CN103002040A - Method for checking cloud computation user data - Google Patents

Method for checking cloud computation user data Download PDF

Info

Publication number
CN103002040A
CN103002040A CN2012105437650A CN201210543765A CN103002040A CN 103002040 A CN103002040 A CN 103002040A CN 2012105437650 A CN2012105437650 A CN 2012105437650A CN 201210543765 A CN201210543765 A CN 201210543765A CN 103002040 A CN103002040 A CN 103002040A
Authority
CN
China
Prior art keywords
user
tpa
data
cloud server
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105437650A
Other languages
Chinese (zh)
Other versions
CN103002040B (en
Inventor
季一木
康家邦
王汝传
孙力娟
王振洪
马晓东
韩志杰
付雄
戴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU YITONG HIGH-TECH Co Ltd
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
JIANGSU YITONG HIGH-TECH Co Ltd
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU YITONG HIGH-TECH Co Ltd, Nanjing Post and Telecommunication University filed Critical JIANGSU YITONG HIGH-TECH Co Ltd
Priority to CN201210543765.0A priority Critical patent/CN103002040B/en
Publication of CN103002040A publication Critical patent/CN103002040A/en
Application granted granted Critical
Publication of CN103002040B publication Critical patent/CN103002040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method for checking cloud computation user data. In order to guarantee the completeness of user data and save user calculation resources and communication burdens, establishment of reliable checking systems is pivotal. The checking is performed by aid of a third party auditor (TPA) for acting for users. The TPA can act for users to check data completeness periodically, and a technique based on homomorphic linear certification is utilized to guarantee that the TPA can act for users to form checking work accurately on the premise of not obtaining user data, accordingly, privacy is protected, the safety of cloud computation user data is guaranteed. In order to improve safety and reliability, the technical scheme is improved, and a user data block authentication process is added, so that the TPA acts for checking user data block signature before data block checking, and the checking reliability is improved.

Description

The method that a kind of cloud computing user data checks
Technical field
The present invention is based on secure user data solution under the cloud computing environment of Open Source Platform, be mainly used in solving under the cloud environment terminal use and guarantee problem for data security and integrality, the assurance user will give under the third-party prerequisite the security inspection of data and can effectively guarantee secure user data, belong to the cloud computing security fields.
Background technology
Cloud computing is the another computation pattern that computer realm proposes after grid computing, Distributed Calculation, and cloud computing can be divided into three kinds of service mode: IaaS (Infrastructure-as-a-service), and infrastructure is namely served.The consumer can obtain service from perfect computer based Infrastructure by Internet, PaaS (Platform-as-a-Service), and platform is namely served, and in fact Paas refers to that platform with research and development of software is as a kind of service.SaaS(Software-as-a-Service), software is namely served, and it is the pattern that software is provided by Internet, and the user need not to buy software, but rents software based on Web to provider, comes the management enterprise business activities.With respect to the traditional calculations pattern, cloud computing mode has huge advantage:
As required from service, immanent access to netwoks, by using paying, risk transfer.But because cloud computing mode particularity, the user need to be stored in their data on the Cloud Server, although the burden of service data has been transferred to fortune supplier there, avoided for software, hardware maintenance and related maintenance personnel's cost expense, but because the user lacks data, the controllability of equipment and environment causes the distrust to cloud computing, the user with oneself data and the environment trustship of daily processing to the service provider, lost the control to data, so the verification msg storage security is particularly important under the prerequisite that does not obtain the cloud data, consider the huge property of the limited computing capability of high in the clouds user and storage data, rely on user self to check that data correctness will be very difficult in the cloud environment, therefore in order to ensure the fail safe of data with save user's computational resource, need to be by means of trusted third party examiner TPA(third party auditor) help set up reliable checking mechanism, guarantee integrality and the availability of user data.Thereby cloud computing can be trusted by the user, promote greatly developing of cloud computing technology, for medium-sized and small enterprises and domestic consumer bring vital interests.
Summary of the invention
Technical problem: the purpose of this invention is to provide the method that a kind of cloud computing user data checks; with the public key technology of improving based on the homomorphism authentication; obtain the data-privacy protective effect of public cloud system; because improvement technology; increased the reliability that checks; the integrality of the cloud user data that guarantees; because present technique bilinear characteristics; thereby so that check that user scope expands to multi-user environment; thereby TPA can carry out a plurality of inspection tasks simultaneously, further reduces workload and improves checking efficiency.
Technical scheme: the concrete steps of the method that a kind of cloud computing user data of the present invention checks are as follows:
1) the cloud computing user moves key schedule KeyGenerator order and produces PKI pk and private key sk, and KeyGenerator is a kind of key schedule, and the user is used for generating PKI and private key;
2) for the user data F=(m of given user file 1... .m n), user data is divided into the n piece, and each data block is expressed as m i(1≤i≤n), get name kAs each user file unique identification, the user moves the label t that SigGenerator orders to generate user data F; SigGenerator is used for generating the metadata of authentication, comprises MAC, signature, or other relevant information that are used to check;
3) then calculate the signature sigma of each data block i, signature set is expressed as Φ={ σ i} 1≤j≤n, then the user sends to Cloud Server with { t, F, Φ };
4) examination phase: at examination phase, the third party checks that TPA at first obtains file label t, and then TPA comes certifying signature t by public keys pk, represents to check the FALSE information of makeing mistakes if authentification failure just produces, and shows that label is imperfect, otherwise enters next step;
5) TPA produces challenge information chal, and " chal " indicated the particular location that needs checked data block at examination phase, then challenge information sent to Cloud Server;
6) in a single day Cloud Server is subject to challenge information chal, will move GeneratorProof and produce the response evidence proof that shows data storage correctness; GeneratorProof is moved by Cloud Server, is used for producing the evidence of data storage correctness;
7) then Cloud Server sends proof and stores the proof of correctness to TPA as data;
8) after receiving the corresponding evidence that Cloud Server is sent, TPA operation VerifyProof order checks the correctness of data storage, if authentication is passed through, show that Cloud Server correctly stores user data, finding out from scheme at examination phase TPA does not need maintenance customer's private key can not bring any added burden to the user yet, in addition, owing in checking process, do not need to obtain user data, thus reach the purpose of secret protection; VerifyProof checks that by the third party TPA operation is used for checking that server end beams back the correctness of corresponding evidence.
Described TPA processes the inspection agency from different user simultaneously, the technical support of bilinearity aggregate signature is a plurality of to have a plurality of different users that the signature of different information is aggregated into single signature, K authentication equation aggregated into one, checks when realizing multitask that concrete steps are as follows:
1) K user arranged in the supposing the system, each user k has
F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., and K}, for specific user k, the KeyGenerator order generation public keys pk of system and private key pk;
2) establishment stage: for each user data F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., K} gets name kAs each user file unique identification, the user moves the label t that SigGenerator orders calculation document F k=name k|| SSig Sk(name k), SSig Sk(name k) be with name kSignature with k private key for user generation;
3) then each user k calculates each data block m K, i(i ∈ 1 ... signature { σ .n}) K, i} 1≤k≤K(i=1 ..., n); Signature set is expressed as Φ k={ σ K, i} 1≤i≤nThe user is then with { t k, F k, Φ kSend to Cloud Server;
4) examination phase: TPA at first obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys Ssk(name k), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5) then TPA sends and checks that challenge information chal acts on behalf of all K user's data checks to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k
6) Cloud Server having property of return data evidence P={proof then i} 1≤i≤kGive TPA, similar with the unique user example, TPA operation VerifyProof acts on behalf of the correctness of k user authentication data storage, and batch inspection not only allows TPA to finish simultaneously multiple check work, and greatly reduces the traffic of Cloud Server end and the calculating cost of TPA end.
Beneficial effect:
1. computational resource is submitted in the work that allows the cloud computing user to check and the stronger third party of reliability checks, reduces burden and complexity that the user checks separately.
2. owing to the inspection that has increased the data file signature, so that the reliability that checks further improves, enlarged the further use of cloud computing.
3. the third party carries out the inspection work of user data correctness under the prerequisite that does not obtain user data and bring added burden for the cloud computing user, reaches the effect of secret protection.
4. this scheme is supported to expand in cloud computing and efficient public inspection, particularly supports batch inspection from different user inspection agency, and compare concrete single inspection and other schemes and want efficiently many, and the increase that does not bring communication and amount of calculation.
Description of drawings
Fig. 1 cloud computing data security check system general frame figure,
Fig. 2. diagram shown in the scheme 1,
Fig. 3. diagram shown in the scheme 2,
Fig. 4. the unique user checking process.
Embodiment
The invention reside in and improve existing public key technology based on the homomorphism authentication; be intended to guarantee the reliability that checks; it is the uniqueness sign of user's selecting file; then to unique identification user private key spanned file label; in checking the cloud computing user procedures, at first use client public key certifying signature integrality; complete if sign; then continue the individual data piece is checked; owing to added the proof procedure to user's signature; compare existing public key technology based on the homomorphism authentication; increased the reliability that checks; support simultaneously the secret protection of cloud computing user data in public inspection; it is trusted third party is issued to inspection in the prerequisite of the user data that mustn't go in the process that checks effect; comparing some need to submit to user data the purpose that the third party examiner reaches inspection and want the many of safety; because the user does not want own privately owned data are checked for inspection side; can bring new unsafe factor like this; simultaneously because the task that checks one by one will be dull in heavy; support that the inspection task will improve checking efficiency greatly in batches; by improving the homomorphism authentication techniques; our scheme has guaranteed the reliability that checks; compare directly the piece inspection of user data is compared; have higher safety to protect, this authentication mode will further be optimized existing inspection scheme.The below will make a concrete analysis of check process.
One, model and architecture
A) the cloud stores service relates to three different entities:
1) cloud terminal use U, he has a large amount of needs to be stored in data on the Cloud Server;
2) Cloud Server CS(cloud server), it is by the CSP(cloud serviceprovider of cloud service provider) manage and provide data storage service and enough memory spaces are arranged and huge computational resource (after this, we will not distinguish for CS and CSP);
3) third party checks TPA, and he has the unexistent professional checking ability of high in the clouds user and the agent client request checks the cloud storage security;
The user relies on Cloud Server CS to carry out cloud storage and data maintenance, and the user also can carry out alternately obtaining of data and upgrade operation with Cloud Server for the wide variety of applications purpose.The user also can seek help from the data security that TPA guarantees that they store, and the data of wishing storage are not understood by TPA, we think that TPA is reliable and independently, and can privately not gang up with CS or user in checking process, the phenomenon of any data leakage or loss all will be found when checking by TPA among the CS.Its concrete data security check system frame diagram is shown in accompanying drawing 1..
B) public check system framework and definition
Public inspection scheme includes four kinds of algorithms, that is: SigGenerator, GeneratorProof, VerifyProof, KeyGenerator is a kind of key schedule, the user is used for generating PKI and private key, SigGenerator is used for generating the metadata of authentication, comprise MAC, signature, or other relevant information that are used to check, GeneratorProof is moved by Cloud Server, be used for producing the evidence of data storage correctness, VerifyProof is used for checking that by the TPA operation server end beams back the correctness of corresponding evidence.
Our public check system can be divided into two stages by above inspection scheme, sets up and inspection:
● establishment stage: the user is by carrying out the public and private cipher key of KeyGenerator order initialization system, by producing the data signature label with private cipher key preprocessed data file F.Then the data block signature is produced signature set, then the signatures tab with data file F and data file signatures tab and data block is stored on the Cloud Server.
● at first it obtains file label to examination phase: TPA from cloud service, then user's PKI carries out signature authentication, if authentication is guaranteed during checking complete save data file F of Cloud Server by sending an inspection or challenge information to Cloud Server.Cloud Server generates corresponding message and feeds back to TPA from storage data and verify data unit by carrying out the GeneratorProof order, and TPA is then by VerifyProof order authentication corresponding message!
Two, existing inspection scheme
Basic scheme 1.
Each data block m of cloud computing user precomputation i(i ∈ 1 ... MACs n}), σ i=MAC Si(i|m i), with data file F and MACs{ σ i} 1≤i≤nSend on the Cloud Server, then private key sk is sent to TPA.At examination phase, the MACs that TPA chooses some data blocks and their correspondences on it immediately from cloud service confirms the correctness of data file, the benefit of this way is to check that partial document is easy to many than the inspection all files, yet, there is following critical defect in this simple solution: need to obtain user data when 1) TPA checks, this should be under an embargo under the prerequisite of privacy of user protection; 2) its communication and computation complexity are linear with respect to the data from the sample survey size, and this can cause the extension of the traffic and time delay, and the available bandwidth of particularly working as between TPA and Cloud Server has particularly evident in limited time.Its checking process as shown in Figure 2.
Basic scheme 2.
Thereby for fear of choose user data protection privacy of user from Cloud Server, we can make scheme into as follows: before the user upload the data to Cloud Server, the cloud user chose s authenticate key { sk at random τ} 1≤τ≤s, for whole file system, precomputation s corresponding MACs,
Figure BDA00002584961200061
These authorize metadata are submitted to TPA.TPA takes a sk at every turn τGive Cloud Server, and require the new MAC of Cloud Server generation to compare, so just reached the purpose of secret protection.Its corresponding checking process as shown in Figure 3.
Shortcoming:
1) the specific file number of times that can be used to the check restriction of receiving the key number.In case all possible key has been used up, the cloud user has to, and it obtains data from cloud service, thereby verifies for TPA from the new MACs of new calculating.
2) TPA have to safeguard and upgrade check between state, the MAC key that record has considers a large amount of potential inspections agencies from the multi-user, safeguards so many state for TPA be difficulty and easy generation error.
This programme: the improvement of the public inspection scheme of secret protection
In order to ensure the reliability that checks, in our scheme existing inspection is improved, the uniqueness sign of the user of elder generation selecting file, then to unique identification user private key spanned file label, in checking the cloud computing user procedures, at first use client public key certifying signature integrality, if it is complete to sign, then continue the individual data piece is checked, owing to added the proof procedure to user's signature, compare existing public key technology based on the homomorphism authentication, increased the reliability that checks.
In order to be issued to public inspection effect in the prerequisite that does not obtain user data; adopt the homomorphism authentication techniques, yet, directly adopt these technology and be not suitable for our final purpose; because the linearity of these data blocks is violated the secret protection principle in conjunction with probably demonstrating user data information.Particularly, if the linearity of the same data block of sufficient amount is in conjunction with being collected into, TPA can be gently and magnanimous act undertaken for the public good obtains user data content from a series of linear equations.
For this reason, the technology that adopts the homomorphism authentication to combine with random mask, in our agreement, from the linearity of the data from the sample survey of the response of server in conjunction with being covered by the random number that is produced by pseudo-random function (PRF), because the effect of covering, TPA is not having the necessary information that can set up correct system of linear equations group, so can not obtain user data content, the linearity of how many file data blocks is all like this in conjunction with being collected into.
In this simultaneously, notice in our scheme, we adopt the public key technology based on the homomorphism authentication, specifically, the bilinearity aggregate signature is improved public inspection agreement, and its flexibility in the signature polymerization will make our benifit from multiple design objective, its checking process as shown in Figure 3, dash area is scheme improvement place among the figure.
Adopt the technology of homomorphism authentication in the situation of user data not being revealed to TPA, to carry out inspection work, the improvement of existing scheme so that the reliability that checks further improves and do not bring extra burden to the user, is criticized the support of inspection simultaneously so that more effective its inspection step of below will making a concrete analysis of when checking user data of present technique.
(1) unique user checks scheme
Concrete steps are as follows:
1. establishment stage: the cloud computing user moves the KeyGenerator order generation public keys pk of system and private key sk;
2. for user data F=(m 1... .m n), get name, as file unique identification, the user moves the label t=name||SSig that SigGenerator orders calculation document F Sk(name), SSig Sk(name) be that name is produced signature with private key sk;
3. then calculate the signature sigma of each data block i, i ∈ (1 ... n).Signature set is expressed as Φ={ σ i} 1≤i≤nThen the user sends to Cloud Server with { t, F, Φ };
4. examination phase: at examination phase, TPA at first obtains file label t, and then TPA comes certifying signature SSig by public keys pk Ssk(name), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5. in order to produce inspection message chal, chal has indicated the particular location that needs checked data block at examination phase;
6. in a single day Cloud Server is subject to challenge information proof, will move GeneratorProof and produce the response evidence proof that shows data storage correctness;
7. send proof and store the proof of correctness to TPA as data;
8. after receiving the corresponding evidence that Cloud Server is sent, TPA operation VerifyProof order is verified corresponding correctness by checking the authentication equation;
9. if check and pass through, prove the storage of subscriber data integrality, the user passes through by agency's inspection of third party TPA, shows that Cloud Server correctly stores data block;
Clearly the R of random mask is for not having what impact in the validity of data checking.Concrete flow process as shown in Figure 4.
(2) support that checks for a plurality of users' batch
The inspection work of unique user for TPA be dull with lack efficient, this programme can be supported to check in batches, be that TPA can process the inspection agency from different user simultaneously, the technical support of bilinearity aggregate signature is a plurality of to have a plurality of different users that the signature of different information is aggregated into single signature, therefore provides effective authentication to all information authenticities.Owing to have signature polymerization technique and bilinear characteristic, we can aggregate into one with K authentication equation, so the inspection target can realize when multitask.
Concrete steps are as follows:
1. K user arranged in the supposing the system, and each user k has F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., and K}, for specific user k, the KeyGenerator order generation public keys pk of system and private key pk;
2. establishment stage: for each user data F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., K} gets name kAs each user file unique identification, the user moves the label t that SigGen orders calculation document F k=name k|| SSig Sk(name k), SSig Sk(name k) be with name kSignature with k private key for user generation;
3. then each user k calculates each data block m K, i(i ∈ 1 ... signature { σ .n}) K, i} 1<k<K(i=1 ..., n), signature set is expressed as Φ k={ σ K, i} 1<k<nThe user is then with { t k, F k, Φ kSend to Cloud Server;
4. examination phase: TPA at first obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys Ssk(name k), if authentification failure just produces FALSE information.Show that label is imperfect, otherwise enter next step;
5. then TPA sends and checks that challenge information chal acts on behalf of all K user's data checks to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k
6. Cloud Server having property of return data evidence P={proof then i} 1≤i≤kGive TPA, similar with the unique user example, TPA operation VerifyProof acts on behalf of the correctness of k user authentication data storage.Criticize inspection and not only allow TPA to finish simultaneously multiple check work, and greatly reduce the traffic of Cloud Server end and the calculating cost of TPA end.

Claims (2)

1. the method that checks of a cloud computing user data, its spy is as follows in the concrete steps that are the method:
1) the cloud computing user moves key schedule KeyGenerator order and produces PKI pk and private key sk, and KeyGenerator is a kind of key schedule, and the user is used for generating PKI and private key;
2) for the user data F=(m of given user file 1... .m n), user data is divided into the n piece, and each data block is expressed as m i(1≤i≤n), get name kAs each user file unique identification, the user moves the label t that SigGenerator orders to generate user data F; SigGenerator is used for generating the metadata of authentication, comprises MAC, signature, or other relevant information that are used to check;
3) then calculate the signature sigma of each data block i, signature set is expressed as Φ={ σ i} 1≤i≤n, then the user sends to Cloud Server with { t, F, Φ };
4) examination phase: at examination phase, the third party checks that TPA at first obtains file label t, and then TPA comes certifying signature t by public keys pk, represents to check the FALSE information of makeing mistakes if authentification failure just produces, and shows that label is imperfect, otherwise enters next step;
5) TPA produces challenge information chal, and " chal " indicated the particular location that needs checked data block at examination phase, then challenge information sent to Cloud Server;
6) in a single day Cloud Server is subject to challenge information chal, will move GeneratorProof and produce the response evidence proof that shows data storage correctness; GeneratorProof is moved by Cloud Server, is used for producing the evidence of data storage correctness;
7) then Cloud Server sends proof and stores the proof of correctness to TPA as data;
8) after receiving the corresponding evidence that Cloud Server is sent, TPA operation VerifyProof order checks the correctness of data storage, if authentication is passed through, show that Cloud Server correctly stores user data, finding out from scheme at examination phase TPA does not need maintenance customer's private key can not bring any added burden to the user yet, in addition, owing in checking process, do not need to obtain user data, thus reach the purpose of secret protection; VerifyProof checks that by the third party TPA operation is used for checking that server end beams back the correctness of corresponding evidence.
2. the method that checks of cloud computing user data according to claim 1, its spy is being that described TPA processes the inspection agency from different user simultaneously, the technical support of bilinearity aggregate signature is a plurality of to have a plurality of different users that the signature of different information is aggregated into single signature, K authentication equation aggregated into one, check when realizing multitask that concrete steps are as follows:
1) K user arranged in the supposing the system, each user k has
F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., and K}, for specific user k, the KeyGenerator order generation public keys pk of system and private key pk;
2) establishment stage: for each user data F k=(m K, 1, m K, 2...., m K, n), k ∈ 1 ...., K} gets name kAs each user file unique identification, the user moves the label t that SigGenerator orders calculation document F k=name k|| SSig Sk(name k), SSig Sk(name k) be with name kSignature with k private key for user generation;
3) then each user k calculates each data block m K, i(i ∈ 1 ... signature { σ .n}) K, i} 1≤k≤K(i=1 ..., n); Signature set is expressed as Φ k={ σ K, i} 1≤i≤nThe user is then with { t k, F k, Φ kSend to Cloud Server;
4) examination phase: TPA at first obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys Ssk(name k), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5) then TPA sends and checks that challenge information chal acts on behalf of all K user's data checks to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k
6) Cloud Server having property of return data evidence P={proof then i} 1≤i≤kGive TPA, similar with the unique user example, TPA operation VerifyProof acts on behalf of the correctness of k user authentication data storage, and batch inspection not only allows TPA to finish simultaneously multiple check work, and greatly reduces the traffic of Cloud Server end and the calculating cost of TPA end.
CN201210543765.0A 2012-12-14 2012-12-14 Method for checking cloud computation user data Active CN103002040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210543765.0A CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210543765.0A CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Publications (2)

Publication Number Publication Date
CN103002040A true CN103002040A (en) 2013-03-27
CN103002040B CN103002040B (en) 2015-04-08

Family

ID=47930173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210543765.0A Active CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Country Status (1)

Country Link
CN (1) CN103002040B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function
CN104166821A (en) * 2013-05-17 2014-11-26 华为技术有限公司 Data processing method and device
CN104378370A (en) * 2014-11-12 2015-02-25 南京邮电大学 Secure use method of privacy data in cloud computation
CN104811300A (en) * 2015-04-22 2015-07-29 电子科技大学 Secret key updating method for cloud storage and implementation method of cloud data auditing system
CN105227317A (en) * 2015-09-02 2016-01-06 青岛大学 A kind of cloud data integrity detection method and system supporting authenticator privacy
CN106790303A (en) * 2017-03-23 2017-05-31 西安电子科技大学 The data integrity verification method completed by third party in cloud storage
CN107682379A (en) * 2017-11-22 2018-02-09 南京汽车集团有限公司 Safe information transmission device, transmission method and storage method based on homomorphic cryptography
CN105072086B (en) * 2015-07-06 2018-03-02 武汉科技大学 A kind of cloud storage batch auditing method based on MapReduce
CN108650097A (en) * 2018-04-28 2018-10-12 上海扈民区块链科技有限公司 A kind of efficient aggregation number endorsement method
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
WO2021205256A1 (en) * 2020-04-08 2021-10-14 International Business Machines Corporation Privacy centric data security in cloud environment
CN115955489A (en) * 2023-03-15 2023-04-11 中国民航大学 Cloud storage-oriented onboard software possession proving method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102647433A (en) * 2012-05-21 2012-08-22 北京航空航天大学 Efficient cloud storage data possession verification method
CN102710757A (en) * 2012-05-21 2012-10-03 北京航空航天大学 Distributed cloud storage data integrity protection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102647433A (en) * 2012-05-21 2012-08-22 北京航空航天大学 Efficient cloud storage data possession verification method
CN102710757A (en) * 2012-05-21 2012-10-03 北京航空航天大学 Distributed cloud storage data integrity protection method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166821A (en) * 2013-05-17 2014-11-26 华为技术有限公司 Data processing method and device
CN104166821B (en) * 2013-05-17 2017-07-21 华为技术有限公司 A kind of method and apparatus of data processing
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function
CN104378370A (en) * 2014-11-12 2015-02-25 南京邮电大学 Secure use method of privacy data in cloud computation
CN104378370B (en) * 2014-11-12 2017-07-07 南京邮电大学 A kind of safe handling method of private data in cloud computing
CN104811300A (en) * 2015-04-22 2015-07-29 电子科技大学 Secret key updating method for cloud storage and implementation method of cloud data auditing system
CN104811300B (en) * 2015-04-22 2017-11-17 电子科技大学 The key updating method of cloud storage and the implementation method of cloud data accountability system
CN105072086B (en) * 2015-07-06 2018-03-02 武汉科技大学 A kind of cloud storage batch auditing method based on MapReduce
CN105227317A (en) * 2015-09-02 2016-01-06 青岛大学 A kind of cloud data integrity detection method and system supporting authenticator privacy
CN105227317B (en) * 2015-09-02 2019-04-05 青岛大学 A kind of cloud data integrity detection method and system for supporting authenticator privacy
CN106790303A (en) * 2017-03-23 2017-05-31 西安电子科技大学 The data integrity verification method completed by third party in cloud storage
CN107682379A (en) * 2017-11-22 2018-02-09 南京汽车集团有限公司 Safe information transmission device, transmission method and storage method based on homomorphic cryptography
CN108650097A (en) * 2018-04-28 2018-10-12 上海扈民区块链科技有限公司 A kind of efficient aggregation number endorsement method
CN108650097B (en) * 2018-04-28 2021-03-09 上海扈民区块链科技有限公司 Efficient digital signature aggregation method
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109274504B (en) * 2018-11-20 2021-07-13 桂林电子科技大学 Multi-user big data storage sharing method and system based on cloud platform
WO2021205256A1 (en) * 2020-04-08 2021-10-14 International Business Machines Corporation Privacy centric data security in cloud environment
GB2609359A (en) * 2020-04-08 2023-02-01 Ibm Privacy centric data security in cloud environment
US11741254B2 (en) 2020-04-08 2023-08-29 International Business Machines Corporation Privacy centric data security in a cloud environment
CN115955489A (en) * 2023-03-15 2023-04-11 中国民航大学 Cloud storage-oriented onboard software possession proving method

Also Published As

Publication number Publication date
CN103002040B (en) 2015-04-08

Similar Documents

Publication Publication Date Title
CN103002040B (en) Method for checking cloud computation user data
Wei et al. Security and privacy for storage and computation in cloud computing
US20210271764A1 (en) Method for storing data on a storage entity
CN109889497B (en) Distrust-removing data integrity verification method
Wei et al. SecCloud: Bridging secure storage and computation in cloud
CN106254374B (en) A kind of cloud data public audit method having duplicate removal function
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
US11050762B2 (en) High throughput secure multi-party computation with identifiable abort
US9614847B2 (en) User authentication
CN110197082A (en) Data processing method, data processing equipment and computer system
CN106576043A (en) Virally distributable trusted messaging
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN110417790A (en) Block chain system of real name queuing system and method
Zheng et al. Smart grid power trading based on consortium blockchain in internet of things
CN113301022A (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
Li et al. Toward decentralized fair data trading based on blockchain
WO2018179293A1 (en) Verification information adding device, verification device, information management system, method, and program
CN112953978B (en) Multi-signature authentication method, device, equipment and medium
CN107104804A (en) A kind of platform integrity verification method and device
CN104158807A (en) PaaS-based secure cloud computing method and PaaS-based secure cloud computing system
CN111385096A (en) Block chain network, signature processing method, terminal and storage medium
Dwivedi et al. Design of blockchain and ecc-based robust and efficient batch authentication protocol for vehicular ad-hoc networks
Lai et al. Blockchain for achieving accountable outsourcing computations in edge computing
CN114362958B (en) Intelligent home data security storage auditing method and system based on blockchain
CN115409511A (en) Personal information protection system based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20130327

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000208

Denomination of invention: Method for checking cloud computation user data

Granted publication date: 20150408

License type: Common License

Record date: 20161110

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000208

Date of cancellation: 20180116