS, set SIS is the index of the blocks of files comprising privacy information;
(3.2) user terminal is to each blocks of files miIt performs the following operation:
A. braille part M ' is generated:
As the index i ∈ SIS of blocks of files, i.e., this document block includes privacy information;For the blocks of files comprising privacy information Calculate a hiding factorWherein, Mname be this document M unique identification and
In order to hide privacy information, by original document block add hide the factor cryptographic Hash and modulus after obtain hiding it is hidden The blocks of files m ' of personal letter breathi=mi+H2(ai) mod p, then the braille part M '={ m ' generated1,m′2,…,m′n, and it is found that As i ∈ SIS, m 'i≠mi;WhenWhen, m 'i=mi
B. file label τ is generated:
Randomly select an elementAnd one is thus calculated for verifying the validation value R=g of file Mr
Generate the metatag τ of file0=Mname | | n | | R;
Generate file label τ=τ0||IDS(τ0, ssk) | | spk, wherein IDS (τ0, ssk) and it is one for Computing Meta mark Sign τ0Signature safety method, ssk be signature private key, spk then be signature public key;
C. signature Φ is generated:
For each blocks of files m ' of braille part M 'iCalculate the signature σi:
After the signature that all blind blocks of files have been calculated, a signature set Φ={ σ is obtainedi}1≤i≤n
D. { M ', Φ, τ } is submitted to management end by user terminal.
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is examining By when by braille part, file label and it is corresponding signature be uploaded to cloud:
(4.1) the metatag τ of file is obtained from file label τ0, and utilize metatag τ0It verifies whether to test by signature Card method IDV (τ0,spk,IDS(τ0,ssk));
(4.2) as metatag τ0When being verified, from metatag τ0Middle acquisition validation value R, and text is verified by following equation The integrality and legitimacy of part:
If equation is invalid, management end refuses the submission of this file;If so, then the integrality and legitimacy of file are tested Card passes through.In addition it is also necessary to verify with the presence or absence of not hiding privacy information in file, verification method is that detection index belongs to Whether the blocks of files of SIS still includes privacy information field (such as address name, Business Name) in plain text.If it exists, then it manages End is refused this file and is submitted, and { M ', Φ, τ } is otherwise uploaded to cloud.
Further, cloud itself also can according to receive braille part, file label and it is corresponding signature to file into Row examines that checking method is consistent with method of the management end to inspection of documents, prevents malice manager to the illegal behaviour of file with this Make.
(5) auditing by third party end has carried out file according to braille part, file label and the corresponding signature on cloud Whole property audit:
(5.1) braille part and file label τ are received from cloud, and the metatag τ of file is obtained from file label τ0, and Pass through signature verification method IDV (τ0,spk,IDS(τ0, ssk)) verifying metatag τ0Legitimacy;When passing through signature verification method When, obtain the unique identification Mname of file, the number n of blocks of files, and from metatag τ0Middle acquisition validation value R;
(5.2) a random index set I is generated, the length of the index set is c, each element in index set Belong to [1, n];
(5.3) random value is chosen for each element in index set I
(5.4) auditing by third party end sends challenge request chal={ i, v to cloudi}i∈I
(5.5) after cloud is according to challenge request is received, one is generated according to the braille part of storage and corresponding signature Integrity certificationAnd integrity certification P is returned into third party Audit end;
(5.6) integrity certification of file is verified at auditing by third party end by following equation:
If equation is set up, then it represents that the file on cloud is complete, and otherwise file has been damaged.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of plaintext shared data auditing method for supporting that privacy information is hiding characterized by comprising
(1) private key generates center and initializes to system;
(2) user terminal generates center extraction private key from private key;
(3) user terminal generates braille part, file label and the corresponding signature of file, and submits to management end;
(4) management end examines file according to the braille part, file label and corresponding signature that receive, is passing When by braille part, file label and it is corresponding signature be uploaded to cloud;
(5) auditing by third party end carries out integrality to file according to braille part, file label and the corresponding signature on cloud Audit.
2. the plaintext shared data auditing method according to claim 1 for supporting that privacy information is hiding, which is characterized in that step Suddenly (1) comprises the following processes:
(1.1) two multiplicative group G with identical Prime Orders p are randomly choosed1And GTAnd corresponding bilinear map e:G1×G1 =GT
(1.2) from finite fieldMiddle selection random number x, from multiplicative group G1In randomly select two elements of g and u;During private key generates The heart retains main private key msk=x, it is ensured that master key msk is not revealed to anyone, then calculates its public key Ppub=gx
(1.3) hash function H, H are chosen0,H1:{0,1}*→G1And Hs,H2:
(1.4) delivery system common parameter Para=(G1,GT,p,g,u,H,H0,H1,Hs,H2,Ppub)。
3. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step Suddenly (2) comprise the following processes:
(2.1) user terminal generates center side to private key and sends private key request, and generates the user that its own is submitted in center to private key ID;
(2.2) private key generates center and generates corresponding private key using User ID, and the private key of generation is sent to corresponding user End;Corresponding private key sk is generated using User IDIDCalculation formula are as follows:
skID=(sk 'ID, sk "ID)=(H0(ID||0)x, H1(ID||1)x)
Wherein, ID indicates User ID, and x is the main private key that private key generates center.
4. the plaintext shared data auditing method according to claim 3 for supporting that privacy information is hiding, which is characterized in that step Suddenly (2) further include:
(2.3) integrality and legitimacy for the private key that user terminal is received by the verifying of following two equation:
e(sk′ID, g) and=e (H0(ID | | 0), Ppub)
e(sk″ID, g) and=e (H1(ID | | 1), Ppub)
If two equatioies are set up, user terminal receives the private key, otherwise re-execute the steps (2.1)~(2.2).
5. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step Suddenly (3) comprise the following processes:
(3.1) file M is divided into n block by user terminal, is expressed as M={ m1, m2..., mn, whereinAnd define a collection SIS is closed, the element in set SIS is the index of the blocks of files comprising privacy information;
(3.2) user terminal is to each blocks of files miIt performs the following operation:
A. braille part M ' is generated:
A hiding factor is calculated for the blocks of files comprising privacy informationWherein, Mname be this document M unique identification and
Hiding privacy information obtains blocks of files m 'i=mi+H2(ai) mod p, then the braille part M '={ m ' generated1, m '2..., m ′n, as i ∈ SIS, m 'i≠mi;WhenWhen, m 'i=mi
B. file label τ is generated:
Randomly select an elementAnd one is thus calculated for verifying the validation value R=g of file Mr
Generate the metatag τ of file0=Mname | | n | | R;
Generate file label τ=τ0||IDS(τ0, ssk) | | spk, wherein IDS (τ0, ssk) and it is one for calculating metatag τ0's The safety method of signature, ssk are the private key of signature, and spk is then the public key of signature;
C. signature Φ is generated:
It include the blocks of files m ' of privacy information for each of braille part M 'iCalculate the signature σi:
According to each blocks of files m ' comprising privacy informationiCalculate the signature obtains a signature set Φ={ σi}1≤i≤n
D. { M ', Φ, τ } is submitted to management end by user terminal.
6. the plaintext shared data auditing method according to claim 5 for supporting that privacy information is hiding, which is characterized in that step Suddenly (4) comprise the following processes:
(4.1) the metatag τ of file is obtained from file label τ0, and utilize metatag τ0It verifies whether through signature verification side Method IDV (τ0, spk, IDS (τ0, ssk));
(4.2) when passing through signature verification method, from metatag τ0Middle acquisition validation value R, and file is verified by following equation Integrality and legitimacy:
If equation is set up, management end refuses the submission of this file;Otherwise, { M ', Φ, τ } is uploaded to cloud.
7. the plaintext shared data auditing method according to claim 6 for supporting that privacy information is hiding, which is characterized in that when When the equation of the integrality and legitimacy of verifying file is set up, it is also necessary to verify in file with the presence or absence of not hiding privacy letter Breath, and if it exists, then management end refuses the submission of this file, and { M ', Φ, τ } is otherwise uploaded to cloud.
8. the plaintext shared data auditing method according to claim 6 for supporting that privacy information is hiding, which is characterized in that cloud File can also be examined according to the braille part, file label and corresponding signature received by holding itself.
9. the plaintext shared data auditing method according to claim 2 for supporting that privacy information is hiding, which is characterized in that step Suddenly (5) comprise the following processes:
(5.1) braille part and file label τ are received from cloud, and the metatag τ of file is obtained from file label τ0, and utilize Metatag τ0It verifies whether through signature verification method IDV (τ0, spk, IDS (τ0, ssk));When passing through signature verification method, Unique identification Mname, the number n of blocks of files of file are obtained, and from metatag τ0Middle acquisition validation value R;
(5.2) a random index set I is generated, the length of the index set is c, and each element in index set belongs to [1, n];
(5.3) random value is chosen for each element in index set I
(5.4) auditing by third party end sends challenge request chal={ i, v to cloudi}i∈I
(5.5) after cloud is according to challenge request is received, one is generated completely according to the braille part of storage and corresponding signature Property provesAnd integrity certification P is returned into auditing by third party End;
(5.6) integrity certification of file is verified at auditing by third party end by following equation:
If equation is set up, then it represents that the file on cloud is complete, and otherwise file has been damaged.
10. realizing that the plaintext of the hiding plaintext shared data auditing method of support privacy information described in claim 1-9 is shared Data accountability system characterized by comprising
Private key generates center, for initializing to system;
User terminal for generating center extraction private key from private key, and generates the braille part, file label and corresponding label of file Name, and submit to management end;
Management end, it is logical examining for being examined according to the braille part, file label and corresponding signature that receive file It is out-of-date that braille part, file label and corresponding signature are uploaded to cloud;
Cloud, braille part, file label and the corresponding signature submitted for storage management end;
Auditing by third party end, it is complete for being carried out according to braille part, file label and the corresponding signature on cloud to file Property audit.
CN201910332582.6A 2019-04-24 2019-04-24 Plaintext shared data auditing method and system supporting privacy information hiding Active CN110049054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910332582.6A CN110049054B (en) 2019-04-24 2019-04-24 Plaintext shared data auditing method and system supporting privacy information hiding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910332582.6A CN110049054B (en) 2019-04-24 2019-04-24 Plaintext shared data auditing method and system supporting privacy information hiding

Publications (2)

Publication Number Publication Date
CN110049054A true CN110049054A (en) 2019-07-23
CN110049054B CN110049054B (en) 2021-07-06

Family

ID=67278990

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910332582.6A Active CN110049054B (en) 2019-04-24 2019-04-24 Plaintext shared data auditing method and system supporting privacy information hiding

Country Status (1)

Country Link
CN (1) CN110049054B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259449A (en) * 2020-01-19 2020-06-09 深圳市博威创盛科技有限公司 Processing method of private data, cleaner and cloud storage system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8750123B1 (en) * 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
CN104994110A (en) * 2015-07-16 2015-10-21 电子科技大学 Method for assigning verifier for auditing cloud storage data
CN105227317A (en) * 2015-09-02 2016-01-06 青岛大学 A kind of cloud data integrity detection method and system supporting authenticator privacy
CN105791321A (en) * 2016-05-03 2016-07-20 西南石油大学 Cloud storage data common auditing method possessing secret key leakage resistance characteristic
CN107483585A (en) * 2017-08-18 2017-12-15 西安电子科技大学 The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8750123B1 (en) * 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
CN104994110A (en) * 2015-07-16 2015-10-21 电子科技大学 Method for assigning verifier for auditing cloud storage data
CN105227317A (en) * 2015-09-02 2016-01-06 青岛大学 A kind of cloud data integrity detection method and system supporting authenticator privacy
CN105791321A (en) * 2016-05-03 2016-07-20 西南石油大学 Cloud storage data common auditing method possessing secret key leakage resistance characteristic
CN107483585A (en) * 2017-08-18 2017-12-15 西安电子科技大学 The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259449A (en) * 2020-01-19 2020-06-09 深圳市博威创盛科技有限公司 Processing method of private data, cleaner and cloud storage system

Also Published As

Publication number Publication date
CN110049054B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN106254374B (en) A kind of cloud data public audit method having duplicate removal function
CN104917609B (en) A kind of highly effective and safe data duplicate removal method and system perceived based on user
CN107147720B (en) Traceable effective public audit method and system in a kind of cloud storage data sharing
US20210203481A1 (en) Systems and methods for storage, generation and verification of tokens used to control access to a resource
CN110059494A (en) A kind of method for secret protection and block catenary system of block chain transaction data
CN110602147B (en) Data encryption safe storage method, system and storage medium based on cloud platform
JP2020511017A (en) System and method for implementing blockchain-based digital certificates
EP3863220A1 (en) System and method for generating digital marks
CN109286490A (en) Support close state data deduplication and integrity verification method and system
CN105227317B (en) A kind of cloud data integrity detection method and system for supporting authenticator privacy
CN107423637B (en) Integrity auditing method supporting traceability of electronic medical record data on cloud
CN108229208A (en) A kind of public audit method of more copy datas in cloud storage service
CN102170356A (en) Authentication system realizing method supporting exclusive control of digital signature key
CN109104419A (en) A kind of generation method and system of block chain account
CN110113334A (en) Contract processing method, equipment and storage medium based on block chain
He et al. Public integrity auditing for dynamic regenerating code based cloud storage
CN109902508A (en) A kind of method for authenticating entities and system of the anonymity of voucher label originator
Kohad et al. Scalability issues of blockchain technology
Mas’ud et al. A review of digital forensics framework for blockchain in cryptocurrency technology
CN110012024A (en) A kind of data sharing method, system, equipment and computer readable storage medium
CN103795548B (en) A kind of distributed data base system and its implementation based on group ranking algorithm
CN109450636A (en) The integrity verification method of group data in a kind of cloud storage
CN110049054A (en) The plaintext shared data auditing method and system for supporting privacy information hiding
CN110912702A (en) Block chain asset management method based on hidden social relationship
CN114169888B (en) Universal type cryptocurrency custody method supporting multiple signatures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant