CN106254374A - A kind of cloud data public audit method possessing duplicate removal function - Google Patents
A kind of cloud data public audit method possessing duplicate removal function Download PDFInfo
- Publication number
- CN106254374A CN106254374A CN201610801119.8A CN201610801119A CN106254374A CN 106254374 A CN106254374 A CN 106254374A CN 201610801119 A CN201610801119 A CN 201610801119A CN 106254374 A CN106254374 A CN 106254374A
- Authority
- CN
- China
- Prior art keywords
- cloud
- server
- file
- audit
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1748—De-duplication implemented within the file system, e.g. based on file segments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
- H04L9/3221—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of cloud data public audit method possessing duplicate removal function, belong to technical field of network security.The present invention includes: CA server arranges systematic parameter, after user leases Cloud Server memory space, to CA server application public private key pair;The cryptographic Hash being first intended to deposit file when cloud user stores file is sent to Cloud Server, this cryptographic Hash is detected by Cloud Server, if this file is present in server, Cloud Server will send the checking of having property of challenge information to cloud user, and the most really have this data file according to response checking user.Otherwise, file is uploaded to Cloud Server together with label by cloud user;It addition, audit server can be according to the integrity of data in user's requests verification Cloud Server.The present invention utilizes one to take turns unsymmetrical key negotiation algorithm and achieves data integrity validation, and achieves Zero Knowledge secret protection, and we are also added into the data deduplication technology of practicality, substantially increase the utilization rate of Cloud Server.
Description
Technical field
The invention belongs to technical field of network security, be specifically related to a kind of cloud data public audit side possessing duplicate removal function
Method.
Background technology
Cloud computing is another novel computation schema after grid computing, P2P computing, effectiveness calculating, Distributed Calculation,
It is provided that low cost, a large amount of storages of on-demand use and calculate resource, is the most important innovation of information technology.
Cloud storage is exactly the conceptive extension of cloud computing and expands a new concept out, is that cloud computing is provided
Basic service.By cluster application, grid and distributed file system function, by application software by each in network
Plant different types of storage device and gather collaborative work, have and data storage and Operational Visit function are externally provided.Powerful
Calculating and storage capacity also make user be ready extensive application and data to be deployed in cloud computing platform, cloud storage is exactly one
Individual with data storage and management cloud computing system as core.Cloud storage system is scalable with it, low price, on-demand payment,
Position is unrelated, apply the features such as transparent, it is possible to allows user exchange the storage capacity of magnanimity for the cheapest price, has become as
A profit growth point faster in cloud computing.
But, the calculating resource of high concentration allows cloud storage application face the most serious security challenge.The peace of cloud data
Complete and privacy becomes restriction people and uses the principal element of cloud service.And in recent years, Ge great operator is the most each
From the safe storage problem exposed, exacerbate the worry of people.Due to ordering about of interests, cloud service provider may be user's
Data move on transmission speed memorizer slowly inferior or delete not accessed and access less data.Due to clothes
Business device managerial competency, fault or attacked, and cloud service provider is in order to safeguard the reputation of oneself, deliberately conceals and covers number
According to the event of loss, the safety and reliability of cloud storage server is not trusted by user.Person comes must to introduce auditing by third party
Management cloud service provider processes the right of cloud data.
After data are passed to high in the clouds by user, data deletion may not preserved any copy in this locality, from
And cannot ensure that the data fetched from high in the clouds are complete, owing to mass data can cause huge communication cost, traditional number
The most unworkable according to integrity verification technology.Therefore, the basic skills of cloud data integrity detection is: user fetches low volume data
Allow user's phase letter data with bigger intact being saved on Cloud Server of probability by knowledge proof and probability analysis.Mesh
Before, having property of data proves that PDP (Provable Data Possession) and data can be recovered to prove POR (Proof of
Retrievability) mechanism is two main cloud data integrity audit agreements.
Ateniese etc. propose data on information security top-level meeting CCS 2007 first and have the concept proving PDP
And security model, they also proposed the PDP scheme of two efficient provable securities in addition.PDP protocol can allow user exist
In the case of not fetching file, it is also possible to the integrity of the file that checking is stored on insincere server, save communication band
Wide.The concept that can return the bright PoR that collects evidence is proposed by Juels and Kaliski, guarantees server based on stochastic sampling and error-correcting code technique
Storing correct data, cloud user can fetch needs data when equally.Shacham and Waters utilizes correcting and eleting codes
Design the PoR scheme of two high-efficiency compacts, and utilize the security model of Juels etc. to carry out strict Safety Argumentation.The
One scheme constructs based on BLS short signature, and the response value of server and client's challenging value is the shortest, and meeting again disclosure can test
Card, can provide its Security Proof under random oracle;Second scheme is to design based on pseudo-random function PRF
, the length that server produces response message is shorter, but only supports secret Authentication.The two scheme the most all make use of homomorphism to test
Response proof is aggregated into an authentication value by card label technique, and communication cost is minimized.
The memory space providing unlimited may bring serious financial burden to cloud service provider.But data deduplication
Technology clearly can reduce the cost stored.Data deduplication technology by cloud storage provider include Dropbox and
Bitcasa etc. are widely used.A report according to SNIA, using data deduplication technology to reduce inside business application needs
Therefore taking of data volume to be stored, disk and bandwidth decrease 90%.The duplicate removal of data refers to avoid identical file many
Secondary storage, when storage be the media file such as music and film of main flow time, the saving in space is the most obvious.Repeat
It is to consume memory space that content is uploaded for the first time at them, but follow-up uploading avoids the need for taking any space.Except
The saving of memory space, the data stored, the content repeated later avoids the need for uploading again, thus saves band
Wide.
Data deduplication can be divided into two kinds: the duplicate removal of cloud server terminal and the duplicate removal of user side.The duplicate removal of service end is very simple,
After server receives data, check whether and deposited portion.Then abandon, as existed, the file received, otherwise deposit
Store up this new file.We can see that the duplicate removal of service end can not save bandwidth, because server is after receiving file
Just carry out deduplication operation.On the other hand the duplicate removal of client have employed a more controversial method, and client first counts before uploading
Calculate the cryptographic Hash of file, after device to be serviced receives this cryptographic Hash, check that this cryptographic Hash has existed.As existed, then
User need not go up transmitting file, and user and existing file are connected, and otherwise notifies the upper transmitting file of user.The duplicate removal of client
It also is able to reduce the transmission of data, the waiting time of user and the consumption of the server energy.
Under cloud storage environment, although having been proposed for many audit programs to ensure the integrity of user's data beyond the clouds
And effectiveness, but they are all for traditional cloud storage Environment Design, and do not account for the application of mobile cloud storage.In order to
Alleviating user's pressure in storage and calculating, the data integrity validation mechanism under cloud environment preferably supports open checking,
Allow arbitrary auditing by third party person to help user to complete data integrity validation.Another problem is exactly for sharing data
Carry out privacy of identities protection when of integrity verification to conflict with auditing by third party person, though auditing party's compliance audit agreement
And return a correct auditing result to user.The most current cloud data integrity validation scheme is all not reaching to perfection
Zero Knowledge secret protection.Along with the exploding of data in cloud storage, in order to be provided that virtual unlimited storage capacity, save band
Width, the duplicate removal of file seems particularly important, but the duplicate removal of data has the security breaches that it is intrinsic, and opponent can be by providing literary composition
The cryptographic Hash of part finally downloads the file being not belonging to oneself, brings great potential safety hazard to cloud storage.
Summary of the invention
The goal of the invention of the present invention is: when realizing duplicate removal storage for Cloud Server, it is understood that there may be user itself does not gathers around
There is file, but cheat Cloud Server by file cryptographic Hash, authorize the situation downloading the file oneself not having with acquisition,
And user data privacy concern in the open checking system of cloud data integrity, it is proposed that a kind of possess duplicate removal function
Cloud data public audit method, is verified the having property of file of cloud user by Cloud Server, it is ensured that cloud user has this really
Data file, meanwhile, the RESPONSE CALCULATION amount of user is little, and bandwidth consumption is low;For server, it is achieved that safe duplicate removal is deposited
Storage, improves the space availability ratio of server.The method can also obtain perfect Zero Knowledge secret protection, thus prevents cloud number
According to the data leak during public audit.Therefore this invention achievement is for promoting that the sustainable development of cloud computing has important
Theory significance and practical value.
The cloud data public audit method possessing duplicate removal function of the present invention, specifically includes the following step:
Step one: cloud user generates key application request Concurrency and delivers to CA server, CA server is that cloud user selects one
Individual random number X generates double secret key: PKI PK=(R, A), private key SK=(r, X), PKI parameter R=g-r, A=e (X, g), private key
ParameterWherein g is the generation unit of p factorial method cyclic group G, and e is G × G → GTBilinear map, GTFollow for p factorial method
Ring group;And private key SK is sent to cloud user by safe lane;
Step 2: the file identifier of cloud user setup file to be uploaded, and file to be uploaded is carried out fixed length segmentation,
To n data block, cloud user using the data content (file the most to be uploaded itself) of file to be uploaded as the input of hash function H
Parameter, generates file cryptographic Hash and is sent to Cloud Server, and wherein hash function H is that the bit sequence collection from 0 and 1 composition maps
Impact resistant hash function to p factorial method cyclic group G;
Cloud Server judges whether current file cryptographic Hash exists, the most then initiate the checking of having property to cloud user;If
No, then allow cloud user to upload current file;
Described having property is verified as:
Cloud Server generate having property checking request Concurrency give cloud user, described in having property checking request include challenging value
chaldup, wherein challenging value chaldupGeneration process be: randomly choose from current file part data block constitute challenge collection
Q, each data block m to challenge collection QjData block random number v is setj, subscript j is data block identifier and j ∈ Q, according to vj?
To chaldup={ (j, vj)j∈Q, wherein Multiplication loop for mould p changes group;
Cloud user extracts the challenging value chal in the checking request of having propertydup, according to μ=∑j∈QvjmjMeet with a response value μ,
Wherein mjRepresent the data block of current file, and resp will be respondeddup={ μ } returns to Cloud Server;
Cloud Server is based on challenging value chaldup, response respdupCarry out validation verification, if passing through, then having property checking
Pass through;Otherwise having property authentication failed;
Cloud user uploads the process of current file: based on private key SK and hash function H be each data block generate one
Label value, is sent to Cloud Server by file identifier, n data block and label value and carries out cloud storage;
Step 3: cloud user initiates audit request to audit server, described audit request includes what CA server generated
The PKI of cipher key pair, file identifier to be audited, Cloud Server identifier;
Audit server carries out validation verification to the audit request received, if invalid, then refuses request;Otherwise extract cloud
Identifier server, file identifier to be verified, generate challenging value chalintAnd it is sent to corresponding Cloud Server, wherein challenging value
chalintGeneration process be: random choose treats that K data block identifier of audit document constitutes challenge collection Q ', corresponding challenge collection
The data block identifier of Q ', arranges data block random number v 'k, subscript k is data block identifier and k ∈ Q,TherefromWith
Machine Selection parameter t, generates parameter X1=gt,X2=At, wherein g is the generation unit of p factorial method cyclic group G, and A is PKI parameter A=
(X g), obtains X to e1About g and X2There is the knowledge proof pf of identical discrete logarithm about A;By v 'k、X1、X2, pf generate examine
Meter challenge chalint={ (k, v 'k)k∈Q′,X1,X2,pf};
Receive challenging value chalintCloud Server checking knowledge proof pf whether effective, if it is not, failure of then auditing;Otherwise
Calculateμ=∑k∈Q′v′kmk,Then response resp is sentint={ σ, B}
To audit server, wherein mkRepresent kth data block, TkRepresent kth data block mkLabel value;
Audit server is based on the challenging value chal sentintWith response respintCarry out validation verification, if checking is logical
Cross, then send the successful Audit Report of audit to cloud user;Otherwise send the Audit Report that audit is failed.
Further, generate each data block according to private key SK=(r, X), hash function H and generate label value Ti:For, wherein miData block, fid represents file identifier, i ∈ [1, n].
Further, in step 2, Cloud Server is based on challenging value chaldup, response respdupCarry out validation verification
Process is:
Cloud Server is therefromRandomly choose parameter t, generate parameter X1=gt,X2=At, X3=Rt, calculate further according to formulaTjRepresent jth data
Block mjLabel value;Cloud Server checking equation B/e (σ, X1Whether)=C sets up, if setting up, then validation verification passes through;Otherwise
Do not pass through.
In step 3, audit server is based on the challenging value chal sentintWith response respintCarry out validation verification:
Audit server, based on current parameter t selected, calculates X3=Rt,And test
Card equation B/e (σ, X1Whether)=C sets up;If setting up, then validation verification passes through;Otherwise, do not pass through.
In sum, owing to have employed technique scheme, the invention has the beneficial effects as follows:
(1) duplicate removal storage is achieved: the present invention not only achieves the cloud user person that can entrust auditing by third party to being stored in
Data in Cloud Server are audited, it addition, server is when carrying out duplicate removal storage, user can be carried out having property of data
Checking, improves the safety of system, and saves user bandwidth.
(2) Zero Knowledge secret protection: the present invention utilizes to take turns unsymmetrical key negotiation and achieves Zero Knowledge secret protection, and
Comparing and directly utilize zero-knowledge proof technology and realize the scheme of Zero Knowledge secret protection, mutual wheel number is few, and amount of calculation is low, and communication is opened
Sell low, and protect privacy of user.
(3) response value computing cost is low, and the bandwidth consumption of transmission is low: limited in view of user's computing capability, and user responds
Value calculates simple, and result of calculation bandwidth consumption is relatively low.
Accompanying drawing explanation
Fig. 1 is data deduplication storage and the data public audit process schematic of the specific embodiment of the invention.
Fig. 2 is the data deduplication storing process schematic diagram of specific implementation method of the present invention.
Fig. 3 is the data public audit process schematic of the specific embodiment of the invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with embodiment and accompanying drawing, to this
Bright it is described in further detail.
The present invention is based on public key cryptography theory, proposes a kind of cloud data public audit side possessing duplicate removal function
Method, is applied to the cloud storage environment that security requirement is higher.When cloud user stores file, first go up transmitting file cryptographic Hash, cloud service
Device judges that, in this file presence server the most, if depositing, then user is without uploading whole file, saves user bandwidth,
Cloud Server will carry out the checking of having property of file to user, it is ensured that cloud user has this file really.When cloud user wants to test
During card high in the clouds data integrity, sending audit request to audit server, audit server utilizes challenge response method to verify
The integrity of data in Cloud Server, protects to realize the privacy of efficient remote data integrity authentication mechanism and Zero Knowledge
Protect, the present invention use an asymmetric round key negotiation scheme to generate challenge information, challenge responses auth response value.
First the mathematical theory applied the present invention is simply introduced:
(1) finite field
The territory of limited element composition is referred to as finite field, meets the character such as addition and multiplicative closed, and the rank of finite field are
The wherein number of element, rank are that the finite field of prime number p is typically designated as GF (p).The non-zero entry of finite field constitutes a cyclic group,
In finite field, comprising two groups, one is the group that addition is constituted by GF (p), and one is the group that-0 pair of multiplication of GF (p) is constituted.?
In multiplication loop group, all powers generating unit can construct all of element in group.
(2) Hash function
Hash function is a kind of function of the output message that arbitrarily long input message can be transformed into regular length, this
Individual output result is referred to as the hash value of this message.Hash function is commonly used to construct short " fingerprint " of data, and once data change,
Fingerprint is the most not correct.In order to realize the certification to data, it must possess following character: 1. the input of function can be any
Length;2. the output of function is regular length;3. for appointing to an x, calculate its cryptographic Hash and be easier to;4. to any given
Cryptographic Hash y, find out that to meet the x of h (x)=y be computationally infeasible, this character is also referred to as anti-weak collision.Breathe out
Uncommon function is mainly used in digital signature, generates " digital finger-print ", safety storage password etc..
(3) zero-knowledge proof
Zero-knowledge proof is the main tool of structure security protocol, and in brief, zero-knowledge proof is except demonstrating conclusion
Correctness outside, do not reveal other any information, therefore, it can make each side to put as a part for security protocol
Heart performs this agreement.Zero-knowledge proof can be divided into two types: interactively and noninteractive.Zero-knowledge proof is actual
On be a kind of two sides or agreement in many ways of relating to, i.e. two sides or the taked series of steps that in many ways accomplishes a task.Prove
Person proves to verifier and makes it believe oneself to know or have a certain message, but proof procedure is not divulged to verifier and appointed
What is about the information being proved to message.
(4) Bilinear map
Make G1It is addition cyclic group, G2Being multiplication loop group, it is group G that their rank are all q, p1Generation unit.Map e:G1
×G1→G2If meeting following three conditions, the most referred to as Bilinear map.1. possesses bilinearity, for arbitrarilye
(aP, bP)=e (P, P)abSet up;, i.e. there is P, Q ∈ G in 2. non-degeneracy1, e (P, Q) ≠ 1;3. there is computability: e is permissible
Effectively calculated.
With reference to Fig. 1, the present invention is implemented as follows:
Step S100. system is set up, generation systematic parameter:
Step S101: select a security parameter l, CA server select two multiplication loop group G with prime number p as rank and
GT, select g as a generation unit of group G, e:G × G → GTIt it is a bilinear map.It is a multiplication loop group.H is
Crash-resistant Hash function: H{0,1}*→G。
Step S102:CA open systematic parameter (g, H, p, G, GT,e)。
Step S200. data store, and data are uploaded to Cloud Server by cloud user:
Step S201: the concrete generation step of the public private key pair of cloud user is: CA is that cloud user selects a random number X,
R, X ∈ G 1},Calculate R=g-r, (X, g), cloud client public key is PK=(R, A) to A=e, and private key is SK=(r, X).And
Private key is sent to cloud user by safe lane.
Step S202: cloud user is that the file F that will upload selects an identifier fid;Then file F is divided into n block,
Obtain data block { mi}1≤i≤n, for realizing duplicate removal function, first cloud user uploads H (F) to Cloud Server, and server is by comparing
File cryptographic Hash determines that file is deposited the most, wherein F={mi|1≤i≤n}.Being implemented as follows of this process:
Step S202-a: cloud user is that the file that will upload selects an identifier fid.
Step S202-b: cloud user carries out fixed length segmentation to file F, obtains n data block, i.e. { mi}1≤i≤n。
Step S202-c: cryptographic Hash H (F) of cloud user's calculation document, and upload onto the server.
Step S202-d: Cloud Server, after receiving H (F), is stored in the most by comparing H (F) detection this document
In server.
Step S203: if file is present in cloud service, for security consideration, Cloud Server will carry out file to user
Having property checking.Cloud Server generates the checking request of having property, sends a challenging value to cloud user, and cloud user receives challenge
After value, calculate a response value to Cloud Server according to blocks of files and challenging value.The challenging value that Cloud Server sends according to oneself,
The effectiveness of the response verification response value of cloud user, and send the checking report of having property of file according to the result.With reference to Fig. 2,
Being implemented as follows of this process:
Step S203-a: Cloud Server randomly choosesThen some data blocks are selected, by a constructed challenge
Set Q, to each selected data block mj, select a random numberServer sends challenging value chaldup=
{(i,vj)j∈QGive cloud user.
Step S203-b: cloud user calculates μ=∑j∈Qvjmj, then send response respdup={ μ } gives Cloud Server.
Step S203-c: Cloud Server utilizes t, has deposited associated information calculation X of file user1=gt, X2=At, X3=
Rt,TjRepresent jth number
According to block mjLabel value.
Step S203-d: Cloud Server checking equation B/e (σ, X1Whether)=C sets up.If setting up, then send data and have
Property be proved to be successful, otherwise, send data having property authentication failed.
Step S204: if file does not exists in Cloud Server, then allow cloud user to upload current file, i.e. cloud user root
It is each data block m according to the private key of oneselfi, i ∈ [1, n] calculates a label value Ti, i ∈ [1, n],Then (fid, F, Tag are sentint), Tagint={ Ti}i∈[1,n]To Cloud Server, delete simultaneously
Local data (optional processing mode, the purpose of deletion is to take locally stored space to reduce).Cloud Server is connecing
Receive (fid, F, TagintAfter), store it in storage medium.
The data being stored in Cloud Server are audited by step S 300. audit server.
Cloud user generates an audit request, and is sent to audit server, and the data in Cloud Server are carried out by request
Audit.Audit server, according to the information in audit request, generates a challenging value to Cloud Server and is sent to Cloud Server.
After Cloud Server receives challenging value, the effectiveness of checking challenging value, if effectively, then calculate one according to label, blocks of files, challenging value
Individual response value is sent to audit server.After audit server receives the response that Cloud Server is sent, according to choosing that oneself sends
War value, the PKI of cloud user, the correctness of the response value auth response value of Cloud Server.Audit server is given according to auditing result
User sends Audit Report, if being proved to be successful, then sends and audits successfully, otherwise, sends and audit unsuccessfully.Implementing of this process
As follows:
Step S301: cloud user sends audit request req=PK | | fid | | Server | | Time to audit server, committee
Ask it that data in Cloud Server are audited.PK is the PKI of cloud user, and fid is the file identifier of request audit,
Server is the mark of Cloud Server, and Time is a timestamp.
Step S302: audit server randomly choosesThen the part data block identifier structure of fid is randomly choosed
Becoming a challenge set Q ', corresponding each data block identifier selects a random numberK ∈ Q ', calculates X1=gt,X2=
At, it addition, audit person utilizes the knowledge probative agreement POK that two discrete logarithms are equal, generate a knowledge proof pf, it is ensured that X1
About g and X2Identical discrete logarithm, i.e. pf=POK{ (g, A, X is had about A1,X2):loggX1=logAX2, last audit
Challenge is chalint={ (i, v 'k)k∈Q,X1,X2, pf}, send it to Cloud Server.With reference to Fig. 3, implementing of this process
As follows:
Step S302-a: audit server randomly choosesThen the part data block identifier of fid is randomly choosed
(such as K) constitutes a challenge set Q ', and corresponding each data block identifier selects a random numberK ∈ Q ', calculates
X1=gt,X2=At。
Step S302-b: generate one and prove pf, pf=POK{ (g, A, X1,X2):loggX1=logAX2}。
Step S302-c: audit server calculates challenging value chalint={ (k, v 'k)k∈Q′,X1,X2, pf}, and be sent to
Cloud Server.
Step S303: receive the challenge chal that audit server sendsintAfter, Cloud Server first verifies that pf is the most effective,
If invalid, then failure of auditing, otherwise Cloud Server calculatesμ=∑k∈Q′vkmk,Cloud Server sends response respint={ σ, B} are to audit server.
Step S304: audit server receives response respintAfter, calculate X3=Rt,And verify equation B/e (σ, X1Whether)=C sets up.
Step S305: if equation is set up, then audit successfully;Otherwise, audit unsuccessfully.Audit server is sent out according to the result
Sending Audit Report to cloud user, if auditing successfully, then sending PK | | fid | | Server | | Time | | 1, if auditing unsuccessfully, then sending out
| | fid | | Server | | the Time | | 0 that send PK.
The above, the only detailed description of the invention of the present invention, any feature disclosed in this specification, unless especially
Narration, all can be by other equivalences or have the alternative features of similar purpose and replaced;Disclosed all features or all sides
Method or during step, in addition to mutually exclusive feature and/or step, all can be combined in any way.
Claims (4)
1. the cloud data public audit method possessing duplicate removal function, it is characterised in that comprise the following steps:
Step one: cloud user generates key application request Concurrency and delivers to CA server, CA server be cloud user select one with
Machine number X generates double secret key: PKI PK=(R, A), private key SK=(r, X), PKI parameter R=g-r, A=e (X, g), private key parameterWherein g is the generation unit of p factorial method cyclic group G, and e is G × G → GTBilinear map, GTFor p rank multiplication loop
Group;And private key SK is sent to cloud user by safe lane;
Step 2: the file identifier of cloud user setup file to be uploaded, and file to be uploaded is carried out fixed length segmentation, obtain n
Individual data block, the data content of file to be uploaded as the input parameter of hash function H, is generated file cryptographic Hash also by cloud user
Being sent to Cloud Server, wherein hash function H is that the bit sequence collection from 0 and 1 composition is mapped to the anti-of p factorial method cyclic group G
Collision hash function;
Cloud Server judges whether the cryptographic Hash of current file exists, the most then initiate the checking of having property to cloud user;If it is not,
Cloud user is then allowed to upload current file;
Described having property is verified as:
Cloud Server generate having property checking request Concurrency give cloud user, described in having property checking request include challenging value
chaldup, wherein challenging value chaldupGeneration process be: randomly choose from current file part data block constitute challenge collection Q
Each data block m to challenge collection QjData block random number v is setj, subscript j is data block identifier and j ∈ Q, according to vjObtain
chaldup={ (j, vj)j∈Q, wherein Multiplication loop for mould p changes group;
Cloud user extracts the challenging value chal in the checking request of having propertydup, according to μ=∑j∈QvjmjMeet with a response value μ, wherein mj
Represent the data block of current file, and resp will be respondeddup={ μ } returns to Cloud Server;
Cloud Server is based on challenging value chaldup, response respdupCarrying out validation verification, if passing through, then the checking of having property is logical
Cross;Otherwise having property authentication failed;
Cloud user uploads the process of current file: based on private key SK and hash function H be each data block generate a label
Value, is sent to Cloud Server by file identifier, n data block and label value and carries out cloud storage;
Step 3: cloud user initiates audit request to audit server, described audit request includes the key that CA server generates
The PKI of centering, file identifier to be audited, Cloud Server identifier;
Audit server carries out validation verification to the audit request received, if invalid, then refuses request;Otherwise extract cloud service
Device identifier, file identifier to be verified, generate challenging value chalintAnd it is sent to corresponding Cloud Server, wherein challenging value
chalintGeneration process be: random choose treats that K data block identifier of audit document constitutes challenge collection Q ', corresponding challenge collection
The data block identifier of Q ', arranges data block random number v 'k, subscript k is data block identifier and k ∈ Q,TherefromWith
Machine Selection parameter t, generates parameter X1=gt,X2=At, wherein g is the generation unit of p factorial method cyclic group G, and A is PKI parameter A=
(X g), obtains X to e1About g and X2There is the knowledge proof pf of identical discrete logarithm about A;By v 'k、X1、X2, pf generate examine
Meter challenge chalint={ (k, v 'k)k∈Q′,X1,X2,pf};
Receive challenging value chalintCloud Server checking knowledge proof pf whether effective, if it is not, failure of then auditing;Otherwise calculateμ=∑k∈Q′v′kmk,Then response resp is sentint={ σ, B} give and examine
Meter server, wherein mkRepresent kth data block, TkRepresent kth data block mkLabel value;
Audit server is based on the challenging value chal sentintWith response respintCarry out validation verification, if being verified, then
The successful Audit Report of audit is sent to cloud user;Otherwise send the Audit Report that audit is failed.
2. the method for claim 1, it is characterised in that generate every number according to private key SK=(r, X), hash function H
Label value T is generated according to blocki:For, wherein miData block, fid represents file identifier, i ∈ [1, n].
3. the method for claim 1, it is characterised in that in step 2, Cloud Server is based on challenging value chaldup, response
respdupThe process carrying out validation verification is:
Cloud Server is therefromRandomly choose parameter t, generate parameter X1=gt,X2=At, X3=Rt, calculate further according to formulaTjRepresent jth data
Block mjLabel value;
Cloud Server checking equation B/e (σ, X1Whether)=C sets up, if setting up, then validation verification passes through;Do not pass through.
4. the method for claim 1, it is characterised in that in step 3, audit server is based on the challenging value sent
chalintWith response respintCarry out validation verification:
Audit server, based on current parameter t selected, calculatesAnd verify
Equation B/e (σ, X1Whether)=C sets up;If setting up, then validation verification passes through;Otherwise, do not pass through.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610801119.8A CN106254374B (en) | 2016-09-05 | 2016-09-05 | A kind of cloud data public audit method having duplicate removal function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610801119.8A CN106254374B (en) | 2016-09-05 | 2016-09-05 | A kind of cloud data public audit method having duplicate removal function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106254374A true CN106254374A (en) | 2016-12-21 |
CN106254374B CN106254374B (en) | 2019-10-01 |
Family
ID=57598549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610801119.8A Active CN106254374B (en) | 2016-09-05 | 2016-09-05 | A kind of cloud data public audit method having duplicate removal function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106254374B (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911708A (en) * | 2017-03-23 | 2017-06-30 | 中北大学 | It is a kind of to support batch processing to verify and possess the cloud data public audit method of wrong data positioning function |
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
CN107635018A (en) * | 2017-10-30 | 2018-01-26 | 福州大学 | Support the cross-domain medical cloud storage system of urgent access control and safe duplicate removal |
CN107800688A (en) * | 2017-09-28 | 2018-03-13 | 南京理工大学 | A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption |
CN108256048A (en) * | 2018-01-12 | 2018-07-06 | 哈尔滨工业大学深圳研究生院 | The auditing by third party method that user file data is supported to restore |
CN108377264A (en) * | 2018-02-05 | 2018-08-07 | 江苏大学 | Vehicular ad hoc network quorum-sensing system data report De-weight method |
CN108566278A (en) * | 2018-03-21 | 2018-09-21 | 北京金堤科技有限公司 | The method and device of data files |
CN108600263A (en) * | 2018-05-09 | 2018-09-28 | 电子科技大学 | A kind of safely and effectively client duplicate removal agreement proved based on possessing property |
CN109829326A (en) * | 2018-11-20 | 2019-05-31 | 西安电子科技大学 | Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain |
CN109981641A (en) * | 2019-03-26 | 2019-07-05 | 北京邮电大学 | A kind of safe distribution subscription system and distribution subscription method based on block chain technology |
CN110278076A (en) * | 2019-05-29 | 2019-09-24 | 电子科技大学 | A kind of audit of transparence data integrity and transparence encryption data duplicate removal agreement based on block chain |
CN110278087A (en) * | 2019-07-05 | 2019-09-24 | 深圳市九链科技有限公司 | File encryption De-weight method based on secondary Hash and zero knowledge proof method |
CN110392083A (en) * | 2018-04-20 | 2019-10-29 | 华为技术有限公司 | Control method, device and the terminal device that the file second passes |
CN110460447A (en) * | 2019-08-16 | 2019-11-15 | 东北大学秦皇岛分校 | Edge calculations data accountability system and auditing method based on Hash binary tree |
CN110505052A (en) * | 2019-08-28 | 2019-11-26 | 安徽大学 | It is a kind of protect data-privacy cloud data verification method is disclosed |
CN110968452A (en) * | 2019-11-20 | 2020-04-07 | 华北电力大学(保定) | Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid |
CN111355705A (en) * | 2020-02-08 | 2020-06-30 | 西安电子科技大学 | Data auditing and safety duplicate removal cloud storage system and method based on block chain |
CN111460524A (en) * | 2020-03-27 | 2020-07-28 | 鹏城实验室 | Data integrity detection method and device and computer readable storage medium |
CN111859030A (en) * | 2020-07-09 | 2020-10-30 | 西南交通大学 | Public auditing method supporting composite data |
CN111931201A (en) * | 2020-07-15 | 2020-11-13 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN112784314A (en) * | 2021-01-27 | 2021-05-11 | 青岛大学 | Data integrity detection method and device, electronic equipment and storage medium |
CN114021158A (en) * | 2021-09-29 | 2022-02-08 | 北京师范大学 | Zero-knowledge data storage verification method, equipment and storage medium based on BLS signature |
CN115063120A (en) * | 2022-08-05 | 2022-09-16 | 国网浙江省电力有限公司金华供电公司 | Project audit system based on cloud service |
CN116938452A (en) * | 2023-09-15 | 2023-10-24 | 天津太极风控网络科技有限公司 | Cloud audit method for encrypted backup account set |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344572A1 (en) * | 2011-09-26 | 2014-11-20 | Subhashis Mohanty | Secure cloud storage and synchronization systems and methods |
CN104811300A (en) * | 2015-04-22 | 2015-07-29 | 电子科技大学 | Secret key updating method for cloud storage and implementation method of cloud data auditing system |
CN104917609A (en) * | 2015-05-19 | 2015-09-16 | 华中科技大学 | Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception |
CN105243334A (en) * | 2015-09-17 | 2016-01-13 | 浪潮(北京)电子信息产业有限公司 | Data storage protection method and system |
WO2016105585A1 (en) * | 2014-12-23 | 2016-06-30 | Hewlett Packard Enterprise Development Lp | Data deduplication |
-
2016
- 2016-09-05 CN CN201610801119.8A patent/CN106254374B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140344572A1 (en) * | 2011-09-26 | 2014-11-20 | Subhashis Mohanty | Secure cloud storage and synchronization systems and methods |
WO2016105585A1 (en) * | 2014-12-23 | 2016-06-30 | Hewlett Packard Enterprise Development Lp | Data deduplication |
CN104811300A (en) * | 2015-04-22 | 2015-07-29 | 电子科技大学 | Secret key updating method for cloud storage and implementation method of cloud data auditing system |
CN104917609A (en) * | 2015-05-19 | 2015-09-16 | 华中科技大学 | Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception |
CN105243334A (en) * | 2015-09-17 | 2016-01-13 | 浪潮(北京)电子信息产业有限公司 | Data storage protection method and system |
Non-Patent Citations (2)
Title |
---|
JIAWEI YUAN,SHUCHENG YU: "Secureand Constant Cost Public Cloud Storage Auditing with Deduplication", 《2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)》 * |
JINGWEI LI等: "Secure Auditing and Deduplicating Datain Cloud", 《IEEE TRANSACTIONS ON COMPUTERS》 * |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911708A (en) * | 2017-03-23 | 2017-06-30 | 中北大学 | It is a kind of to support batch processing to verify and possess the cloud data public audit method of wrong data positioning function |
CN106911708B (en) * | 2017-03-23 | 2019-12-03 | 中北大学 | A kind of cloud data public audit method for supporting batch processing to verify and to have wrong data positioning function |
CN107483585A (en) * | 2017-08-18 | 2017-12-15 | 西安电子科技大学 | The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment |
CN107483585B (en) * | 2017-08-18 | 2020-03-10 | 西安电子科技大学 | Efficient data integrity auditing system and method supporting safe deduplication in cloud environment |
CN107800688A (en) * | 2017-09-28 | 2018-03-13 | 南京理工大学 | A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption |
CN107635018A (en) * | 2017-10-30 | 2018-01-26 | 福州大学 | Support the cross-domain medical cloud storage system of urgent access control and safe duplicate removal |
CN107635018B (en) * | 2017-10-30 | 2021-05-18 | 福州大学 | Cross-domain medical cloud storage system supporting emergency access control and safe deduplication |
CN108256048A (en) * | 2018-01-12 | 2018-07-06 | 哈尔滨工业大学深圳研究生院 | The auditing by third party method that user file data is supported to restore |
CN108377264A (en) * | 2018-02-05 | 2018-08-07 | 江苏大学 | Vehicular ad hoc network quorum-sensing system data report De-weight method |
CN108566278A (en) * | 2018-03-21 | 2018-09-21 | 北京金堤科技有限公司 | The method and device of data files |
CN110392083A (en) * | 2018-04-20 | 2019-10-29 | 华为技术有限公司 | Control method, device and the terminal device that the file second passes |
CN110392083B (en) * | 2018-04-20 | 2022-06-24 | 华为技术有限公司 | File second transmission control method and device and terminal equipment |
CN108600263B (en) * | 2018-05-09 | 2020-09-25 | 电子科技大学 | Safe and effective client duplicate removal method based on possession certification |
CN108600263A (en) * | 2018-05-09 | 2018-09-28 | 电子科技大学 | A kind of safely and effectively client duplicate removal agreement proved based on possessing property |
CN109829326B (en) * | 2018-11-20 | 2023-04-07 | 西安电子科技大学 | Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain |
CN109829326A (en) * | 2018-11-20 | 2019-05-31 | 西安电子科技大学 | Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain |
CN109981641A (en) * | 2019-03-26 | 2019-07-05 | 北京邮电大学 | A kind of safe distribution subscription system and distribution subscription method based on block chain technology |
CN109981641B (en) * | 2019-03-26 | 2020-10-02 | 北京邮电大学 | Block chain technology-based safe publishing and subscribing system and publishing and subscribing method |
CN110278076A (en) * | 2019-05-29 | 2019-09-24 | 电子科技大学 | A kind of audit of transparence data integrity and transparence encryption data duplicate removal agreement based on block chain |
CN110278087B (en) * | 2019-07-05 | 2022-04-22 | 深圳市九链科技有限公司 | File encryption and de-duplication method based on secondary hash and zero knowledge verification method |
CN110278087A (en) * | 2019-07-05 | 2019-09-24 | 深圳市九链科技有限公司 | File encryption De-weight method based on secondary Hash and zero knowledge proof method |
CN110460447A (en) * | 2019-08-16 | 2019-11-15 | 东北大学秦皇岛分校 | Edge calculations data accountability system and auditing method based on Hash binary tree |
CN110460447B (en) * | 2019-08-16 | 2022-07-08 | 东北大学秦皇岛分校 | Hash binary tree-based edge calculation data auditing system and auditing method |
CN110505052B (en) * | 2019-08-28 | 2022-11-25 | 安徽大学 | Cloud data public verification method for protecting data privacy |
CN110505052A (en) * | 2019-08-28 | 2019-11-26 | 安徽大学 | It is a kind of protect data-privacy cloud data verification method is disclosed |
CN110968452A (en) * | 2019-11-20 | 2020-04-07 | 华北电力大学(保定) | Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid |
CN111355705B (en) * | 2020-02-08 | 2021-10-15 | 西安电子科技大学 | Data auditing and safety duplicate removal cloud storage system and method based on block chain |
CN111355705A (en) * | 2020-02-08 | 2020-06-30 | 西安电子科技大学 | Data auditing and safety duplicate removal cloud storage system and method based on block chain |
CN111460524A (en) * | 2020-03-27 | 2020-07-28 | 鹏城实验室 | Data integrity detection method and device and computer readable storage medium |
CN111460524B (en) * | 2020-03-27 | 2023-07-18 | 鹏城实验室 | Method, apparatus and computer readable storage medium for detecting data integrity |
CN111859030A (en) * | 2020-07-09 | 2020-10-30 | 西南交通大学 | Public auditing method supporting composite data |
CN111859030B (en) * | 2020-07-09 | 2023-04-28 | 西南交通大学 | Public auditing method supporting composite data |
CN111931201B (en) * | 2020-07-15 | 2023-06-16 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN111931201A (en) * | 2020-07-15 | 2020-11-13 | 重庆第二师范学院 | Secure cloud storage system based on symmetric key |
CN112784314B (en) * | 2021-01-27 | 2022-07-29 | 青岛大学 | Data integrity detection method and device, electronic equipment and storage medium |
CN112784314A (en) * | 2021-01-27 | 2021-05-11 | 青岛大学 | Data integrity detection method and device, electronic equipment and storage medium |
CN114021158A (en) * | 2021-09-29 | 2022-02-08 | 北京师范大学 | Zero-knowledge data storage verification method, equipment and storage medium based on BLS signature |
CN115063120A (en) * | 2022-08-05 | 2022-09-16 | 国网浙江省电力有限公司金华供电公司 | Project audit system based on cloud service |
CN116938452A (en) * | 2023-09-15 | 2023-10-24 | 天津太极风控网络科技有限公司 | Cloud audit method for encrypted backup account set |
CN116938452B (en) * | 2023-09-15 | 2023-12-08 | 天津太极风控网络科技有限公司 | Cloud audit method for encrypted backup account set |
Also Published As
Publication number | Publication date |
---|---|
CN106254374B (en) | 2019-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106254374B (en) | A kind of cloud data public audit method having duplicate removal function | |
CN104811450B (en) | The date storage method and integrity verification method of a kind of identity-based in cloud computing | |
Dai et al. | A low storage room requirement framework for distributed ledger in blockchain | |
CN104811300B (en) | The key updating method of cloud storage and the implementation method of cloud data accountability system | |
CN111914027B (en) | Block chain transaction keyword searchable encryption method and system | |
Ren et al. | Mutual verifiable provable data auditing in public cloud storage | |
Barsoum et al. | Provable multicopy dynamic data possession in cloud computing systems | |
CN107147720B (en) | Traceable effective public audit method and system in a kind of cloud storage data sharing | |
Yang et al. | Provable data possession of resource-constrained mobile devices in cloud computing | |
CN102611749B (en) | Cloud-storage data safety auditing method | |
CN109194466A (en) | A kind of cloud data integrity detection method and system based on block chain | |
CN109889497A (en) | A kind of data integrity verification method for going to trust | |
He et al. | Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage | |
CN105721158A (en) | Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system | |
CN109286490A (en) | Support close state data deduplication and integrity verification method and system | |
Nirmala et al. | Data confidentiality and integrity verification using user authenticator scheme in cloud | |
CN107172071A (en) | A kind of cloud Data Audit method and system based on attribute | |
CN112597542B (en) | Aggregation method and device of target asset data, storage medium and electronic device | |
CN106487786A (en) | A kind of cloud data integrity verification method based on biological characteristic and system | |
CN108123934A (en) | A kind of data integrity verifying method towards mobile terminal | |
CN110599342A (en) | Block chain-based identity information authorization method and device | |
CN106790311A (en) | Cloud Server stores integrality detection method and system | |
Yan et al. | Integrity audit of shared cloud data with identity tracking | |
CN104901804A (en) | User autonomy-based identity authentication implementation method | |
CN103916393B (en) | Cloud data-privacy protection public's auditing method based on symmetric key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |