CN103279718B - Based on the data integrity verification method of SBT during a kind of cloud stores - Google Patents

Based on the data integrity verification method of SBT during a kind of cloud stores Download PDF

Info

Publication number
CN103279718B
CN103279718B CN201310185462.0A CN201310185462A CN103279718B CN 103279718 B CN103279718 B CN 103279718B CN 201310185462 A CN201310185462 A CN 201310185462A CN 103279718 B CN103279718 B CN 103279718B
Authority
CN
China
Prior art keywords
node
data
sum
child nodes
tree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310185462.0A
Other languages
Chinese (zh)
Other versions
CN103279718A (en
Inventor
钟婷
耿纪昭
秦志光
赵洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201310185462.0A priority Critical patent/CN103279718B/en
Publication of CN103279718A publication Critical patent/CN103279718A/en
Application granted granted Critical
Publication of CN103279718B publication Critical patent/CN103279718B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the data integrity verification method based on SBT in the storage of a kind of cloud, for a kind of based on the data integrity validation scheme of node size balanced tree.The well balanced property that node size balanced tree has, better can control the height of tree, makes it level off to complete binary tree.Because on binary tree, Data Update is all relevant to the height of tree with the time complexity of inquiry, node size balanced tree has very large advantage in the efficiency of data manipulation, and the time dimension of data manipulation can be held in O (logn) by it.Node size balanced tree has good dirigibility in Data Dynamic renewal process, and when storing data in node size balanced tree, is not limited to only be stored in its leaf node, and this can reduce the storage overhead of server to a certain extent.The program, by being combined with hash function by node size balanced tree, designs the efficient verify data structure being suitable for large-scale data and dynamically updating, thus improves the efficiency of data integrity validation.

Description

Based on the data integrity verification method of SBT during a kind of cloud stores
Technical field
The invention belongs to the technical field of data security in cloud storage, more specifically say, relate to the data integrity verification method based on SBT in the storage of a kind of cloud.
Background technology
Cloud storage is extended by cloud computing concept and develops, and as a kind of Service Operation pattern having practical value and marketable value concurrently, it has caused stakeholder more and more to pay close attention to.The thinking of cloud stores service and theory for enterprise customer or personal user all attractive, but safety problem wherein also result in the worry of user.
Data integrity validation technology during cloud stores is one of gordian technique ensureing data security in cloud storage.During cloud stores, data integrity validation mechanism is based on three-party model.So-called tripartite refers to that cloud stores user, insincere server and trust data source.In three-party model, data are outsourced on external server by user, comprise a trust data source and a lot of insincere server.Wherein trust data source is complete and data that are correctly in store user, it again by data publication to each insincere server.User, when needing the data using outsourcing, only needs to access one of them or several insincere server.Because the server of accessing when user fetches data is incredible, at this moment just data integrity validation mechanism is needed to guarantee that the data that user fetches are the raw data not being tampered and forging.
The core concept of data integrity validation mechanism is the strategy adopting a kind of member's inquiry.This strategy is combined with a data structure with confirmability by the Hash table storing data, and authentication authorization and accounting data structure, makes the answer of member's inquiry have verifiability, and user can verify and show that whether accessed outsourcing data are complete whereby.Member's inquiry can abstractly be following mathematical procedure: the data abstraction of outsourcing is become a data set S=(e 1, e 2..., e n), wherein e ithe data block of a fixed size in the data of representative.So verify that the process whether a certain data block is complete can regard whether proof element x belongs to the process of data set S abstractively as, wherein x just represents the data block wanting to verify.This process is described in detail as follows on the basis of three-party model:
1), user sends an inquiry request to insincere server, and whether inquiry data element x is among data set S;
2), insincere server performs corresponding query manipulation in this locality, and answer Yes or No drawn is returned to user.Also to return " evidence " that generate in query script simultaneously;
3), user's " evidence " of being returned by insincere server, carry out a series of calculating, again draw the eigenwert of data;
4), user is by the 3rd) (this eigenwert is drawn by trust data source calculated in advance and is passed to user for the eigenwert and the data feature values in this locality that obtain in step, user is pre-stored in this locality) contrast, if the same user accepts insincere server and returns the answer come, otherwise, then refuse.
For the design of verify data structure, researchist has had some valuable investigations.Merkle proposes and adopts Merkle Hash tree to set up verify data structure.During with Merkle storage of data structure data set S, the element in S is all stored in the leaf of Hash tree T, and each node stores a label value in tree.If node is leaf node, its label value is identical with the data of its storage; Otherwise its label value is calculated by impact resistant hash function by the label value of its child nodes.The people such as Goodrich propose and adopt jumping list structure and commutative hash function to realize verify data organization plan.Jumping table is a kind of data structure with randomness, and it adopts all data of storage of linked list in lowermost layer, and in last layer chained list, element is the probability subset of its lower one deck.Tree combines with RSA one-way accumulators technology and constructs RSA and set by the people such as Tomassia, it makes point number of the height of tree and tree be all constant by introducing parameter ε, so its evidence size, to search and the time complexity verified is O (1).
By finding existing methods research, although the time complexity of data manipulation controls in O (1) on RSA tree, but need to apply complicated power-modular operation in the one-way accumulators technology that it adopts, its actual run time is also pessimistic, and RSA tree is dumb when data are inserted, may to cause the reconstruct of the structure of complexity.And based on all have employed simple and hash function efficiently in the verify data structural design of Merkle Hash tree and jumping table, but the time complexity of the data manipulation on them is all O (logn), and Merkle sets the update of not supported data.
In verify data structure in the past, Data Dynamic is upgraded to support it is not very flexible always, and improve one's methods for the major part of data structure, its structure is all confined to the model of initial Merkle Hash tree, namely in leaf node, data are stored and an intermediate node authentication storage information, this structural design makes the work improving data manipulation efficiency run into bottleneck, although equally introduce parameter just like the design of RSA tree can make it have constant height, but this design is in the storage environment of large-scale data, be easy to the reconstruct causing structure, and inapplicable therefore.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, based on the data integrity verification method of SBT in providing a kind of cloud to store, to improve the dirigibility that Data Dynamic upgrades, the storage overhead reducing server, improve the efficiency of data integrity validation.
For achieving the above object, based on the data integrity verification method of SBT during cloud of the present invention stores, it is characterized in that, comprise the following steps:
(1) piecemeal of, outsourcing data
The outsourcing data received from user are carried out piecemeal by trust data source, are divided into n the data block with fixed size by outsourcing data;
(2), SBT (Size Balanced Tree) structure can certification, obtain authentication structures
The full node that structure is set up based on SBT stores tree T, and full node stores tree T and has individual n node, a data block wherein in the corresponding step (1) of each node;
Each node v in tree T is stored for full node, all stores three contents:
1) the data block D of this node, is stored in v;
2), the digest value H of this node data v=h (D v), wherein h is the hash function calculating digest value;
3), digest value H is combined sum(v):
If a) node v is leaf node, then combine digest value H sum(v)=H v;
If b) node v is not leaf node, and only have left child nodes, then combine digest value H sum(v)=h (H v, H sum(left [v])), the wherein left child nodes of left [v] representation node v, H sumthe associating digest value of the left child nodes left [v] of (left [v]) representation node v;
If c) node v is not leaf node, and only have right child nodes, then combine digest value H sum(v)=h (H v, H sum(right [v])), the wherein right child nodes of right [v] representation node v, H sumthe associating digest value of the right child nodes right [v] of (right [v]) representation node v;
If d) node v is not leaf node, and have left and right child nodes concurrently, then combine digest value H sum(v)=h (H v, H sum(left [v]), H sum(right [v]));
Namely the digest value Digest (T) of whole outsourcing data is the associating digest value that full node stores tree T root node;
(3), data integrity validation
First outsourcing data are stored into trust data source by user, trust data source calculates the digest value Digest (T) of outsourcing data according to step (1), (2), and digest value Digest (T) value of these outsourcing data is supplied to user is stored in locality;
Then, outsourcing data and authentication structures transfer to cloud storage service provider to store by trust data source, the insincere server namely in three-party model;
When user send the inquiry of member's data arrive insincere server time, if insincere server stores in tree T at full node do not find the respective objects node v that store target data block 0, then return the user do not found and answer No, terminate checking;
If insincere server stores in tree T at full node and finds the respective objects node v that store target data block 0, then have recorded from destination node v 0to head node v laccessed path path={v 0→ v 1→...→ v l-1→ v l, wherein v 1..., v l-1for the node on the path of path; Now, insincere server is answered Yes to user and is returned corresponding evident information Proof={ η, π 1, π 2..., π l, wherein, η is defined as:
1) if destination node v 0leaf node, then
2) if destination node v 0not leaf node, then:
If a) destination node v 0only has left child nodes, then wherein left [v 0] represent destination node v 0left child nodes, H sum(left [v 0]) represent destination node v 0left child nodes left [v 0] associating digest value;
If b) destination node v 0only has right child nodes, then wherein right [v 0] represent destination node v 0right child nodes, H sum(right [v 0]) represent destination node v 0right child nodes right [v 0] associating digest value;
If c) destination node v 0have left and right child nodes concurrently, then for 1≤i≤l, π ibe defined as follows:
1) if node v i-1for left child nodes, then: its interior joint v i-1for node v ileft child nodes, with node v iright child nodes right [v i] be the brotgher of node;
2) if node v i-1for right child nodes, then: its interior joint vi-1for node v iright child nodes, with node v ileft child nodes left [v i] be the brotgher of node;
When user receives the evident information Proof={ η that insincere server returns, π 1, π 2..., π lafter, carry out following proof procedure:
1), first calculate wherein in the element η of evident information Proof;
If node v 0be leaf node, then verify a=H sum(v 0) whether set up, H sum(v 0) at the element π of evident information Proof 1in;
If node v 0leaf node:
If a) node v 0only have left child nodes, then verify h (a, H sum(left [v 0]))=H sum(v 0) whether set up
If b) node v 0only have right child nodes, then verify h (a, H sum(right [v 0]))=H sum(v 0) whether set up
If c) node v 0have left and right child nodes concurrently, then verify h (a, H sum(left [v 0]), H sum(right [v 0]))=H sum(v 0) whether set up;
2), for π i(1≤i<l), if node v i-1for left child nodes then calculates and verify this value and node v iassociating digest value H sum(v i) whether equal, if node v i-1for right child nodes, then calculate and verify this value and node v iassociating digest value H sum(v i) whether equal, wherein H sum(v i) at π i+1in;
3), for π lif, node v l-1for left child nodes then calculates if node v l-1for right child nodes then calculates and the digest value Digest (T) of the outsourcing data stored before this value and user is compared;
If above all checkings are all set up, then prove that the answer that insincere server returns is correct, namely think that the data block data of institute's inquiry is complete, otherwise user then thinks that this data block data has been tampered or has forged.
Goal of the invention of the present invention is achieved in that
Data integrity verification method based on SBT during cloud of the present invention stores is a kind of data integrity validation scheme based on node size balanced tree.The well balanced property that node size balanced tree has, better can control the height of tree, makes it level off to complete binary tree.And unbalanced tree is when constantly inserting new data, probably degenerate, the height of tree cannot well control, and causes from root node to the path of a certain leafy node very long.Because on binary tree, Data Update is all relevant to the height of tree with the time complexity of inquiry, therefore compared on unbalanced tree, node size balanced tree has very large advantage in the efficiency of data manipulation, and the time dimension of data manipulation can be held in O (log n) by it.Node size balanced tree has good dirigibility in Data Dynamic renewal process, and when storing data in node size balanced tree, is not limited to only be stored in its leaf node, and this can reduce the storage overhead of server to a certain extent.The program, by being combined with hash function by node size balanced tree, designs the efficient verify data structure being suitable for large-scale data and dynamically updating, thus improves the efficiency of data integrity validation.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the three-party model that cloud stores;
Fig. 2 is the process flow diagram based on the data integrity verification method of SBT during cloud of the present invention stores;
Fig. 3 is that the full node that the present invention's structure based on SBT is set up stores a kind of instantiation schematic diagram of tree;
Fig. 4 is evidence Proof generative process figure;
Fig. 5 is that evidence Proof mono-generates example schematic;
Fig. 6 is data integrity validation process instance schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described, so that those skilled in the art understands the present invention better.Requiring particular attention is that, in the following description, when perhaps the detailed description of known function and design can desalinate main contents of the present invention, these are described in and will be left in the basket here.
Fig. 2 is the process flow diagram based on the data integrity verification method of SBT during cloud of the present invention stores.
In the present embodiment, as shown in Figure 2, the data integrity verification method based on SBT during cloud of the present invention stores comprises step S1 ~ S3, and step (1) ~ (3) of corresponding summary of the invention, particular content is identical, does not repeat them here.
Fig. 3 is that the full node that the present invention's structure based on SBT is set up stores a kind of instantiation schematic diagram of tree.
In the present embodiment, the outsourcing data received from user are carried out piecemeal by trust data source, are divided into 6 data blocks with fixed size by outsourcing data; Then, the full node that structure is set up based on SBT stores tree T, and full node stores tree T and has 6 node, wherein each node corresponding a data block, i.e. node v n0~ v n5corresponding data block node v n0for root node.
Store three contents according to each node of method v of step (2), obtain the authentication structures based on SBT as shown in Figure 3, wherein, the associating digest value H of root node sum(v n0) be the digest value Digest (T) of whole outsourcing data.
Fig. 4 is evident information Proof generative process figure.
As shown in Figure 4, first the generation of evident information Proof generates η, then generates π i, until π ltill generation, namely i≤l is false, and terminates.Generative process in its content synchronization rapid (3), does not repeat them here.
In the present embodiment, as shown in Figure 5, wherein, the data block of needs checking is the generation result of evident information Proof path={v n4→ v n1→ v n0, i.e. v n4=v 0, v n1=v 1, v n0=v 2, substitute into step (3) and generate, obtain evident information Proof={ η, π 1, π 2, respective value is:
&eta; = { D v n 4 } ;
&pi; 1 = { H v n 1 , H sum ( v n 3 ) , H sum ( v n 4 ) }
&pi; 2 = { H v n 0 , H sum ( v n 1 ) , H sum ( v n 2 ) }
Fig. 6 is data integrity validation process instance schematic diagram.
In the present embodiment, as shown in Figure 6, first checking is calculated namely whether set up, then to π 1verify, node v i-1i.e. v 0for v n4, be right child nodes, then according to computing formula h ( H v i , H sum ( left [ v i ] ) , H sum ( v i - 1 ) ) ? h ( H v n 1 , H sum ( v n 3 ) , H sum ( v n 4 ) ) , Right H sum ( v n 1 ) = h ( H v n 1 , H sum ( v n 3 ) , H sum ( v n 4 ) ) Verify; Finally to π lchecking, node v l-1i.e. v 1for v n1, left child nodes, then according to computing formula h ( H v l , H sum ( v l - 1 ) , H sum ( right [ v l ] ) ) ? h ( H v n 0 , H sum ( v n 1 ) , H sum ( v n 2 ) ) , Right Digest ( T ) = h ( H v n 0 , H sum ( v n 1 ) , H sum ( v n 2 ) ) Verify, if all set up, then prove data integrity, otherwise authentication failed, prove that data are imperfect, be tampered or forge.
Although be described the illustrative embodiment of the present invention above; so that those skilled in the art understand the present invention; but should be clear; the invention is not restricted to the scope of embodiment; to those skilled in the art; as long as various change to limit and in the spirit and scope of the present invention determined, these changes are apparent, and all innovation and creation utilizing the present invention to conceive are all at the row of protection in appended claim.

Claims (1)

1. cloud store in based on a data integrity verification method of SBT, it is characterized in that, comprise the following steps:
(1) piecemeal of, outsourcing data
The outsourcing data received from user are carried out piecemeal by trust data source, are divided into n the data block with fixed size by outsourcing data;
(2), SBT structure can certification, obtain authentication structures
The full node that structure is set up based on SBT stores tree T, and full node stores tree T and has individual n node, a data block wherein in the corresponding step (1) of each node;
Each node v in tree T is stored for full node, all stores three contents:
1) the data block D of this node, is stored in v;
2), the digest value H of this node data v=h (D v), wherein h is the hash function calculating digest value;
3), digest value H is combined sum(v):
If a) node v is leaf node, then combine digest value H sum(v)=H v;
If b) node v is not leaf node, and only have left child nodes, then combine digest value H sum(v)=h (H v, H sum(left [v])), the wherein left child nodes of left [v] representation node v, H sumthe associating digest value of the left child nodes left [v] of (left [v]) representation node v;
If c) node v is not leaf node, and only have right child nodes, then combine digest value H sum(v)=h (H v, H sum(right [v])), the wherein right child nodes of right [v] representation node v, H sumthe associating digest value of the right child nodes right [v] of (right [v]) representation node v;
If d) node v is not leaf node, and have left and right child nodes concurrently, then combine digest value H sum(v)=h (H v, H sum(left [v]), H sum(right [v]));
Namely the digest value Digest (T) of whole outsourcing data is the associating digest value that full node stores tree T root node;
(3), data integrity validation
First outsourcing data are stored into trust data source by user, trust data source calculates the digest value Digest (T) of outsourcing data according to step (1), (2), and digest value Digest (T) value of these outsourcing data is supplied to user is stored in locality;
Then, outsourcing data and authentication structures transfer to cloud storage service provider to store by trust data source, the insincere server namely in three-party model;
When user send the inquiry of member's data arrive insincere server time, if insincere server stores in tree T at full node do not find the respective objects node v that store target data block 0, then return the user do not found and answer No, terminate checking;
If insincere server stores in tree T at full node and finds the respective objects node v that store target data block 0, then have recorded from destination node v 0to head node v laccessed path path={v 0→ v 1→...→ v l-1→ v l, wherein v 1..., v l-1for the node on the path of path; Now, insincere server is answered Yes to user and is returned corresponding evident information Proof={ η, π 1, π 2..., π l, wherein, η is defined as:
1) if destination node v 0leaf node, then
2) if destination node v 0not leaf node, then:
If a) destination node v 0only has left child nodes, then wherein left [v 0] represent destination node v 0left child nodes, H sum(left [v 0]) represent destination node v 0left child nodes left [v 0] associating digest value;
If b) destination node v 0only has right child nodes, then wherein right [v 0] represent destination node v 0right child nodes, H sum(right [v 0]) represent destination node v 0right child nodes right [v 0] associating digest value;
If c) destination node v 0have left and right child nodes concurrently, then for 1≤i≤l, π ibe defined as follows:
1) if node v i-1for left sibling, then: its interior joint v i-1for node v ileft child nodes, with node v iright child nodes right [v i] be the brotgher of node;
2) if node v i-1for right node, then: its interior joint vi-1for node v iright child nodes, with node v ileft child nodes left [v i] be the brotgher of node;
When user receives the evident information Proof={ η that insincere server returns, π 1, π 2..., π lafter, carry out following proof procedure:
1), first calculate wherein in the element η of evident information Proof;
If node v 0be leaf node, then verify a=H sum(v 0) whether set up, H sum(v 0) at the element π of evident information Proof 1in;
If node v 0leaf node:
If a) node v 0only have left child nodes, then verify h (a, H sum(left [v 0]))=H sum(v 0) whether set up
If b) node v 0only have right child nodes, then verify h (a, H sum(right [v 0]))=H sum(v 0) whether set up
If c) node v 0have left and right child nodes concurrently, then verify h (a, H sum(left [v 0]), H sum(right [v 0]))=H sum(v 0) whether set up;
2), for π i(1≤i<l), if node v i-1for left sibling then calculates and verify this value and node v iassociating digest value H sum(v i) whether equal, if node v i-1for right node then calculates and verify this value and node v iassociating digest value H sum(v i) whether equal, wherein H sum(v i) at π i+1in;
3), for π lif, node v l-1for left sibling then calculates if node v l-1for right node then calculates and the digest value Digest (T) of the outsourcing data stored before this value and user is compared;
If above all checkings are all set up, then prove that the answer that insincere server returns is correct, namely think that the data block data of institute's inquiry is complete, otherwise user then thinks that this data block data has been tampered or has forged.
CN201310185462.0A 2013-05-20 2013-05-20 Based on the data integrity verification method of SBT during a kind of cloud stores Expired - Fee Related CN103279718B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310185462.0A CN103279718B (en) 2013-05-20 2013-05-20 Based on the data integrity verification method of SBT during a kind of cloud stores

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310185462.0A CN103279718B (en) 2013-05-20 2013-05-20 Based on the data integrity verification method of SBT during a kind of cloud stores

Publications (2)

Publication Number Publication Date
CN103279718A CN103279718A (en) 2013-09-04
CN103279718B true CN103279718B (en) 2015-10-21

Family

ID=49062233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310185462.0A Expired - Fee Related CN103279718B (en) 2013-05-20 2013-05-20 Based on the data integrity verification method of SBT during a kind of cloud stores

Country Status (1)

Country Link
CN (1) CN103279718B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716404B (en) * 2013-12-31 2017-02-01 华南理工大学 Remote data integrity authentication data structure in cloud environment and implement method thereof
CN104270448B (en) * 2014-10-09 2017-10-13 青岛大学 Can outsourcing reconstruct electronic medical record privacy sharing cloud storage method
CN107257342A (en) * 2017-06-23 2017-10-17 成都鼎智汇科技有限公司 A kind of data safety processing method based on cloud computing
CN107451281B (en) * 2017-08-08 2020-09-29 东北大学 Outsourcing database SQL query integrity verification system and method based on ADS
CN107483580A (en) * 2017-08-16 2017-12-15 广东工业大学 A kind of dynamic data recording method of cloud storage system and cloud storage system
CN108021505B (en) * 2017-12-05 2021-05-28 百度在线网络技术(北京)有限公司 Data online method and device and computer equipment
CN108304737A (en) * 2018-01-26 2018-07-20 鑫银科技集团股份有限公司 A kind of data verification method, electronic equipment and data verification system
CN109639436A (en) * 2019-01-04 2019-04-16 平安科技(深圳)有限公司 The data property held verification method and terminal device based on salt figure
CN112311833B (en) * 2019-08-01 2023-11-07 北京京东尚科信息技术有限公司 Data updating method and device
CN112069286B (en) * 2020-08-28 2024-01-02 喜大(上海)网络科技有限公司 Dictionary tree parameter updating method, device, equipment and storage medium
CN112989405A (en) * 2021-02-05 2021-06-18 武汉北大高科软件股份有限公司 Trusted storage method, device, equipment and storage medium for data storage certificate

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930185A (en) * 2012-11-28 2013-02-13 中国人民解放军国防科学技术大学 Method and device for verifying integrity of security critical data of program in process of running

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8694467B2 (en) * 2010-03-31 2014-04-08 Xerox Corporation Random number based data integrity verification method and system for distributed cloud storage

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930185A (en) * 2012-11-28 2013-02-13 中国人民解放军国防科学技术大学 Method and device for verifying integrity of security critical data of program in process of running

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
毛剑等.云计算环境下的隐私保护方案.《清华大学学报(自然科学版)》.2011,第51卷(第10期),第1357-1362页. *

Also Published As

Publication number Publication date
CN103279718A (en) 2013-09-04

Similar Documents

Publication Publication Date Title
CN103279718B (en) Based on the data integrity verification method of SBT during a kind of cloud stores
Kim Comparison of the decision tree, artificial neural network, and linear regression methods based on the number and types of independent variables and sample size
CN108711052A (en) A kind of information authentication system based on block chain
CN108234664B (en) A kind of account management method based on cloud service
Pardos et al. Using HMMs and bagged decision trees to leverage rich features of user and skill from an intelligent tutoring system dataset
CN101853190B (en) Data integrity verification method suitable for embedded processor
CN103607405B (en) A kind of cipher text searching authentication method of facing cloud storage
CN106157142A (en) A kind of block chain common recognition and synchronous method, system and device
CN107145537A (en) A kind of list data introduction method and system
CN109088719B (en) Outsourced database multi-key word can verify that cipher text searching method, data processing system
CN108009445A (en) A kind of trust data management system of half centralization
Hossain et al. Blockchain for the security of internet of things: A smart home use case using ethereum
CN107220333A (en) A kind of chracter search method based on Sunday algorithms
Zhu et al. Enabling generic verifiable aggregate query on blockchain systems
CN103631714A (en) Method for generating minimum combination testing cases based on matrix multiplicity
CN103716404B (en) Remote data integrity authentication data structure in cloud environment and implement method thereof
CN113220881B (en) Deep learning-based education question-answering implementation method, device and server
US20220278858A1 (en) Ledger verifiable-pruning system
CN104618344B (en) Label ownership conversion method in rfid system based on lightweight collection of functions
CN113824703A (en) Energy system control method based on block chain and energy system
Wang et al. A Reliability-oriented Evolution Method of Software Architecture Based on Contribution Degree of Component.
Yuan et al. Scalable training of sparse linear svms
CN104123349B (en) A kind of method extracted based on correlation knowledge feature
Feng IoT data sharing technology based on blockchain and federated learning algorithms
CN116522353A (en) Encryption method and risk prediction method for security asset risk prediction data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151021

Termination date: 20190520

CF01 Termination of patent right due to non-payment of annual fee