CN103699851B - A kind of teledata integrity verification method of facing cloud storage - Google Patents

A kind of teledata integrity verification method of facing cloud storage Download PDF

Info

Publication number
CN103699851B
CN103699851B CN201310601738.9A CN201310601738A CN103699851B CN 103699851 B CN103699851 B CN 103699851B CN 201310601738 A CN201310601738 A CN 201310601738A CN 103699851 B CN103699851 B CN 103699851B
Authority
CN
China
Prior art keywords
user
tpa
proof
cloud storage
equation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310601738.9A
Other languages
Chinese (zh)
Other versions
CN103699851A (en
Inventor
夏莹杰
夏伏彪
刘雪娇
王贵林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yuantiao Science And Technology Co ltd
Original Assignee
Hangzhou Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Normal University filed Critical Hangzhou Normal University
Priority to CN201310601738.9A priority Critical patent/CN103699851B/en
Publication of CN103699851A publication Critical patent/CN103699851A/en
Application granted granted Critical
Publication of CN103699851B publication Critical patent/CN103699851B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Abstract

The present invention proposes a kind of teledata integrity verification method of facing cloud storage, utilize aggregate signature, specify reference's signature technology, realize user and the authentication function of third party auditor to user data integrality, ensured that the information that user is used for data integrity is not revealed simultaneously; Realized the transparency control of authorization information by zero-knowledge proof technology, in the time of user and server generation dispute, third party auditor can be by a kind of noninteractive zero-knowledge proof technology, and producing undeniable high confidence level proves. The advantages such as the present invention, in the incredible situation of cloud storage service provider, also can ensure the accuracy of cloud data integrity checking, has and is easy to realize, and cost is low, and data protection is strong, supports third party's audit, and Privacy Preservation Mechanism is flexible.

Description

A kind of teledata integrity verification method of facing cloud storage
Technical field
The present invention relates to a kind of teledata integrity verification method of facing cloud storage, be specifically related to according to data integrity checking,Specify reference's signature and zero-knowledge proof theory, for the data in cloud storage provide safe and efficient, support common authentication, the 3rdSide verifies and has the integrity verification method of secret protection, belongs to field of information security technology.
Background technology
The data, services outsourcing of cloud computing can reduce the storage and maintenance pressure of data owner this locality, but use is being given in cloud computingWhen family offers convenience, also for user data has brought new security challenge. Because user has lost data reliability and peaceThe physical control of full property, the data integrity in cloud storage becomes one of safety problem of user's worry. Due to large-scale data instituteThe huge communication cost causing, user verifies its correctness after can not downloading data to this locality again. Therefore, how to ensure cloudThe safety of data in server, how helping user to carry out data integrity checking just becomes a study hotspot.
Find by prior art documents, realize the method for data integrity checking mainly based on digital signature (DigitalAnd Mei Keer Hash tree (MerkleHashTree) Signatures). Typical work comprises: data restorability proves (ProofsofRetrievability, POR) and provable data have (ProvableDataPossession, PDP). Shacham and Waters2008Year is being published in " The14thInternationalConferenceontheTheoryandApplicationo fCryptologyandInformationSecurity (the 14th cryptography and Information Security Theory and application international conference) " paper " CompactProofsOfRetrievability (compact restorability prove) " in proposed a kind of general compact restorability and proved model, this modelBased on the general thoughts of data fragmentation technology, use mathematical homomorphism character, the proof forming for t challenge piece, Neng GouThis proof of polymerization under O (t) computational complexity, generates an O (1) length authentication value. The people such as Wang were published in " The in 200914thEuropeanSymposiumonResearchinComputerSecurity (beg for by the 14th European computer security Journal of Sex ResearchOpinion annual meeting) " paper " EnablingPublicVerifiabilityandDataDynamicsforStorageSecu rityinCloudIn Computing(cloud computing, there is the method for secure storing of open checking and Data Dynamic " in proposed a kind of to recognize in conjunction with homomorphismCard and Mei Keer Hash tree (MHT), the storage means of the open checking of support and Data Dynamic under cloud computing environment. ButIn these schemes, assailant still likely utilizes open indentification protocol to collect abundant information, cracks out data, causes numberAccording to possessory leakage of data. Therefore these schemes exist the risk of information leakage, are not suitable for practical engineering application.
Summary of the invention
The present invention will overcome the deficiencies in the prior art, provides a kind of based on specifying reference's endorsement method and zero-knowledge proof technological sideTo the teledata integrity verification method of cloud storage, signer adopts undeniable digital signature, but in compute signatureCombine reference's PKI, checking must just can be carried out under signer or appointment reference's cooperation, strengthens signer notFalsifiability, in, the complicated Practical Project such as server is unreliable large at number of users, ensures user's remote validation cloud dataIntegrality, supported data dynamically updates, discloses checking, third-party authentication, protection privacy of user.
For achieving the above object, first the present invention carries out system initialization, and user (User, U) uses Reed-Solomon to encode willStored file division is several data blocks. User proposes file by " challenge-response " pattern in cloud storage serverThe request of integrity verification. Cloud storage server (CloudStorageServer, CSS), according to the data block being arrived by selective examination, generates oneIndividual message aggregation and about the appointment reference signature of this message aggregation adds the information of root node simultaneously, and generating a user canThe data integrity of directly calculating proves. Whether user carries out certain calculating to this proof can verify stored data fileDamaged to some extent. Meanwhile, because signing, the appointment reference who generates embedded third party auditor (ThirdPartyAuditor, TPA)PKI, third party auditor also can carry out to this data integrity the calculating checking of equal extent. On the other hand, for anti-Only user misapplies/abuses data integrity information, and third party auditor is where necessary for data integrity proves to provide a nonreciprocalThe zero-knowledge proof of formula, anyone can verify that this zero-knowledge proof is to know data integrity information, reach effective protection andControl flexibly the object of user authentication data integrity information.
Method of the present invention realizes by following concrete steps:
1 system initialization
System is moved bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two rank and isThe Bilinear Groups G of prime number q, Gt, g is generator e:G × G → G of crowd GtFor bilinearity is to computing, a safety of definitionHash function H:{0,1}*→G。
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1·m2,...,mn) wherein
2 systems generate key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKIForSimilarly, system is that third party auditor TPA generates private key: random numberCorresponding publicKey is y TPA = g x TPA .
3 user's storage files
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value(homomorphicauthenticator):As the metadata of file. The homomorphism certification of all data blocksValue can be gathered into label value: a φ={ σi},1≤i≤n。
User adopts Merkle Hash tree by each block data structure, and wherein the leaf node of the bottom has been stored corresponding number in an orderly mannerAccording to the cryptographic Hash of piece, inferior bottom layer node is the cryptographic Hash of every two cryptographic Hash, and step-by-step recursion constructs a binary tree, root thusThe cryptographic Hash that node is corresponding final. Root node R is signed simultaneouslyUser U is by { F, φ, σRSend toCloud storage server CSS.
4 general integrity verifications
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, first to generate one group of challenge information. This challenge information is by usingFamily U selects some random elements: I={s1,...,sc},s1≤i≤sc, wherein siRepresent i data block miIndex. RightIn each si∈ I, U chooses a random numberFinally, U is by challenge informationSendGive cloud storage server CSS.
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
ζ i = y TPA r i , μ i = σ i · g r i , ζ = Π i = s 1 s c ζ i , μ = Π i = s 1 s c μ i , θ = Σ i s c m i - - - ( 1 )
Meanwhile, CSS also can offer one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i leaf node (storedH(mi)) to the set of all brotghers of node on the path of root node R. Finally, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, (ζ, μ) is the appointment reference signature about θ.
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R.Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If equation does not becomeVertical, U this proof that refuses inspection of books, and export failure information. If above-mentioned equation is set up, the following equation of U continuation calculating isNo establishment:
e ( μ , y TPA ) ≡ e ( ζ , g ) · e ( Π i = s 1 s c H ( m i ) · u θ , y TPA ) x U - - - ( 3 )
If above-mentioned equation is set up, this checking passes through. If equation is false, export failure information.
5 undeniable integrity verifications
When there is when dispute, third party auditor TPA can participate in integrity verification procedures, and provides non-repudiationProve eventually. After TPA receives the proof P that CSS cloud storage server sends, first utilize { H (mi)}{ΩiGeneration rootNode R. Then pass through calculation equation e, (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If etc.Formula is false, TPA this proof that refuses inspection of books, and export failure information 0. Otherwise TPA continues whether to calculate following equationSet up:
e ( μ , y TPA ) ≡ e ( ζ , g ) · e ( Π i = s 1 s c H ( m i ) · u θ , y U ) x TPA - - - ( 4 )
If above-mentioned equation is set up, this checking passes through, otherwise checking failure, output failure information 1. According to testingCard result generates undeniable proof.
If the verification passes, illustrate that proof is errorless, TPA exports one section of noninteractive zero-knowledge proof π1, with prove two fromThe loose equal relation of logarithm.
If checking is not passed through, export failure information 1, TPA is by { H (mi)}{ΩiThis part information is directly open, fromAnd anyone can verify this conclusion, and export one section of noninteractive zero-knowledge proof π2, to prove not phase of two discrete logarithmsDeng relation. For above-mentioned noninteractive zero-knowledge proof, anyone can be verified by simple calculating.
Remarkable result of the present invention is, for the needs of the integrity verification of subscriber data file in cloud storage, to utilize aggregate signatureWith appointment reference signature technology, realize general user and the authentication function of third party auditor to user data integrality,Realized the protection control of authorization information simultaneously by zero-knowledge proof technology, had and be easy to realize, data protection is strong, can spiritThe advantages such as control information transparency alive. The present invention, under the incredible prerequisite of cloud storage service provider, ensures under cloud storage environmentThe accuracy of data integrity checking, the checking cost of reduction user side.
Brief description of the drawings
Fig. 1 structure chart of the present invention.
Fig. 2 zero-knowledge proof process schematic diagram.
Specific implementation method
Below in conjunction with drawings and Examples, technical scheme of the present invention is described in further detail. Following examples are with the present inventionTechnical scheme is to implement under prerequisite, provided detailed embodiment and process, but protection scope of the present invention is not limited to downThe embodiment stating.
The method proposing in order to understand better the present embodiment, choose under a cloud storage environment user U to it in cloud stores serviceThe data integrity checking event of the file of the upper storage of device CSS.
As shown in the inventive method structure chart (Fig. 1), the concrete implementation step of the present embodiment is as follows:
1 system initialization
System is moved bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two rank and isThe Bilinear Groups G of prime number q, Gt, g is the generator of crowd G, e:G × G → GtFor bilinearity is to computing, a safety of definitionHash function H:{0,1}*→G。
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1,m2,...,mn), wherein
2 systems generate key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKIForSimilarly, system is that third party auditor TPA generates private key: random numberCorresponding publicKey is y TPA = g x TPA .
3 user's storage files
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value(homomorphicauthenticator):As the metadata of file. The homomorphism certification of all data blocksValue can be gathered into label value: a φ={ σi},1≤i≤n。
User adopts Merkle Hash tree by each block data structure, and wherein the leaf node of the bottom has been stored corresponding number in an orderly mannerAccording to the cryptographic Hash of piece, inferior bottom layer node is the cryptographic Hash of every two cryptographic Hash, and step-by-step recursion constructs a binary tree, root thusThe cryptographic Hash that node is corresponding final. Root node R is signed simultaneouslyUser U is by { F, φ, σRSend toCloud storage server CSS.
4 general integrity verifications
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, first to generate one group of challenge information. This challenge information is by usingFamily U selects some random elements: I={s1,...,sc},s1≤i≤sc, wherein siRepresent i data block miIndex. RightIn each si∈ I, U chooses a random numberFinally, U is by challenge informationSendGive cloud storage server CSS.
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
ζ i = y TPA r i , μ i = σ i · g r i , ζ = Π i = s 1 s c ζ i , μ = Π i = s 1 s c μ i , θ = Σ i s c m i - - - ( 1 )
Meanwhile, CSS also can offer one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i leaf node (storedH(mi)) to the set of all brotghers of node on the path of root node R. Finally, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, and (ζ, μ) is the appointment reference signature about θ.
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R.Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If equation does not becomeVertical, U this proof that refuses inspection of books, and export failure information. If above-mentioned equation is set up, the following equation of U continuation calculating isNo establishment:
e ( μ , y TPA ) ≡ e ( ζ , g ) · e ( Π i = s 1 s c H ( m i ) · u θ , y TPA ) x U - - - ( 3 )
If above-mentioned equation is set up, this checking passes through. If above-mentioned equation is false, export failure information.
5 undeniable integrity verifications
Suppose in 4.3 that user U is to equation e (σ R, g) ≡ e (H (R), yU) be verified, and the checking of equation (3) is not passed through,But cloud storage server CSS denies this result, do not admit that the file F that user U stores has suffered to distort. For thisDispute, third party auditor TPA can participate in integrity verification procedures, and provides undeniable final certification. TPAAfter receiving the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R. Then pass throughCalculation equation e (σ R, g) ≡ e (H (R), yU) whether set up, verify whether R value is tampered. If R value is tampered, refusal is testedDemonstrate,prove this proof, and export failure information 0. If R value is not tampered, TPA continues to calculate following equation:
e ( μ , y TPA ) ≡ e ( ζ , g ) · e ( Π i = s 1 s c H ( m i ) · u θ , y U ) x TPA - - - ( 4 )
If equation is set up, show to be verified, prove errorlessly, TPA exports one section of noninteractive zero-knowledge proof π1, withProve two relations that discrete logarithm is equal.
If equation is not set up, show to verify and do not pass through, TPA finally exports failure information 1, generates undeniable card simultaneouslyBright. TPA exports one section of noninteractive zero-knowledge proof π2, to prove two unequal relations of discrete logarithm. OrderW1=e(μ,yTPA)/e(ζ,g),Noninteractive zero-knowledge proof π2To adoptFiat-Shamir heuristic is by one section of interactive proof:TurnChange and form (with reference to figure bis-). Finally, TPA only need to be by (A, A ', the z that obtain after calculating1,z2,z′1,z′2,c1,c2,d1,d2,d′1,d′2)Value sends to any people who needs verification.

Claims (1)

1. a teledata integrity verification method for facing cloud storage, is characterized in that comprising the following steps:
Step 1, system initialization
System operation bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two Bilinear Groups G that rank are prime number q, Gt, g is the generator of crowd G, e:G × G → GtFor bilinearity is to computing, the Hash function H:{0 of a safety of definition, 1}*→G;
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1,m2,...,mn), wherein
Step 2, system generates key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKI is yU=gxU; System is that third party auditor TPA generates private key: random numberCorresponding PKI is yTPA=gxTPA
Step 3, user's storage file
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value (homomorphicauthenticator):As the metadata of file, the homomorphism authentication value of all data blocks can be gathered into label value: a Φ={ σi},1≤i≤n;
User adopts Merkle Hash tree by each block data structure, root node R is signed simultaneouslyBy { F, Φ, σRSend to cloud storage server CSS;
Step 4, general integrity verification
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, generate one group of challenge informationSend to cloud storage server CSS, wherein I={s1,...,sc},s1≤i≤sc, for each si∈I,siRepresent i data block miIndex, random number
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
Meanwhile, CSS offers one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i has been stored H (mi) leaf node to the set of all brotghers of node on the path of root node R, last, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, and (ζ, μ) is the appointment reference signature about θ;
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R; Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered; If equation is false, U this proof that refuses inspection of books, and export failure information; If above-mentioned equation is set up, whether the following equation of U continuation calculating is set up:
If above-mentioned equation is set up, this checking passes through;
Step 5, undeniable integrity verification
In the time there is dispute, third party auditor TPA can participate in integrity verification procedures, and provides undeniable final certification; After TPA receives the proof P that CSS cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R; Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered; If equation is false, TPA this proof that refuses inspection of books, and export failure information 0; Otherwise whether TPA continues to calculate following equation and sets up:
If above-mentioned equation is set up, this checking passes through, otherwise checking failure, output failure information 1; Need to generate undeniable proof time, first TPA calls above-mentioned TPA verification algorithm; If the verification passes, illustrate that proof is errorless, TPA exports one section of noninteractive zero-knowledge proof π1, to prove two relations that discrete logarithm is equal;
If checking is not passed through, exported failure information 0, and TPA is by { H (mi)}{ΩiThis part information is directly open, thereby anyone can release the conclusion that checking is not passed through; If TPA output is failure information 1, one section of noninteractive zero-knowledge proof π of its output2, to prove two unequal relations of discrete logarithm; For above-mentioned noninteractive zero-knowledge proof, anyone can be verified by simple calculating.
CN201310601738.9A 2013-11-22 2013-11-22 A kind of teledata integrity verification method of facing cloud storage Expired - Fee Related CN103699851B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310601738.9A CN103699851B (en) 2013-11-22 2013-11-22 A kind of teledata integrity verification method of facing cloud storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310601738.9A CN103699851B (en) 2013-11-22 2013-11-22 A kind of teledata integrity verification method of facing cloud storage

Publications (2)

Publication Number Publication Date
CN103699851A CN103699851A (en) 2014-04-02
CN103699851B true CN103699851B (en) 2016-05-25

Family

ID=50361375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310601738.9A Expired - Fee Related CN103699851B (en) 2013-11-22 2013-11-22 A kind of teledata integrity verification method of facing cloud storage

Country Status (1)

Country Link
CN (1) CN103699851B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357701A (en) * 2016-11-25 2017-01-25 西安电子科技大学 Integrity verification method for data in cloud storage
CN108923932A (en) * 2018-07-10 2018-11-30 东北大学 A kind of decentralization co-verification model and verification algorithm

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015175729A1 (en) * 2014-05-13 2015-11-19 Dennis Quan Systems and methods for managing, sharing, and organizing information stored on multiple cloud services
US10447696B2 (en) 2014-05-16 2019-10-15 Nec Corporation Method for proving retrievability of information
CN104618419A (en) * 2014-08-02 2015-05-13 江苏物泰信息科技有限公司 Scheme based on content sharing policy in cloud
CN104216994B (en) * 2014-09-10 2017-06-20 华中科技大学 A kind of method for secret protection of contingency table data publication
CN104408381B (en) * 2014-11-27 2017-04-12 大连理工大学 Protection method of data integrity in cloud storage
CN104486311B (en) * 2014-12-04 2017-11-03 东南大学 A kind of remote data integrity inspection method for supporting scalability
CN104580487A (en) * 2015-01-20 2015-04-29 成都信升斯科技有限公司 Mass data storage system and processing method
CN104881615B (en) * 2015-06-08 2017-12-15 武汉大学 A kind of efficient secret protection ciphertext connected reference operation demonstration method under cloud environment
CN104899525A (en) * 2015-06-12 2015-09-09 电子科技大学 Cloud data integrity proving scheme with improved dynamic operations
CN106708648B (en) * 2015-07-14 2019-11-26 阿里巴巴集团控股有限公司 A kind of the storage method of calibration and system of text data
CN105162803A (en) * 2015-09-30 2015-12-16 深圳市金城保密技术有限公司 Safe information output method and safe information output system of secret-relating network
CN106611134A (en) * 2016-06-06 2017-05-03 四川用联信息技术有限公司 Cloud data integrity verification method
CN106612272A (en) * 2016-07-12 2017-05-03 四川用联信息技术有限公司 Verification and recovery algorithm for data tampering in cloud storage
CN106612325A (en) * 2016-07-21 2017-05-03 四川用联信息技术有限公司 Method for data authenticity verification under authority management in cloud storage
CN106612274A (en) * 2016-07-25 2017-05-03 四川用联信息技术有限公司 Homogeneity-based shared data verification algorithm in cloud computing
CN106612174A (en) * 2016-08-26 2017-05-03 四川用联信息技术有限公司 Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing
CN106341232B (en) * 2016-09-18 2019-04-09 中国科学院软件研究所 A kind of anonymous entity discrimination method based on password
CN107395355B (en) * 2017-06-12 2020-12-11 广东工业大学 Cloud storage data integrity verification method based on implicit trusted third party
CN107172071B (en) * 2017-06-19 2020-06-23 陕西师范大学 Attribute-based cloud data auditing method and system
CN107257342A (en) * 2017-06-23 2017-10-17 成都鼎智汇科技有限公司 A kind of data safety processing method based on cloud computing
CN107612969B (en) * 2017-08-16 2020-01-14 中国民航大学 B-Tree bloom filter-based cloud storage data integrity auditing method
CN107682379A (en) * 2017-11-22 2018-02-09 南京汽车集团有限公司 Safe information transmission device, transmission method and storage method based on homomorphic cryptography
CN108616497A (en) * 2018-01-03 2018-10-02 中电长城网际系统应用有限公司 Data integrity verification method and system, terminal and authentication server under cloud environment
CN108965258B (en) * 2018-06-21 2021-07-16 河南科技大学 Cloud environment data integrity verification method based on fully homomorphic encryption
CN108985102A (en) * 2018-06-22 2018-12-11 中国电子科技集团公司电子科学研究院 Data integrity verification method, device, system and storage medium
CN109002365A (en) * 2018-07-09 2018-12-14 广州大学 A kind of intelligent body and message-oriented middleware communication data Verification System
US10877672B2 (en) 2018-07-31 2020-12-29 International Business Machines Corporation Auditing stored data slices in a dispersed storage network
CN109391621B (en) * 2018-10-24 2021-07-06 电子科技大学 Public cloud storage data integrity checking method based on block chain
CN109639420B (en) * 2019-01-02 2021-05-25 西南石油大学 Medical cloud storage public auditing method capable of anonymizing identity based on block chain technology
CN109951296B (en) * 2019-03-05 2020-12-08 北京邮电大学 Remote data integrity verification method based on short signature
CN110677487B (en) * 2019-09-30 2022-04-26 中科柏诚科技(北京)股份有限公司 Outsourcing data duplicate removal cloud storage method supporting privacy and integrity protection
CN111259454B (en) * 2020-01-10 2022-07-05 山东师范大学 Non-interactive data integrity auditing method, fair payment method and system
CN111339572A (en) * 2020-03-04 2020-06-26 鹏城实验室 Method and system for verifying integrity of cloud data, terminal device and storage medium
CN112182662A (en) * 2020-09-09 2021-01-05 北京科技大学 Agile development cloud platform-oriented data integrity verification method and system
CN113395691B (en) * 2021-07-05 2023-04-25 西安工程大学 Contact tracking privacy protection method based on aggregated signature

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355351A (en) * 2011-07-21 2012-02-15 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
CN202663444U (en) * 2012-06-29 2013-01-09 上海海事大学 Cloud safety data migration model
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN103268460A (en) * 2013-06-20 2013-08-28 北京航空航天大学 Integrity verification method of cloud storage data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355351A (en) * 2011-07-21 2012-02-15 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN202663444U (en) * 2012-06-29 2013-01-09 上海海事大学 Cloud safety data migration model
CN103268460A (en) * 2013-06-20 2013-08-28 北京航空航天大学 Integrity verification method of cloud storage data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing;Qian Wang et al.;《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》;20110531;第22卷(第5期);全文 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357701A (en) * 2016-11-25 2017-01-25 西安电子科技大学 Integrity verification method for data in cloud storage
CN106357701B (en) * 2016-11-25 2019-03-26 西安电子科技大学 The integrity verification method of data in cloud storage
CN108923932A (en) * 2018-07-10 2018-11-30 东北大学 A kind of decentralization co-verification model and verification algorithm
CN108923932B (en) * 2018-07-10 2020-12-11 东北大学 Decentralized collaborative verification system and verification method

Also Published As

Publication number Publication date
CN103699851A (en) 2014-04-02

Similar Documents

Publication Publication Date Title
CN103699851B (en) A kind of teledata integrity verification method of facing cloud storage
CN104811450B (en) The date storage method and integrity verification method of a kind of identity-based in cloud computing
CN108551392B (en) Blind signature generation method and system based on SM9 digital signature
CN103546567B (en) Without certificate cross-domain authentication method in a kind of credible cloud computing environment
CN108809658A (en) A kind of digital signature method and system of the identity base based on SM2
CN103765809B (en) The public key of implicit authentication
CN101562524B (en) Digital signature method based on identity
CN109583893B (en) Traceable block chain-based digital currency transaction system
CN104601605A (en) Efficient privacy protection auditing scheme based on chameleon hash function in cloud storage
CN102983971B (en) Certificateless signature algorithm for user identity authentication in network environment
CN103746811B (en) Anonymous signcryption method from identity public key system to certificate public key system
CN106357701A (en) Integrity verification method for data in cloud storage
CN104811300A (en) Secret key updating method for cloud storage and implementation method of cloud data auditing system
CN104023044A (en) Cloud-storage data lightweight-level public auditing method with privacy protection
CN103733564A (en) Digital signatures with implicit certificate chains
CN111010272B (en) Identification private key generation and digital signature method, system and device
CN106487786B (en) Cloud data integrity verification method and system based on biological characteristics
CN106789033B (en) Electronic contract signing method based on certificateless bookmark encryption
CN106936584B (en) Method for constructing certificateless public key cryptosystem
CN102970144B (en) The authentication method of identity-based
CN104901804A (en) User autonomy-based identity authentication implementation method
CN107864037A (en) SM9 Combination with Digital endorsement method and device
CN104184588A (en) Undetachable digital signature method based on identity
CN112436938B (en) Digital signature generation method and device and server
CN102883321A (en) Digital signature authentication method facing mobile widget

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210804

Address after: Room 1603, building 3, 1217 Wenyi West Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Yuantiao Science and Technology Co.,Ltd.

Address before: Hangzhou City, Zhejiang province 310036 Xiasha Higher Education Park forest Street No. 16

Patentee before: Hangzhou Normal University

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160525

CF01 Termination of patent right due to non-payment of annual fee