CN106254374A - A kind of cloud data public audit method possessing duplicate removal function - Google Patents

A kind of cloud data public audit method possessing duplicate removal function Download PDF

Info

Publication number
CN106254374A
CN106254374A CN201610801119.8A CN201610801119A CN106254374A CN 106254374 A CN106254374 A CN 106254374A CN 201610801119 A CN201610801119 A CN 201610801119A CN 106254374 A CN106254374 A CN 106254374A
Authority
CN
China
Prior art keywords
cloud
server
file
audit
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610801119.8A
Other languages
Chinese (zh)
Other versions
CN106254374B (en
Inventor
禹勇
薛靓
臧力
李艳楠
邱佳惠
陈垚彤
吴淮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201610801119.8A priority Critical patent/CN106254374B/en
Publication of CN106254374A publication Critical patent/CN106254374A/en
Application granted granted Critical
Publication of CN106254374B publication Critical patent/CN106254374B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of cloud data public audit method possessing duplicate removal function, belong to technical field of network security.The present invention includes: CA server arranges systematic parameter, after user leases Cloud Server memory space, to CA server application public private key pair;The cryptographic Hash being first intended to deposit file when cloud user stores file is sent to Cloud Server, this cryptographic Hash is detected by Cloud Server, if this file is present in server, Cloud Server will send the checking of having property of challenge information to cloud user, and the most really have this data file according to response checking user.Otherwise, file is uploaded to Cloud Server together with label by cloud user;It addition, audit server can be according to the integrity of data in user's requests verification Cloud Server.The present invention utilizes one to take turns unsymmetrical key negotiation algorithm and achieves data integrity validation, and achieves Zero Knowledge secret protection, and we are also added into the data deduplication technology of practicality, substantially increase the utilization rate of Cloud Server.

Description

A kind of cloud data public audit method possessing duplicate removal function
Technical field
The invention belongs to technical field of network security, be specifically related to a kind of cloud data public audit side possessing duplicate removal function Method.
Background technology
Cloud computing is another novel computation schema after grid computing, P2P computing, effectiveness calculating, Distributed Calculation, It is provided that low cost, a large amount of storages of on-demand use and calculate resource, is the most important innovation of information technology.
Cloud storage is exactly the conceptive extension of cloud computing and expands a new concept out, is that cloud computing is provided Basic service.By cluster application, grid and distributed file system function, by application software by each in network Plant different types of storage device and gather collaborative work, have and data storage and Operational Visit function are externally provided.Powerful Calculating and storage capacity also make user be ready extensive application and data to be deployed in cloud computing platform, cloud storage is exactly one Individual with data storage and management cloud computing system as core.Cloud storage system is scalable with it, low price, on-demand payment, Position is unrelated, apply the features such as transparent, it is possible to allows user exchange the storage capacity of magnanimity for the cheapest price, has become as A profit growth point faster in cloud computing.
But, the calculating resource of high concentration allows cloud storage application face the most serious security challenge.The peace of cloud data Complete and privacy becomes restriction people and uses the principal element of cloud service.And in recent years, Ge great operator is the most each From the safe storage problem exposed, exacerbate the worry of people.Due to ordering about of interests, cloud service provider may be user's Data move on transmission speed memorizer slowly inferior or delete not accessed and access less data.Due to clothes Business device managerial competency, fault or attacked, and cloud service provider is in order to safeguard the reputation of oneself, deliberately conceals and covers number According to the event of loss, the safety and reliability of cloud storage server is not trusted by user.Person comes must to introduce auditing by third party Management cloud service provider processes the right of cloud data.
After data are passed to high in the clouds by user, data deletion may not preserved any copy in this locality, from And cannot ensure that the data fetched from high in the clouds are complete, owing to mass data can cause huge communication cost, traditional number The most unworkable according to integrity verification technology.Therefore, the basic skills of cloud data integrity detection is: user fetches low volume data Allow user's phase letter data with bigger intact being saved on Cloud Server of probability by knowledge proof and probability analysis.Mesh Before, having property of data proves that PDP (Provable Data Possession) and data can be recovered to prove POR (Proof of Retrievability) mechanism is two main cloud data integrity audit agreements.
Ateniese etc. propose data on information security top-level meeting CCS 2007 first and have the concept proving PDP And security model, they also proposed the PDP scheme of two efficient provable securities in addition.PDP protocol can allow user exist In the case of not fetching file, it is also possible to the integrity of the file that checking is stored on insincere server, save communication band Wide.The concept that can return the bright PoR that collects evidence is proposed by Juels and Kaliski, guarantees server based on stochastic sampling and error-correcting code technique Storing correct data, cloud user can fetch needs data when equally.Shacham and Waters utilizes correcting and eleting codes Design the PoR scheme of two high-efficiency compacts, and utilize the security model of Juels etc. to carry out strict Safety Argumentation.The One scheme constructs based on BLS short signature, and the response value of server and client's challenging value is the shortest, and meeting again disclosure can test Card, can provide its Security Proof under random oracle;Second scheme is to design based on pseudo-random function PRF , the length that server produces response message is shorter, but only supports secret Authentication.The two scheme the most all make use of homomorphism to test Response proof is aggregated into an authentication value by card label technique, and communication cost is minimized.
The memory space providing unlimited may bring serious financial burden to cloud service provider.But data deduplication Technology clearly can reduce the cost stored.Data deduplication technology by cloud storage provider include Dropbox and Bitcasa etc. are widely used.A report according to SNIA, using data deduplication technology to reduce inside business application needs Therefore taking of data volume to be stored, disk and bandwidth decrease 90%.The duplicate removal of data refers to avoid identical file many Secondary storage, when storage be the media file such as music and film of main flow time, the saving in space is the most obvious.Repeat It is to consume memory space that content is uploaded for the first time at them, but follow-up uploading avoids the need for taking any space.Except The saving of memory space, the data stored, the content repeated later avoids the need for uploading again, thus saves band Wide.
Data deduplication can be divided into two kinds: the duplicate removal of cloud server terminal and the duplicate removal of user side.The duplicate removal of service end is very simple, After server receives data, check whether and deposited portion.Then abandon, as existed, the file received, otherwise deposit Store up this new file.We can see that the duplicate removal of service end can not save bandwidth, because server is after receiving file Just carry out deduplication operation.On the other hand the duplicate removal of client have employed a more controversial method, and client first counts before uploading Calculate the cryptographic Hash of file, after device to be serviced receives this cryptographic Hash, check that this cryptographic Hash has existed.As existed, then User need not go up transmitting file, and user and existing file are connected, and otherwise notifies the upper transmitting file of user.The duplicate removal of client It also is able to reduce the transmission of data, the waiting time of user and the consumption of the server energy.
Under cloud storage environment, although having been proposed for many audit programs to ensure the integrity of user's data beyond the clouds And effectiveness, but they are all for traditional cloud storage Environment Design, and do not account for the application of mobile cloud storage.In order to Alleviating user's pressure in storage and calculating, the data integrity validation mechanism under cloud environment preferably supports open checking, Allow arbitrary auditing by third party person to help user to complete data integrity validation.Another problem is exactly for sharing data Carry out privacy of identities protection when of integrity verification to conflict with auditing by third party person, though auditing party's compliance audit agreement And return a correct auditing result to user.The most current cloud data integrity validation scheme is all not reaching to perfection Zero Knowledge secret protection.Along with the exploding of data in cloud storage, in order to be provided that virtual unlimited storage capacity, save band Width, the duplicate removal of file seems particularly important, but the duplicate removal of data has the security breaches that it is intrinsic, and opponent can be by providing literary composition The cryptographic Hash of part finally downloads the file being not belonging to oneself, brings great potential safety hazard to cloud storage.
Summary of the invention
The goal of the invention of the present invention is: when realizing duplicate removal storage for Cloud Server, it is understood that there may be user itself does not gathers around There is file, but cheat Cloud Server by file cryptographic Hash, authorize the situation downloading the file oneself not having with acquisition, And user data privacy concern in the open checking system of cloud data integrity, it is proposed that a kind of possess duplicate removal function Cloud data public audit method, is verified the having property of file of cloud user by Cloud Server, it is ensured that cloud user has this really Data file, meanwhile, the RESPONSE CALCULATION amount of user is little, and bandwidth consumption is low;For server, it is achieved that safe duplicate removal is deposited Storage, improves the space availability ratio of server.The method can also obtain perfect Zero Knowledge secret protection, thus prevents cloud number According to the data leak during public audit.Therefore this invention achievement is for promoting that the sustainable development of cloud computing has important Theory significance and practical value.
The cloud data public audit method possessing duplicate removal function of the present invention, specifically includes the following step:
Step one: cloud user generates key application request Concurrency and delivers to CA server, CA server is that cloud user selects one Individual random number X generates double secret key: PKI PK=(R, A), private key SK=(r, X), PKI parameter R=g-r, A=e (X, g), private key ParameterWherein g is the generation unit of p factorial method cyclic group G, and e is G × G → GTBilinear map, GTFollow for p factorial method Ring group;And private key SK is sent to cloud user by safe lane;
Step 2: the file identifier of cloud user setup file to be uploaded, and file to be uploaded is carried out fixed length segmentation, To n data block, cloud user using the data content (file the most to be uploaded itself) of file to be uploaded as the input of hash function H Parameter, generates file cryptographic Hash and is sent to Cloud Server, and wherein hash function H is that the bit sequence collection from 0 and 1 composition maps Impact resistant hash function to p factorial method cyclic group G;
Cloud Server judges whether current file cryptographic Hash exists, the most then initiate the checking of having property to cloud user;If No, then allow cloud user to upload current file;
Described having property is verified as:
Cloud Server generate having property checking request Concurrency give cloud user, described in having property checking request include challenging value chaldup, wherein challenging value chaldupGeneration process be: randomly choose from current file part data block constitute challenge collection Q, each data block m to challenge collection QjData block random number v is setj, subscript j is data block identifier and j ∈ Q, according to vj? To chaldup={ (j, vj)j∈Q, wherein Multiplication loop for mould p changes group;
Cloud user extracts the challenging value chal in the checking request of having propertydup, according to μ=∑j∈QvjmjMeet with a response value μ, Wherein mjRepresent the data block of current file, and resp will be respondeddup={ μ } returns to Cloud Server;
Cloud Server is based on challenging value chaldup, response respdupCarry out validation verification, if passing through, then having property checking Pass through;Otherwise having property authentication failed;
Cloud user uploads the process of current file: based on private key SK and hash function H be each data block generate one Label value, is sent to Cloud Server by file identifier, n data block and label value and carries out cloud storage;
Step 3: cloud user initiates audit request to audit server, described audit request includes what CA server generated The PKI of cipher key pair, file identifier to be audited, Cloud Server identifier;
Audit server carries out validation verification to the audit request received, if invalid, then refuses request;Otherwise extract cloud Identifier server, file identifier to be verified, generate challenging value chalintAnd it is sent to corresponding Cloud Server, wherein challenging value chalintGeneration process be: random choose treats that K data block identifier of audit document constitutes challenge collection Q ', corresponding challenge collection The data block identifier of Q ', arranges data block random number v 'k, subscript k is data block identifier and k ∈ Q,TherefromWith Machine Selection parameter t, generates parameter X1=gt,X2=At, wherein g is the generation unit of p factorial method cyclic group G, and A is PKI parameter A= (X g), obtains X to e1About g and X2There is the knowledge proof pf of identical discrete logarithm about A;By v 'k、X1、X2, pf generate examine Meter challenge chalint={ (k, v 'k)k∈Q′,X1,X2,pf};
Receive challenging value chalintCloud Server checking knowledge proof pf whether effective, if it is not, failure of then auditing;Otherwise Calculateμ=∑k∈Q′v′kmk,Then response resp is sentint={ σ, B} To audit server, wherein mkRepresent kth data block, TkRepresent kth data block mkLabel value;
Audit server is based on the challenging value chal sentintWith response respintCarry out validation verification, if checking is logical Cross, then send the successful Audit Report of audit to cloud user;Otherwise send the Audit Report that audit is failed.
Further, generate each data block according to private key SK=(r, X), hash function H and generate label value Ti:For, wherein miData block, fid represents file identifier, i ∈ [1, n].
Further, in step 2, Cloud Server is based on challenging value chaldup, response respdupCarry out validation verification Process is:
Cloud Server is therefromRandomly choose parameter t, generate parameter X1=gt,X2=At, X3=Rt, calculate further according to formulaTjRepresent jth data Block mjLabel value;Cloud Server checking equation B/e (σ, X1Whether)=C sets up, if setting up, then validation verification passes through;Otherwise Do not pass through.
In step 3, audit server is based on the challenging value chal sentintWith response respintCarry out validation verification:
Audit server, based on current parameter t selected, calculates X3=Rt,And test Card equation B/e (σ, X1Whether)=C sets up;If setting up, then validation verification passes through;Otherwise, do not pass through.
In sum, owing to have employed technique scheme, the invention has the beneficial effects as follows:
(1) duplicate removal storage is achieved: the present invention not only achieves the cloud user person that can entrust auditing by third party to being stored in Data in Cloud Server are audited, it addition, server is when carrying out duplicate removal storage, user can be carried out having property of data Checking, improves the safety of system, and saves user bandwidth.
(2) Zero Knowledge secret protection: the present invention utilizes to take turns unsymmetrical key negotiation and achieves Zero Knowledge secret protection, and Comparing and directly utilize zero-knowledge proof technology and realize the scheme of Zero Knowledge secret protection, mutual wheel number is few, and amount of calculation is low, and communication is opened Sell low, and protect privacy of user.
(3) response value computing cost is low, and the bandwidth consumption of transmission is low: limited in view of user's computing capability, and user responds Value calculates simple, and result of calculation bandwidth consumption is relatively low.
Accompanying drawing explanation
Fig. 1 is data deduplication storage and the data public audit process schematic of the specific embodiment of the invention.
Fig. 2 is the data deduplication storing process schematic diagram of specific implementation method of the present invention.
Fig. 3 is the data public audit process schematic of the specific embodiment of the invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with embodiment and accompanying drawing, to this Bright it is described in further detail.
The present invention is based on public key cryptography theory, proposes a kind of cloud data public audit side possessing duplicate removal function Method, is applied to the cloud storage environment that security requirement is higher.When cloud user stores file, first go up transmitting file cryptographic Hash, cloud service Device judges that, in this file presence server the most, if depositing, then user is without uploading whole file, saves user bandwidth, Cloud Server will carry out the checking of having property of file to user, it is ensured that cloud user has this file really.When cloud user wants to test During card high in the clouds data integrity, sending audit request to audit server, audit server utilizes challenge response method to verify The integrity of data in Cloud Server, protects to realize the privacy of efficient remote data integrity authentication mechanism and Zero Knowledge Protect, the present invention use an asymmetric round key negotiation scheme to generate challenge information, challenge responses auth response value.
First the mathematical theory applied the present invention is simply introduced:
(1) finite field
The territory of limited element composition is referred to as finite field, meets the character such as addition and multiplicative closed, and the rank of finite field are The wherein number of element, rank are that the finite field of prime number p is typically designated as GF (p).The non-zero entry of finite field constitutes a cyclic group, In finite field, comprising two groups, one is the group that addition is constituted by GF (p), and one is the group that-0 pair of multiplication of GF (p) is constituted.? In multiplication loop group, all powers generating unit can construct all of element in group.
(2) Hash function
Hash function is a kind of function of the output message that arbitrarily long input message can be transformed into regular length, this Individual output result is referred to as the hash value of this message.Hash function is commonly used to construct short " fingerprint " of data, and once data change, Fingerprint is the most not correct.In order to realize the certification to data, it must possess following character: 1. the input of function can be any Length;2. the output of function is regular length;3. for appointing to an x, calculate its cryptographic Hash and be easier to;4. to any given Cryptographic Hash y, find out that to meet the x of h (x)=y be computationally infeasible, this character is also referred to as anti-weak collision.Breathe out Uncommon function is mainly used in digital signature, generates " digital finger-print ", safety storage password etc..
(3) zero-knowledge proof
Zero-knowledge proof is the main tool of structure security protocol, and in brief, zero-knowledge proof is except demonstrating conclusion Correctness outside, do not reveal other any information, therefore, it can make each side to put as a part for security protocol Heart performs this agreement.Zero-knowledge proof can be divided into two types: interactively and noninteractive.Zero-knowledge proof is actual On be a kind of two sides or agreement in many ways of relating to, i.e. two sides or the taked series of steps that in many ways accomplishes a task.Prove Person proves to verifier and makes it believe oneself to know or have a certain message, but proof procedure is not divulged to verifier and appointed What is about the information being proved to message.
(4) Bilinear map
Make G1It is addition cyclic group, G2Being multiplication loop group, it is group G that their rank are all q, p1Generation unit.Map e:G1 ×G1→G2If meeting following three conditions, the most referred to as Bilinear map.1. possesses bilinearity, for arbitrarilye (aP, bP)=e (P, P)abSet up;, i.e. there is P, Q ∈ G in 2. non-degeneracy1, e (P, Q) ≠ 1;3. there is computability: e is permissible Effectively calculated.
With reference to Fig. 1, the present invention is implemented as follows:
Step S100. system is set up, generation systematic parameter:
Step S101: select a security parameter l, CA server select two multiplication loop group G with prime number p as rank and GT, select g as a generation unit of group G, e:G × G → GTIt it is a bilinear map.It is a multiplication loop group.H is Crash-resistant Hash function: H{0,1}*→G。
Step S102:CA open systematic parameter (g, H, p, G, GT,e)。
Step S200. data store, and data are uploaded to Cloud Server by cloud user:
Step S201: the concrete generation step of the public private key pair of cloud user is: CA is that cloud user selects a random number X, R, X ∈ G 1},Calculate R=g-r, (X, g), cloud client public key is PK=(R, A) to A=e, and private key is SK=(r, X).And Private key is sent to cloud user by safe lane.
Step S202: cloud user is that the file F that will upload selects an identifier fid;Then file F is divided into n block, Obtain data block { mi}1≤i≤n, for realizing duplicate removal function, first cloud user uploads H (F) to Cloud Server, and server is by comparing File cryptographic Hash determines that file is deposited the most, wherein F={mi|1≤i≤n}.Being implemented as follows of this process:
Step S202-a: cloud user is that the file that will upload selects an identifier fid.
Step S202-b: cloud user carries out fixed length segmentation to file F, obtains n data block, i.e. { mi}1≤i≤n
Step S202-c: cryptographic Hash H (F) of cloud user's calculation document, and upload onto the server.
Step S202-d: Cloud Server, after receiving H (F), is stored in the most by comparing H (F) detection this document In server.
Step S203: if file is present in cloud service, for security consideration, Cloud Server will carry out file to user Having property checking.Cloud Server generates the checking request of having property, sends a challenging value to cloud user, and cloud user receives challenge After value, calculate a response value to Cloud Server according to blocks of files and challenging value.The challenging value that Cloud Server sends according to oneself, The effectiveness of the response verification response value of cloud user, and send the checking report of having property of file according to the result.With reference to Fig. 2, Being implemented as follows of this process:
Step S203-a: Cloud Server randomly choosesThen some data blocks are selected, by a constructed challenge Set Q, to each selected data block mj, select a random numberServer sends challenging value chaldup= {(i,vj)j∈QGive cloud user.
Step S203-b: cloud user calculates μ=∑j∈Qvjmj, then send response respdup={ μ } gives Cloud Server.
Step S203-c: Cloud Server utilizes t, has deposited associated information calculation X of file user1=gt, X2=At, X3= Rt,TjRepresent jth number According to block mjLabel value.
Step S203-d: Cloud Server checking equation B/e (σ, X1Whether)=C sets up.If setting up, then send data and have Property be proved to be successful, otherwise, send data having property authentication failed.
Step S204: if file does not exists in Cloud Server, then allow cloud user to upload current file, i.e. cloud user root It is each data block m according to the private key of oneselfi, i ∈ [1, n] calculates a label value Ti, i ∈ [1, n],Then (fid, F, Tag are sentint), Tagint={ Ti}i∈[1,n]To Cloud Server, delete simultaneously Local data (optional processing mode, the purpose of deletion is to take locally stored space to reduce).Cloud Server is connecing Receive (fid, F, TagintAfter), store it in storage medium.
The data being stored in Cloud Server are audited by step S 300. audit server.
Cloud user generates an audit request, and is sent to audit server, and the data in Cloud Server are carried out by request Audit.Audit server, according to the information in audit request, generates a challenging value to Cloud Server and is sent to Cloud Server. After Cloud Server receives challenging value, the effectiveness of checking challenging value, if effectively, then calculate one according to label, blocks of files, challenging value Individual response value is sent to audit server.After audit server receives the response that Cloud Server is sent, according to choosing that oneself sends War value, the PKI of cloud user, the correctness of the response value auth response value of Cloud Server.Audit server is given according to auditing result User sends Audit Report, if being proved to be successful, then sends and audits successfully, otherwise, sends and audit unsuccessfully.Implementing of this process As follows:
Step S301: cloud user sends audit request req=PK | | fid | | Server | | Time to audit server, committee Ask it that data in Cloud Server are audited.PK is the PKI of cloud user, and fid is the file identifier of request audit, Server is the mark of Cloud Server, and Time is a timestamp.
Step S302: audit server randomly choosesThen the part data block identifier structure of fid is randomly choosed Becoming a challenge set Q ', corresponding each data block identifier selects a random numberK ∈ Q ', calculates X1=gt,X2= At, it addition, audit person utilizes the knowledge probative agreement POK that two discrete logarithms are equal, generate a knowledge proof pf, it is ensured that X1 About g and X2Identical discrete logarithm, i.e. pf=POK{ (g, A, X is had about A1,X2):loggX1=logAX2, last audit Challenge is chalint={ (i, v 'k)k∈Q,X1,X2, pf}, send it to Cloud Server.With reference to Fig. 3, implementing of this process As follows:
Step S302-a: audit server randomly choosesThen the part data block identifier of fid is randomly choosed (such as K) constitutes a challenge set Q ', and corresponding each data block identifier selects a random numberK ∈ Q ', calculates X1=gt,X2=At
Step S302-b: generate one and prove pf, pf=POK{ (g, A, X1,X2):loggX1=logAX2}。
Step S302-c: audit server calculates challenging value chalint={ (k, v 'k)k∈Q′,X1,X2, pf}, and be sent to Cloud Server.
Step S303: receive the challenge chal that audit server sendsintAfter, Cloud Server first verifies that pf is the most effective, If invalid, then failure of auditing, otherwise Cloud Server calculatesμ=∑k∈Q′vkmk,Cloud Server sends response respint={ σ, B} are to audit server.
Step S304: audit server receives response respintAfter, calculate X3=Rt,And verify equation B/e (σ, X1Whether)=C sets up.
Step S305: if equation is set up, then audit successfully;Otherwise, audit unsuccessfully.Audit server is sent out according to the result Sending Audit Report to cloud user, if auditing successfully, then sending PK | | fid | | Server | | Time | | 1, if auditing unsuccessfully, then sending out | | fid | | Server | | the Time | | 0 that send PK.
The above, the only detailed description of the invention of the present invention, any feature disclosed in this specification, unless especially Narration, all can be by other equivalences or have the alternative features of similar purpose and replaced;Disclosed all features or all sides Method or during step, in addition to mutually exclusive feature and/or step, all can be combined in any way.

Claims (4)

1. the cloud data public audit method possessing duplicate removal function, it is characterised in that comprise the following steps:
Step one: cloud user generates key application request Concurrency and delivers to CA server, CA server be cloud user select one with Machine number X generates double secret key: PKI PK=(R, A), private key SK=(r, X), PKI parameter R=g-r, A=e (X, g), private key parameterWherein g is the generation unit of p factorial method cyclic group G, and e is G × G → GTBilinear map, GTFor p rank multiplication loop Group;And private key SK is sent to cloud user by safe lane;
Step 2: the file identifier of cloud user setup file to be uploaded, and file to be uploaded is carried out fixed length segmentation, obtain n Individual data block, the data content of file to be uploaded as the input parameter of hash function H, is generated file cryptographic Hash also by cloud user Being sent to Cloud Server, wherein hash function H is that the bit sequence collection from 0 and 1 composition is mapped to the anti-of p factorial method cyclic group G Collision hash function;
Cloud Server judges whether the cryptographic Hash of current file exists, the most then initiate the checking of having property to cloud user;If it is not, Cloud user is then allowed to upload current file;
Described having property is verified as:
Cloud Server generate having property checking request Concurrency give cloud user, described in having property checking request include challenging value chaldup, wherein challenging value chaldupGeneration process be: randomly choose from current file part data block constitute challenge collection Q Each data block m to challenge collection QjData block random number v is setj, subscript j is data block identifier and j ∈ Q, according to vjObtain chaldup={ (j, vj)j∈Q, wherein Multiplication loop for mould p changes group;
Cloud user extracts the challenging value chal in the checking request of having propertydup, according to μ=∑j∈QvjmjMeet with a response value μ, wherein mj Represent the data block of current file, and resp will be respondeddup={ μ } returns to Cloud Server;
Cloud Server is based on challenging value chaldup, response respdupCarrying out validation verification, if passing through, then the checking of having property is logical Cross;Otherwise having property authentication failed;
Cloud user uploads the process of current file: based on private key SK and hash function H be each data block generate a label Value, is sent to Cloud Server by file identifier, n data block and label value and carries out cloud storage;
Step 3: cloud user initiates audit request to audit server, described audit request includes the key that CA server generates The PKI of centering, file identifier to be audited, Cloud Server identifier;
Audit server carries out validation verification to the audit request received, if invalid, then refuses request;Otherwise extract cloud service Device identifier, file identifier to be verified, generate challenging value chalintAnd it is sent to corresponding Cloud Server, wherein challenging value chalintGeneration process be: random choose treats that K data block identifier of audit document constitutes challenge collection Q ', corresponding challenge collection The data block identifier of Q ', arranges data block random number v 'k, subscript k is data block identifier and k ∈ Q,TherefromWith Machine Selection parameter t, generates parameter X1=gt,X2=At, wherein g is the generation unit of p factorial method cyclic group G, and A is PKI parameter A= (X g), obtains X to e1About g and X2There is the knowledge proof pf of identical discrete logarithm about A;By v 'k、X1、X2, pf generate examine Meter challenge chalint={ (k, v 'k)k∈Q′,X1,X2,pf};
Receive challenging value chalintCloud Server checking knowledge proof pf whether effective, if it is not, failure of then auditing;Otherwise calculateμ=∑k∈Q′v′kmk,Then response resp is sentint={ σ, B} give and examine Meter server, wherein mkRepresent kth data block, TkRepresent kth data block mkLabel value;
Audit server is based on the challenging value chal sentintWith response respintCarry out validation verification, if being verified, then The successful Audit Report of audit is sent to cloud user;Otherwise send the Audit Report that audit is failed.
2. the method for claim 1, it is characterised in that generate every number according to private key SK=(r, X), hash function H Label value T is generated according to blocki:For, wherein miData block, fid represents file identifier, i ∈ [1, n].
3. the method for claim 1, it is characterised in that in step 2, Cloud Server is based on challenging value chaldup, response respdupThe process carrying out validation verification is:
Cloud Server is therefromRandomly choose parameter t, generate parameter X1=gt,X2=At, X3=Rt, calculate further according to formulaTjRepresent jth data Block mjLabel value;
Cloud Server checking equation B/e (σ, X1Whether)=C sets up, if setting up, then validation verification passes through;Do not pass through.
4. the method for claim 1, it is characterised in that in step 3, audit server is based on the challenging value sent chalintWith response respintCarry out validation verification:
Audit server, based on current parameter t selected, calculatesAnd verify Equation B/e (σ, X1Whether)=C sets up;If setting up, then validation verification passes through;Otherwise, do not pass through.
CN201610801119.8A 2016-09-05 2016-09-05 A kind of cloud data public audit method having duplicate removal function Active CN106254374B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610801119.8A CN106254374B (en) 2016-09-05 2016-09-05 A kind of cloud data public audit method having duplicate removal function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610801119.8A CN106254374B (en) 2016-09-05 2016-09-05 A kind of cloud data public audit method having duplicate removal function

Publications (2)

Publication Number Publication Date
CN106254374A true CN106254374A (en) 2016-12-21
CN106254374B CN106254374B (en) 2019-10-01

Family

ID=57598549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610801119.8A Active CN106254374B (en) 2016-09-05 2016-09-05 A kind of cloud data public audit method having duplicate removal function

Country Status (1)

Country Link
CN (1) CN106254374B (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911708A (en) * 2017-03-23 2017-06-30 中北大学 It is a kind of to support batch processing to verify and possess the cloud data public audit method of wrong data positioning function
CN107483585A (en) * 2017-08-18 2017-12-15 西安电子科技大学 The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment
CN107635018A (en) * 2017-10-30 2018-01-26 福州大学 Support the cross-domain medical cloud storage system of urgent access control and safe duplicate removal
CN107800688A (en) * 2017-09-28 2018-03-13 南京理工大学 A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption
CN108256048A (en) * 2018-01-12 2018-07-06 哈尔滨工业大学深圳研究生院 The auditing by third party method that user file data is supported to restore
CN108377264A (en) * 2018-02-05 2018-08-07 江苏大学 Vehicular ad hoc network quorum-sensing system data report De-weight method
CN108566278A (en) * 2018-03-21 2018-09-21 北京金堤科技有限公司 The method and device of data files
CN108600263A (en) * 2018-05-09 2018-09-28 电子科技大学 A kind of safely and effectively client duplicate removal agreement proved based on possessing property
CN109829326A (en) * 2018-11-20 2019-05-31 西安电子科技大学 Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology
CN110278076A (en) * 2019-05-29 2019-09-24 电子科技大学 A kind of audit of transparence data integrity and transparence encryption data duplicate removal agreement based on block chain
CN110278087A (en) * 2019-07-05 2019-09-24 深圳市九链科技有限公司 File encryption De-weight method based on secondary Hash and zero knowledge proof method
CN110392083A (en) * 2018-04-20 2019-10-29 华为技术有限公司 Control method, device and the terminal device that the file second passes
CN110460447A (en) * 2019-08-16 2019-11-15 东北大学秦皇岛分校 Edge calculations data accountability system and auditing method based on Hash binary tree
CN110505052A (en) * 2019-08-28 2019-11-26 安徽大学 It is a kind of protect data-privacy cloud data verification method is disclosed
CN110968452A (en) * 2019-11-20 2020-04-07 华北电力大学(保定) Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid
CN111355705A (en) * 2020-02-08 2020-06-30 西安电子科技大学 Data auditing and safety duplicate removal cloud storage system and method based on block chain
CN111460524A (en) * 2020-03-27 2020-07-28 鹏城实验室 Data integrity detection method and device and computer readable storage medium
CN111859030A (en) * 2020-07-09 2020-10-30 西南交通大学 Public auditing method supporting composite data
CN111931201A (en) * 2020-07-15 2020-11-13 重庆第二师范学院 Secure cloud storage system based on symmetric key
CN112784314A (en) * 2021-01-27 2021-05-11 青岛大学 Data integrity detection method and device, electronic equipment and storage medium
CN114021158A (en) * 2021-09-29 2022-02-08 北京师范大学 Zero-knowledge data storage verification method, equipment and storage medium based on BLS signature
CN115063120A (en) * 2022-08-05 2022-09-16 国网浙江省电力有限公司金华供电公司 Project audit system based on cloud service
CN116938452A (en) * 2023-09-15 2023-10-24 天津太极风控网络科技有限公司 Cloud audit method for encrypted backup account set

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140344572A1 (en) * 2011-09-26 2014-11-20 Subhashis Mohanty Secure cloud storage and synchronization systems and methods
CN104811300A (en) * 2015-04-22 2015-07-29 电子科技大学 Secret key updating method for cloud storage and implementation method of cloud data auditing system
CN104917609A (en) * 2015-05-19 2015-09-16 华中科技大学 Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception
CN105243334A (en) * 2015-09-17 2016-01-13 浪潮(北京)电子信息产业有限公司 Data storage protection method and system
WO2016105585A1 (en) * 2014-12-23 2016-06-30 Hewlett Packard Enterprise Development Lp Data deduplication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140344572A1 (en) * 2011-09-26 2014-11-20 Subhashis Mohanty Secure cloud storage and synchronization systems and methods
WO2016105585A1 (en) * 2014-12-23 2016-06-30 Hewlett Packard Enterprise Development Lp Data deduplication
CN104811300A (en) * 2015-04-22 2015-07-29 电子科技大学 Secret key updating method for cloud storage and implementation method of cloud data auditing system
CN104917609A (en) * 2015-05-19 2015-09-16 华中科技大学 Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception
CN105243334A (en) * 2015-09-17 2016-01-13 浪潮(北京)电子信息产业有限公司 Data storage protection method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JIAWEI YUAN,SHUCHENG YU: "Secureand Constant Cost Public Cloud Storage Auditing with Deduplication", 《2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)》 *
JINGWEI LI等: "Secure Auditing and Deduplicating Datain Cloud", 《IEEE TRANSACTIONS ON COMPUTERS》 *

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911708A (en) * 2017-03-23 2017-06-30 中北大学 It is a kind of to support batch processing to verify and possess the cloud data public audit method of wrong data positioning function
CN106911708B (en) * 2017-03-23 2019-12-03 中北大学 A kind of cloud data public audit method for supporting batch processing to verify and to have wrong data positioning function
CN107483585A (en) * 2017-08-18 2017-12-15 西安电子科技大学 The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment
CN107483585B (en) * 2017-08-18 2020-03-10 西安电子科技大学 Efficient data integrity auditing system and method supporting safe deduplication in cloud environment
CN107800688A (en) * 2017-09-28 2018-03-13 南京理工大学 A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption
CN107635018A (en) * 2017-10-30 2018-01-26 福州大学 Support the cross-domain medical cloud storage system of urgent access control and safe duplicate removal
CN107635018B (en) * 2017-10-30 2021-05-18 福州大学 Cross-domain medical cloud storage system supporting emergency access control and safe deduplication
CN108256048A (en) * 2018-01-12 2018-07-06 哈尔滨工业大学深圳研究生院 The auditing by third party method that user file data is supported to restore
CN108377264A (en) * 2018-02-05 2018-08-07 江苏大学 Vehicular ad hoc network quorum-sensing system data report De-weight method
CN108566278A (en) * 2018-03-21 2018-09-21 北京金堤科技有限公司 The method and device of data files
CN110392083A (en) * 2018-04-20 2019-10-29 华为技术有限公司 Control method, device and the terminal device that the file second passes
CN110392083B (en) * 2018-04-20 2022-06-24 华为技术有限公司 File second transmission control method and device and terminal equipment
CN108600263B (en) * 2018-05-09 2020-09-25 电子科技大学 Safe and effective client duplicate removal method based on possession certification
CN108600263A (en) * 2018-05-09 2018-09-28 电子科技大学 A kind of safely and effectively client duplicate removal agreement proved based on possessing property
CN109829326B (en) * 2018-11-20 2023-04-07 西安电子科技大学 Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain
CN109829326A (en) * 2018-11-20 2019-05-31 西安电子科技大学 Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
CN109981641A (en) * 2019-03-26 2019-07-05 北京邮电大学 A kind of safe distribution subscription system and distribution subscription method based on block chain technology
CN109981641B (en) * 2019-03-26 2020-10-02 北京邮电大学 Block chain technology-based safe publishing and subscribing system and publishing and subscribing method
CN110278076A (en) * 2019-05-29 2019-09-24 电子科技大学 A kind of audit of transparence data integrity and transparence encryption data duplicate removal agreement based on block chain
CN110278087B (en) * 2019-07-05 2022-04-22 深圳市九链科技有限公司 File encryption and de-duplication method based on secondary hash and zero knowledge verification method
CN110278087A (en) * 2019-07-05 2019-09-24 深圳市九链科技有限公司 File encryption De-weight method based on secondary Hash and zero knowledge proof method
CN110460447A (en) * 2019-08-16 2019-11-15 东北大学秦皇岛分校 Edge calculations data accountability system and auditing method based on Hash binary tree
CN110460447B (en) * 2019-08-16 2022-07-08 东北大学秦皇岛分校 Hash binary tree-based edge calculation data auditing system and auditing method
CN110505052B (en) * 2019-08-28 2022-11-25 安徽大学 Cloud data public verification method for protecting data privacy
CN110505052A (en) * 2019-08-28 2019-11-26 安徽大学 It is a kind of protect data-privacy cloud data verification method is disclosed
CN110968452A (en) * 2019-11-20 2020-04-07 华北电力大学(保定) Data integrity verification method capable of safely removing duplicate in cloud storage of smart power grid
CN111355705B (en) * 2020-02-08 2021-10-15 西安电子科技大学 Data auditing and safety duplicate removal cloud storage system and method based on block chain
CN111355705A (en) * 2020-02-08 2020-06-30 西安电子科技大学 Data auditing and safety duplicate removal cloud storage system and method based on block chain
CN111460524A (en) * 2020-03-27 2020-07-28 鹏城实验室 Data integrity detection method and device and computer readable storage medium
CN111460524B (en) * 2020-03-27 2023-07-18 鹏城实验室 Method, apparatus and computer readable storage medium for detecting data integrity
CN111859030A (en) * 2020-07-09 2020-10-30 西南交通大学 Public auditing method supporting composite data
CN111859030B (en) * 2020-07-09 2023-04-28 西南交通大学 Public auditing method supporting composite data
CN111931201B (en) * 2020-07-15 2023-06-16 重庆第二师范学院 Secure cloud storage system based on symmetric key
CN111931201A (en) * 2020-07-15 2020-11-13 重庆第二师范学院 Secure cloud storage system based on symmetric key
CN112784314B (en) * 2021-01-27 2022-07-29 青岛大学 Data integrity detection method and device, electronic equipment and storage medium
CN112784314A (en) * 2021-01-27 2021-05-11 青岛大学 Data integrity detection method and device, electronic equipment and storage medium
CN114021158A (en) * 2021-09-29 2022-02-08 北京师范大学 Zero-knowledge data storage verification method, equipment and storage medium based on BLS signature
CN115063120A (en) * 2022-08-05 2022-09-16 国网浙江省电力有限公司金华供电公司 Project audit system based on cloud service
CN116938452A (en) * 2023-09-15 2023-10-24 天津太极风控网络科技有限公司 Cloud audit method for encrypted backup account set
CN116938452B (en) * 2023-09-15 2023-12-08 天津太极风控网络科技有限公司 Cloud audit method for encrypted backup account set

Also Published As

Publication number Publication date
CN106254374B (en) 2019-10-01

Similar Documents

Publication Publication Date Title
CN106254374B (en) A kind of cloud data public audit method having duplicate removal function
CN104811450B (en) The date storage method and integrity verification method of a kind of identity-based in cloud computing
Dai et al. A low storage room requirement framework for distributed ledger in blockchain
CN104811300B (en) The key updating method of cloud storage and the implementation method of cloud data accountability system
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
Ren et al. Mutual verifiable provable data auditing in public cloud storage
Barsoum et al. Provable multicopy dynamic data possession in cloud computing systems
CN107147720B (en) Traceable effective public audit method and system in a kind of cloud storage data sharing
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
CN102611749B (en) Cloud-storage data safety auditing method
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
CN109889497A (en) A kind of data integrity verification method for going to trust
He et al. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
CN105721158A (en) Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system
CN109286490A (en) Support close state data deduplication and integrity verification method and system
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
CN107172071A (en) A kind of cloud Data Audit method and system based on attribute
CN112597542B (en) Aggregation method and device of target asset data, storage medium and electronic device
CN106487786A (en) A kind of cloud data integrity verification method based on biological characteristic and system
CN108123934A (en) A kind of data integrity verifying method towards mobile terminal
CN110599342A (en) Block chain-based identity information authorization method and device
CN106790311A (en) Cloud Server stores integrality detection method and system
Yan et al. Integrity audit of shared cloud data with identity tracking
CN104901804A (en) User autonomy-based identity authentication implementation method
CN103916393B (en) Cloud data-privacy protection public's auditing method based on symmetric key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant