CN103699851B - A kind of teledata integrity verification method of facing cloud storage - Google Patents
A kind of teledata integrity verification method of facing cloud storage Download PDFInfo
- Publication number
- CN103699851B CN103699851B CN201310601738.9A CN201310601738A CN103699851B CN 103699851 B CN103699851 B CN 103699851B CN 201310601738 A CN201310601738 A CN 201310601738A CN 103699851 B CN103699851 B CN 103699851B
- Authority
- CN
- China
- Prior art keywords
- user
- tpa
- proof
- cloud storage
- equation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012795 verification Methods 0.000 title claims abstract description 25
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000007689 inspection Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 8
- 238000013475 authorization Methods 0.000 abstract description 2
- 238000012550 audit Methods 0.000 abstract 1
- 238000004321 preservation Methods 0.000 abstract 1
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- MJBPUQUGJNAPAZ-AWEZNQCLSA-N butin Chemical compound C1([C@@H]2CC(=O)C3=CC=C(C=C3O2)O)=CC=C(O)C(O)=C1 MJBPUQUGJNAPAZ-AWEZNQCLSA-N 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- MJBPUQUGJNAPAZ-UHFFFAOYSA-N Butine Natural products O1C2=CC(O)=CC=C2C(=O)CC1C1=CC=C(O)C(O)=C1 MJBPUQUGJNAPAZ-UHFFFAOYSA-N 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000006116 polymerization reaction Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Abstract
The present invention proposes a kind of teledata integrity verification method of facing cloud storage, utilize aggregate signature, specify reference's signature technology, realize user and the authentication function of third party auditor to user data integrality, ensured that the information that user is used for data integrity is not revealed simultaneously; Realized the transparency control of authorization information by zero-knowledge proof technology, in the time of user and server generation dispute, third party auditor can be by a kind of noninteractive zero-knowledge proof technology, and producing undeniable high confidence level proves. The advantages such as the present invention, in the incredible situation of cloud storage service provider, also can ensure the accuracy of cloud data integrity checking, has and is easy to realize, and cost is low, and data protection is strong, supports third party's audit, and Privacy Preservation Mechanism is flexible.
Description
Technical field
The present invention relates to a kind of teledata integrity verification method of facing cloud storage, be specifically related to according to data integrity checking,Specify reference's signature and zero-knowledge proof theory, for the data in cloud storage provide safe and efficient, support common authentication, the 3rdSide verifies and has the integrity verification method of secret protection, belongs to field of information security technology.
Background technology
The data, services outsourcing of cloud computing can reduce the storage and maintenance pressure of data owner this locality, but use is being given in cloud computingWhen family offers convenience, also for user data has brought new security challenge. Because user has lost data reliability and peaceThe physical control of full property, the data integrity in cloud storage becomes one of safety problem of user's worry. Due to large-scale data instituteThe huge communication cost causing, user verifies its correctness after can not downloading data to this locality again. Therefore, how to ensure cloudThe safety of data in server, how helping user to carry out data integrity checking just becomes a study hotspot.
Find by prior art documents, realize the method for data integrity checking mainly based on digital signature (DigitalAnd Mei Keer Hash tree (MerkleHashTree) Signatures). Typical work comprises: data restorability proves (ProofsofRetrievability, POR) and provable data have (ProvableDataPossession, PDP). Shacham and Waters2008Year is being published in " The14thInternationalConferenceontheTheoryandApplicationo fCryptologyandInformationSecurity (the 14th cryptography and Information Security Theory and application international conference) " paper " CompactProofsOfRetrievability (compact restorability prove) " in proposed a kind of general compact restorability and proved model, this modelBased on the general thoughts of data fragmentation technology, use mathematical homomorphism character, the proof forming for t challenge piece, Neng GouThis proof of polymerization under O (t) computational complexity, generates an O (1) length authentication value. The people such as Wang were published in " The in 200914thEuropeanSymposiumonResearchinComputerSecurity (beg for by the 14th European computer security Journal of Sex ResearchOpinion annual meeting) " paper " EnablingPublicVerifiabilityandDataDynamicsforStorageSecu rityinCloudIn Computing(cloud computing, there is the method for secure storing of open checking and Data Dynamic " in proposed a kind of to recognize in conjunction with homomorphismCard and Mei Keer Hash tree (MHT), the storage means of the open checking of support and Data Dynamic under cloud computing environment. ButIn these schemes, assailant still likely utilizes open indentification protocol to collect abundant information, cracks out data, causes numberAccording to possessory leakage of data. Therefore these schemes exist the risk of information leakage, are not suitable for practical engineering application.
Summary of the invention
The present invention will overcome the deficiencies in the prior art, provides a kind of based on specifying reference's endorsement method and zero-knowledge proof technological sideTo the teledata integrity verification method of cloud storage, signer adopts undeniable digital signature, but in compute signatureCombine reference's PKI, checking must just can be carried out under signer or appointment reference's cooperation, strengthens signer notFalsifiability, in, the complicated Practical Project such as server is unreliable large at number of users, ensures user's remote validation cloud dataIntegrality, supported data dynamically updates, discloses checking, third-party authentication, protection privacy of user.
For achieving the above object, first the present invention carries out system initialization, and user (User, U) uses Reed-Solomon to encode willStored file division is several data blocks. User proposes file by " challenge-response " pattern in cloud storage serverThe request of integrity verification. Cloud storage server (CloudStorageServer, CSS), according to the data block being arrived by selective examination, generates oneIndividual message aggregation and about the appointment reference signature of this message aggregation adds the information of root node simultaneously, and generating a user canThe data integrity of directly calculating proves. Whether user carries out certain calculating to this proof can verify stored data fileDamaged to some extent. Meanwhile, because signing, the appointment reference who generates embedded third party auditor (ThirdPartyAuditor, TPA)PKI, third party auditor also can carry out to this data integrity the calculating checking of equal extent. On the other hand, for anti-Only user misapplies/abuses data integrity information, and third party auditor is where necessary for data integrity proves to provide a nonreciprocalThe zero-knowledge proof of formula, anyone can verify that this zero-knowledge proof is to know data integrity information, reach effective protection andControl flexibly the object of user authentication data integrity information.
Method of the present invention realizes by following concrete steps:
1 system initialization
System is moved bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two rank and isThe Bilinear Groups G of prime number q, Gt, g is generator e:G × G → G of crowd GtFor bilinearity is to computing, a safety of definitionHash function H:{0,1}*→G。
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1·m2,...,mn) wherein
2 systems generate key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKIForSimilarly, system is that third party auditor TPA generates private key: random numberCorresponding publicKey is
3 user's storage files
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value(homomorphicauthenticator):As the metadata of file. The homomorphism certification of all data blocksValue can be gathered into label value: a φ={ σi},1≤i≤n。
User adopts Merkle Hash tree by each block data structure, and wherein the leaf node of the bottom has been stored corresponding number in an orderly mannerAccording to the cryptographic Hash of piece, inferior bottom layer node is the cryptographic Hash of every two cryptographic Hash, and step-by-step recursion constructs a binary tree, root thusThe cryptographic Hash that node is corresponding final. Root node R is signed simultaneouslyUser U is by { F, φ, σRSend toCloud storage server CSS.
4 general integrity verifications
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, first to generate one group of challenge information. This challenge information is by usingFamily U selects some random elements: I={s1,...,sc},s1≤i≤sc, wherein siRepresent i data block miIndex. RightIn each si∈ I, U chooses a random numberFinally, U is by challenge informationSendGive cloud storage server CSS.
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
Meanwhile, CSS also can offer one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i leaf node (storedH(mi)) to the set of all brotghers of node on the path of root node R. Finally, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, (ζ, μ) is the appointment reference signature about θ.
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R.Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If equation does not becomeVertical, U this proof that refuses inspection of books, and export failure information. If above-mentioned equation is set up, the following equation of U continuation calculating isNo establishment:
If above-mentioned equation is set up, this checking passes through. If equation is false, export failure information.
5 undeniable integrity verifications
When there is when dispute, third party auditor TPA can participate in integrity verification procedures, and provides non-repudiationProve eventually. After TPA receives the proof P that CSS cloud storage server sends, first utilize { H (mi)}{ΩiGeneration rootNode R. Then pass through calculation equation e, (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If etc.Formula is false, TPA this proof that refuses inspection of books, and export failure information 0. Otherwise TPA continues whether to calculate following equationSet up:
If above-mentioned equation is set up, this checking passes through, otherwise checking failure, output failure information 1. According to testingCard result generates undeniable proof.
If the verification passes, illustrate that proof is errorless, TPA exports one section of noninteractive zero-knowledge proof π1, with prove two fromThe loose equal relation of logarithm.
If checking is not passed through, export failure information 1, TPA is by { H (mi)}{ΩiThis part information is directly open, fromAnd anyone can verify this conclusion, and export one section of noninteractive zero-knowledge proof π2, to prove not phase of two discrete logarithmsDeng relation. For above-mentioned noninteractive zero-knowledge proof, anyone can be verified by simple calculating.
Remarkable result of the present invention is, for the needs of the integrity verification of subscriber data file in cloud storage, to utilize aggregate signatureWith appointment reference signature technology, realize general user and the authentication function of third party auditor to user data integrality,Realized the protection control of authorization information simultaneously by zero-knowledge proof technology, had and be easy to realize, data protection is strong, can spiritThe advantages such as control information transparency alive. The present invention, under the incredible prerequisite of cloud storage service provider, ensures under cloud storage environmentThe accuracy of data integrity checking, the checking cost of reduction user side.
Brief description of the drawings
Fig. 1 structure chart of the present invention.
Fig. 2 zero-knowledge proof process schematic diagram.
Specific implementation method
Below in conjunction with drawings and Examples, technical scheme of the present invention is described in further detail. Following examples are with the present inventionTechnical scheme is to implement under prerequisite, provided detailed embodiment and process, but protection scope of the present invention is not limited to downThe embodiment stating.
The method proposing in order to understand better the present embodiment, choose under a cloud storage environment user U to it in cloud stores serviceThe data integrity checking event of the file of the upper storage of device CSS.
As shown in the inventive method structure chart (Fig. 1), the concrete implementation step of the present embodiment is as follows:
1 system initialization
System is moved bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two rank and isThe Bilinear Groups G of prime number q, Gt, g is the generator of crowd G, e:G × G → GtFor bilinearity is to computing, a safety of definitionHash function H:{0,1}*→G。
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1,m2,...,mn), wherein
2 systems generate key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKIForSimilarly, system is that third party auditor TPA generates private key: random numberCorresponding publicKey is
3 user's storage files
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value(homomorphicauthenticator):As the metadata of file. The homomorphism certification of all data blocksValue can be gathered into label value: a φ={ σi},1≤i≤n。
User adopts Merkle Hash tree by each block data structure, and wherein the leaf node of the bottom has been stored corresponding number in an orderly mannerAccording to the cryptographic Hash of piece, inferior bottom layer node is the cryptographic Hash of every two cryptographic Hash, and step-by-step recursion constructs a binary tree, root thusThe cryptographic Hash that node is corresponding final. Root node R is signed simultaneouslyUser U is by { F, φ, σRSend toCloud storage server CSS.
4 general integrity verifications
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, first to generate one group of challenge information. This challenge information is by usingFamily U selects some random elements: I={s1,...,sc},s1≤i≤sc, wherein siRepresent i data block miIndex. RightIn each si∈ I, U chooses a random numberFinally, U is by challenge informationSendGive cloud storage server CSS.
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
Meanwhile, CSS also can offer one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i leaf node (storedH(mi)) to the set of all brotghers of node on the path of root node R. Finally, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, and (ζ, μ) is the appointment reference signature about θ.
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R.Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered. If equation does not becomeVertical, U this proof that refuses inspection of books, and export failure information. If above-mentioned equation is set up, the following equation of U continuation calculating isNo establishment:
If above-mentioned equation is set up, this checking passes through. If above-mentioned equation is false, export failure information.
5 undeniable integrity verifications
Suppose in 4.3 that user U is to equation e (σ R, g) ≡ e (H (R), yU) be verified, and the checking of equation (3) is not passed through,But cloud storage server CSS denies this result, do not admit that the file F that user U stores has suffered to distort. For thisDispute, third party auditor TPA can participate in integrity verification procedures, and provides undeniable final certification. TPAAfter receiving the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R. Then pass throughCalculation equation e (σ R, g) ≡ e (H (R), yU) whether set up, verify whether R value is tampered. If R value is tampered, refusal is testedDemonstrate,prove this proof, and export failure information 0. If R value is not tampered, TPA continues to calculate following equation:
If equation is set up, show to be verified, prove errorlessly, TPA exports one section of noninteractive zero-knowledge proof π1, withProve two relations that discrete logarithm is equal.
If equation is not set up, show to verify and do not pass through, TPA finally exports failure information 1, generates undeniable card simultaneouslyBright. TPA exports one section of noninteractive zero-knowledge proof π2, to prove two unequal relations of discrete logarithm. OrderW1=e(μ,yTPA)/e(ζ,g),Noninteractive zero-knowledge proof π2To adoptFiat-Shamir heuristic is by one section of interactive proof:TurnChange and form (with reference to figure bis-). Finally, TPA only need to be by (A, A ', the z that obtain after calculating1,z2,z′1,z′2,c1,c2,d1,d2,d′1,d′2)Value sends to any people who needs verification.
Claims (1)
1. a teledata integrity verification method for facing cloud storage, is characterized in that comprising the following steps:
Step 1, system initialization
System operation bilinear Diffie-Hellman (BilinearDiffie-Hellman, BDH) parameter generators, produces two Bilinear Groups G that rank are prime number q, Gt, g is the generator of crowd G, e:G × G → GtFor bilinearity is to computing, the Hash function H:{0 of a safety of definition, 1}*→G;
Given file F, system is used Reed-Solomon coding that file is divided into n piece F (m1,m2,...,mn), wherein
Step 2, system generates key
System operation key schedule KeyGen, for user U generates private key: random numberCorresponding PKI is yU=gxU; System is that third party auditor TPA generates private key: random numberCorresponding PKI is yTPA=gxTPA;
Step 3, user's storage file
User moves signature generating algorithm SigGen (skU, F) and be each data block miGenerate a homomorphism authentication value (homomorphicauthenticator):As the metadata of file, the homomorphism authentication value of all data blocks can be gathered into label value: a Φ={ σi},1≤i≤n;
User adopts Merkle Hash tree by each block data structure, root node R is signed simultaneouslyBy { F, Φ, σRSend to cloud storage server CSS;
Step 4, general integrity verification
The 4.1 users request of challenging
When user U carries out data integrity checking to file F, generate one group of challenge informationSend to cloud storage server CSS, wherein I={s1,...,sc},s1≤i≤sc, for each si∈I,siRepresent i data block miIndex, random number
4.2 servers generate to be proved
After cloud storage server CSS receives the challenge information of user U transmission, calculate and generate one section of proof:
Meanwhile, CSS offers one group of supplementary of user: { Ωi},s1≤i≤sc, represent that i has been stored H (mi) leaf node to the set of all brotghers of node on the path of root node R, last, CSS issues mono-section of proof of user U:
P={(ζ,μ,θ),{H(mi)},{Ωi},σR}(2)
Wherein s1≤i≤sc, and (ζ, μ) is the appointment reference signature about θ;
4.3 user's integrity verifications
After user U receives the proof P that cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R; Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered; If equation is false, U this proof that refuses inspection of books, and export failure information; If above-mentioned equation is set up, whether the following equation of U continuation calculating is set up:
If above-mentioned equation is set up, this checking passes through;
Step 5, undeniable integrity verification
In the time there is dispute, third party auditor TPA can participate in integrity verification procedures, and provides undeniable final certification; After TPA receives the proof P that CSS cloud storage server sends, first utilize { H (mi)}{ΩiGeneration root node R; Then by calculation equation e (σR,g)≡e(H(R),yU) whether set up, verify whether R value is tampered; If equation is false, TPA this proof that refuses inspection of books, and export failure information 0; Otherwise whether TPA continues to calculate following equation and sets up:
If above-mentioned equation is set up, this checking passes through, otherwise checking failure, output failure information 1; Need to generate undeniable proof time, first TPA calls above-mentioned TPA verification algorithm; If the verification passes, illustrate that proof is errorless, TPA exports one section of noninteractive zero-knowledge proof π1, to prove two relations that discrete logarithm is equal;
If checking is not passed through, exported failure information 0, and TPA is by { H (mi)}{ΩiThis part information is directly open, thereby anyone can release the conclusion that checking is not passed through; If TPA output is failure information 1, one section of noninteractive zero-knowledge proof π of its output2, to prove two unequal relations of discrete logarithm; For above-mentioned noninteractive zero-knowledge proof, anyone can be verified by simple calculating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310601738.9A CN103699851B (en) | 2013-11-22 | 2013-11-22 | A kind of teledata integrity verification method of facing cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310601738.9A CN103699851B (en) | 2013-11-22 | 2013-11-22 | A kind of teledata integrity verification method of facing cloud storage |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103699851A CN103699851A (en) | 2014-04-02 |
CN103699851B true CN103699851B (en) | 2016-05-25 |
Family
ID=50361375
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310601738.9A Expired - Fee Related CN103699851B (en) | 2013-11-22 | 2013-11-22 | A kind of teledata integrity verification method of facing cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103699851B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357701A (en) * | 2016-11-25 | 2017-01-25 | 西安电子科技大学 | Integrity verification method for data in cloud storage |
CN108923932A (en) * | 2018-07-10 | 2018-11-30 | 东北大学 | A kind of decentralization co-verification model and verification algorithm |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015175729A1 (en) * | 2014-05-13 | 2015-11-19 | Dennis Quan | Systems and methods for managing, sharing, and organizing information stored on multiple cloud services |
US10447696B2 (en) | 2014-05-16 | 2019-10-15 | Nec Corporation | Method for proving retrievability of information |
CN104618419A (en) * | 2014-08-02 | 2015-05-13 | 江苏物泰信息科技有限公司 | Scheme based on content sharing policy in cloud |
CN104216994B (en) * | 2014-09-10 | 2017-06-20 | 华中科技大学 | A kind of method for secret protection of contingency table data publication |
CN104408381B (en) * | 2014-11-27 | 2017-04-12 | 大连理工大学 | Protection method of data integrity in cloud storage |
CN104486311B (en) * | 2014-12-04 | 2017-11-03 | 东南大学 | A kind of remote data integrity inspection method for supporting scalability |
CN104580487A (en) * | 2015-01-20 | 2015-04-29 | 成都信升斯科技有限公司 | Mass data storage system and processing method |
CN104881615B (en) * | 2015-06-08 | 2017-12-15 | 武汉大学 | A kind of efficient secret protection ciphertext connected reference operation demonstration method under cloud environment |
CN104899525A (en) * | 2015-06-12 | 2015-09-09 | 电子科技大学 | Cloud data integrity proving scheme with improved dynamic operations |
CN106708648B (en) * | 2015-07-14 | 2019-11-26 | 阿里巴巴集团控股有限公司 | A kind of the storage method of calibration and system of text data |
CN105162803A (en) * | 2015-09-30 | 2015-12-16 | 深圳市金城保密技术有限公司 | Safe information output method and safe information output system of secret-relating network |
CN106611134A (en) * | 2016-06-06 | 2017-05-03 | 四川用联信息技术有限公司 | Cloud data integrity verification method |
CN106612272A (en) * | 2016-07-12 | 2017-05-03 | 四川用联信息技术有限公司 | Verification and recovery algorithm for data tampering in cloud storage |
CN106612325A (en) * | 2016-07-21 | 2017-05-03 | 四川用联信息技术有限公司 | Method for data authenticity verification under authority management in cloud storage |
CN106612274A (en) * | 2016-07-25 | 2017-05-03 | 四川用联信息技术有限公司 | Homogeneity-based shared data verification algorithm in cloud computing |
CN106612174A (en) * | 2016-08-26 | 2017-05-03 | 四川用联信息技术有限公司 | Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing |
CN106341232B (en) * | 2016-09-18 | 2019-04-09 | 中国科学院软件研究所 | A kind of anonymous entity discrimination method based on password |
CN107395355B (en) * | 2017-06-12 | 2020-12-11 | 广东工业大学 | Cloud storage data integrity verification method based on implicit trusted third party |
CN107172071B (en) * | 2017-06-19 | 2020-06-23 | 陕西师范大学 | Attribute-based cloud data auditing method and system |
CN107257342A (en) * | 2017-06-23 | 2017-10-17 | 成都鼎智汇科技有限公司 | A kind of data safety processing method based on cloud computing |
CN107612969B (en) * | 2017-08-16 | 2020-01-14 | 中国民航大学 | B-Tree bloom filter-based cloud storage data integrity auditing method |
CN107682379A (en) * | 2017-11-22 | 2018-02-09 | 南京汽车集团有限公司 | Safe information transmission device, transmission method and storage method based on homomorphic cryptography |
CN108616497A (en) * | 2018-01-03 | 2018-10-02 | 中电长城网际系统应用有限公司 | Data integrity verification method and system, terminal and authentication server under cloud environment |
CN108965258B (en) * | 2018-06-21 | 2021-07-16 | 河南科技大学 | Cloud environment data integrity verification method based on fully homomorphic encryption |
CN108985102A (en) * | 2018-06-22 | 2018-12-11 | 中国电子科技集团公司电子科学研究院 | Data integrity verification method, device, system and storage medium |
CN109002365A (en) * | 2018-07-09 | 2018-12-14 | 广州大学 | A kind of intelligent body and message-oriented middleware communication data Verification System |
US10877672B2 (en) | 2018-07-31 | 2020-12-29 | International Business Machines Corporation | Auditing stored data slices in a dispersed storage network |
CN109391621B (en) * | 2018-10-24 | 2021-07-06 | 电子科技大学 | Public cloud storage data integrity checking method based on block chain |
CN109639420B (en) * | 2019-01-02 | 2021-05-25 | 西南石油大学 | Medical cloud storage public auditing method capable of anonymizing identity based on block chain technology |
CN109951296B (en) * | 2019-03-05 | 2020-12-08 | 北京邮电大学 | Remote data integrity verification method based on short signature |
CN110677487B (en) * | 2019-09-30 | 2022-04-26 | 中科柏诚科技(北京)股份有限公司 | Outsourcing data duplicate removal cloud storage method supporting privacy and integrity protection |
CN111259454B (en) * | 2020-01-10 | 2022-07-05 | 山东师范大学 | Non-interactive data integrity auditing method, fair payment method and system |
CN111339572A (en) * | 2020-03-04 | 2020-06-26 | 鹏城实验室 | Method and system for verifying integrity of cloud data, terminal device and storage medium |
CN112182662A (en) * | 2020-09-09 | 2021-01-05 | 北京科技大学 | Agile development cloud platform-oriented data integrity verification method and system |
CN113395691B (en) * | 2021-07-05 | 2023-04-25 | 西安工程大学 | Contact tracking privacy protection method based on aggregated signature |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102355351A (en) * | 2011-07-21 | 2012-02-15 | 华为技术有限公司 | Key generation, backup and migration method and system based on trusted computing |
CN202663444U (en) * | 2012-06-29 | 2013-01-09 | 上海海事大学 | Cloud safety data migration model |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN103268460A (en) * | 2013-06-20 | 2013-08-28 | 北京航空航天大学 | Integrity verification method of cloud storage data |
-
2013
- 2013-11-22 CN CN201310601738.9A patent/CN103699851B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102355351A (en) * | 2011-07-21 | 2012-02-15 | 华为技术有限公司 | Key generation, backup and migration method and system based on trusted computing |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN202663444U (en) * | 2012-06-29 | 2013-01-09 | 上海海事大学 | Cloud safety data migration model |
CN103268460A (en) * | 2013-06-20 | 2013-08-28 | 北京航空航天大学 | Integrity verification method of cloud storage data |
Non-Patent Citations (1)
Title |
---|
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing;Qian Wang et al.;《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》;20110531;第22卷(第5期);全文 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357701A (en) * | 2016-11-25 | 2017-01-25 | 西安电子科技大学 | Integrity verification method for data in cloud storage |
CN106357701B (en) * | 2016-11-25 | 2019-03-26 | 西安电子科技大学 | The integrity verification method of data in cloud storage |
CN108923932A (en) * | 2018-07-10 | 2018-11-30 | 东北大学 | A kind of decentralization co-verification model and verification algorithm |
CN108923932B (en) * | 2018-07-10 | 2020-12-11 | 东北大学 | Decentralized collaborative verification system and verification method |
Also Published As
Publication number | Publication date |
---|---|
CN103699851A (en) | 2014-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103699851B (en) | A kind of teledata integrity verification method of facing cloud storage | |
CN104811450B (en) | The date storage method and integrity verification method of a kind of identity-based in cloud computing | |
CN108551392B (en) | Blind signature generation method and system based on SM9 digital signature | |
CN103546567B (en) | Without certificate cross-domain authentication method in a kind of credible cloud computing environment | |
CN108809658A (en) | A kind of digital signature method and system of the identity base based on SM2 | |
CN103765809B (en) | The public key of implicit authentication | |
CN101562524B (en) | Digital signature method based on identity | |
CN109583893B (en) | Traceable block chain-based digital currency transaction system | |
CN104601605A (en) | Efficient privacy protection auditing scheme based on chameleon hash function in cloud storage | |
CN102983971B (en) | Certificateless signature algorithm for user identity authentication in network environment | |
CN103746811B (en) | Anonymous signcryption method from identity public key system to certificate public key system | |
CN106357701A (en) | Integrity verification method for data in cloud storage | |
CN104811300A (en) | Secret key updating method for cloud storage and implementation method of cloud data auditing system | |
CN104023044A (en) | Cloud-storage data lightweight-level public auditing method with privacy protection | |
CN103733564A (en) | Digital signatures with implicit certificate chains | |
CN111010272B (en) | Identification private key generation and digital signature method, system and device | |
CN106487786B (en) | Cloud data integrity verification method and system based on biological characteristics | |
CN106789033B (en) | Electronic contract signing method based on certificateless bookmark encryption | |
CN106936584B (en) | Method for constructing certificateless public key cryptosystem | |
CN102970144B (en) | The authentication method of identity-based | |
CN104901804A (en) | User autonomy-based identity authentication implementation method | |
CN107864037A (en) | SM9 Combination with Digital endorsement method and device | |
CN104184588A (en) | Undetachable digital signature method based on identity | |
CN112436938B (en) | Digital signature generation method and device and server | |
CN102883321A (en) | Digital signature authentication method facing mobile widget |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210804 Address after: Room 1603, building 3, 1217 Wenyi West Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Yuantiao Science and Technology Co.,Ltd. Address before: Hangzhou City, Zhejiang province 310036 Xiasha Higher Education Park forest Street No. 16 Patentee before: Hangzhou Normal University |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160525 |
|
CF01 | Termination of patent right due to non-payment of annual fee |