CN106650503A - Cloud side data integrity verification and restoration method based on IDA - Google Patents

Cloud side data integrity verification and restoration method based on IDA Download PDF

Info

Publication number
CN106650503A
CN106650503A CN201611128811.5A CN201611128811A CN106650503A CN 106650503 A CN106650503 A CN 106650503A CN 201611128811 A CN201611128811 A CN 201611128811A CN 106650503 A CN106650503 A CN 106650503A
Authority
CN
China
Prior art keywords
user
data
matrix
auditing
integrity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611128811.5A
Other languages
Chinese (zh)
Other versions
CN106650503B (en
Inventor
付安民
李雨含
李帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN201611128811.5A priority Critical patent/CN106650503B/en
Publication of CN106650503A publication Critical patent/CN106650503A/en
Application granted granted Critical
Publication of CN106650503B publication Critical patent/CN106650503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a cloud side data integrity verification and restoration method based on IDA. The method comprises the following steps of 1, user initialization; 2, storage block generation; 3, vector quantity encryption; 4, label generation; 5, challenging auditing; 6, challenging responding; 7, responding verification; 8, original data restoration. According to the scheme, an original file is encoded, and damaged data is completely restored on the basis of verifying cloud side data integrity. Meanwhile, under the condition of guaranteeing system safety, the complexity of completely verifying labels and restoring calculation is reduced, and the efficiency of the method is effectively improved.

Description

High in the clouds data integrity validation and restoration methods based on IDA
Technical field
The present invention relates to cloud storage and information security field, are related specifically to a kind of high in the clouds data integrity based on IDA Checking and restoration methods.
Background technology
With the extensive application of cloud storage service, increasing user stores data into high in the clouds.But Cloud Server is " half is credible ", data are stored in behind high in the clouds and can lose the control to data by user, therefore cannot determine the number in Cloud Server According to whether complete, when data are destroyed, corresponding initial data cannot be even more recovered.Therefore, it is how complete in checking data The initial data of destroyed data is recovered while whole property becomes a problem demanding prompt solution.
For this problem of integrity verification, research worker proposes the auditing party of integrity verification in many cloud storages Case.These schemes carry out integrity verification using means such as signature, labels to high in the clouds data.However, these schemes are being verified Can not recover to destroying data after whole property, therefore, researcher proposes the recoverable concept of data.
Although having there is the recoverable research of data, existing scheme majority is also all merely resting on integrity verification Stage, without actual restoration methods;Or simply simply original document is encoded using correcting and eleting codes, but this side Method recovery rate is relatively low.
Additionally, some minorities are realized in the recoverable scheme of data based on what is encoded, the computing cost of scheme greatly, increases The overhead burden of whole system.For example, user is not directly the corresponding integrity verification label of memory block calculating, but is first Original block calculates label, and storage label is then calculated again, has more a redundant computation;Or, user's certain server of auditing out is deposited When data are destroyed, the server is replaced using a new server generation, recalculate all data blocks of the server storage And label.
The content of the invention
It is an object of the invention to provide a kind of high in the clouds data integrity validation and restoration methods based on IDA, the method System model as shown in Fig. 2 include three class entities:Cloud storage service device, auditing by third party person TPA and user.When user needs When verifying the integrity of high in the clouds data, user sends audit request to TPA, and TPA to cloud storage service device sends challenge message. After receiving challenge message, Cloud Server can generate corresponding response message and return to TPA.TPA verifies the correctness of response message, And return result to user.When discovery has destroyed data, user initiates recovery request, and TPA audits and finds out m and is good for The data of respective stored are simultaneously returned to user by health server.User is received after not destroyed data, extensive using these data The initial data of destroyed data of appearing again.
The inventive method can not only support the checking of high in the clouds data integrity, and go back when there is destroyed data block The initial data of destroyed data can be effectively recovered, the secret protection of data can be realized, it is ensured that in audit process not The private information of user is revealed, while reducing label complexity, the efficiency of method is effectively improved.
The technical solution for realizing the object of the invention is:A kind of high in the clouds data integrity validation and recovery based on IDA Method, specifically includes following steps:
(1) user's initialization:
User is that system arranges open parameter { G, GT,q,g,e,H1,H2,spk,x1,x2,…,xn, name }, and keep {ssk,υ,KencPrivately owned.
(2) memory block is generated:
Coefficient vector is chosen, and original document F is carried out into piecemeal, the file after coefficient vector and piecemeal is carried out into Matrix Multiplication Method, obtains file to be stored F*
(3) encryption vector:
Using key KencN coefficient vector is encrypted respectively, obtains encryption vector εi
(4) label is generated:
User randomly selects filename name, and for file calculation document label t, then respectively blocks of files cikWith vectorial ai Calculate corresponding integrity verification label and generate σikAnd ωi, obtain file set of blocks Fi *With integrity tag set Ψi, finally By { t, Fi *iii(1≤i≤n) is uploaded on i-th server.
(5) audit challenge:
When user needs to verify the integrity of high in the clouds data, to auditing by third party person audit request is sent, then the 3rd Square audit person generates challenge server sequence number set and challenge message, and the cloud that the challenge message is sent in sequence number set is deposited Storage server.
(6) response challenge:
Cloud Server is received after challenge message, generates response message, then the response message is returned to into auditing by third party Person.
(7) response is verified:
Auditing by third party person receives and verify after response message the integrity of data and reach a conclusion, then returns result to use Family.
(8) initial data is recovered:
When auditing by third party person notifies that user has destroyed data block, user initiates recovery request.Third party examines Meter person audits and t (as long as just can realize during t >=m completely recover) individual health servers and returns its data storage to using again Family.User is calculated the initial data of destroyed block.
Compared with prior art, its remarkable result is the present invention:(1) recovery completely to destroying data, the present invention are realized The high in the clouds data integrity validation and restoration methods based on IDA is proposed first.The thought of IDA is applied to into high in the clouds destruction data In recovery, the recovery completely to destroying data is realized.(2) computation complexity is reduced, reduces computing cost, this invention simplifies complete Integrity verification label, reduces computation complexity, and using the less multiplication of expense and addition during data are recovered Computing, solves the problems, such as to a certain extent computing cost in background technology.(3) safety of invention be it is evincible, the Tripartite audit person requires no knowledge about the private information of user during checking integrity, it is ensured that the private information of user is not Can reveal.Because different block and label can not generate identical checking information, therefore integrity label has and can not forge Property, the label that any attacker forges can not all pass through integrity verification.
Description of the drawings
Fig. 1 is the basic flow sheet of the present invention.
Fig. 2 is the system model of the present invention.
Fig. 3 is the relation for destroying data recovery rate and health servers number t audited again.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
Choose user U under a cloud storage environment to verify its integrity of data stored and data recovery event.
As shown in the inventive method basic flow sheet (Fig. 1), the present embodiment specific implementation step is as follows:
Step 101:User initializes:User is that system chooses open parameter and arranges the public key and private key of system.
It is specific as follows:
1) multiplication loop group G, G that rank is q are chosenT, g is the generation unit of G;Choose bilinear map e:G×G→GT;Choosing Take two one-way Hash functions H1:T → G, H2:Z → G, wherein, Z is a set of integers, T ∈ (i, k) | 1≤i≤n, 1≤k≤ N/m}.Above parameter is disclosed.
2) user is that system arranges public key pk=(spk, z, { xi}1≤i≤n) and private key sk=(ssk, Kenc,υ).Concrete step It is rapid as follows:
(1a) signature key is randomly selected to (spk, ssk).
(1b) x is randomly selected1,x2,…,xn←Zp
(1c) secret value υ, K are randomly selectedenc←Zp, calculate z=gυ
Step 102:Memory block is generated:Choose coefficient vector, and original document F carried out into piecemeal, by coefficient vector and point File after block carries out matrix multiplication, obtains file to be stored F*.It is specific as follows:
1) user randomly selects n m dimensional vectorAnd combine n vector To coefficient matrix M=[ai,j] (1≤i≤n, 1≤j≤m) (any m*m matrixes must be reversible in M).
2) by original document F={ b1,b2,…,bNN/m blocks are divided into, obtain file the F={ (b after piecemeal1,…, bm),(bm+1,…,b2m),…,(…,bN), the blocked file combination is obtained into the document matrix of m* (N/m).
3) coefficient matrix for randomly selecting and document matrix are done into matrix multiplication as follows, obtains file to be stored F*
Wherein, cik=ai*Sk=ai1*b(k-1)m+1+…+aim*bkm, the i-th row blocks of files Fi *={ ci1,ci2,…,ciN/mDeposit Store up in i-th server.
Step 103:Encryption vector:User uses private key KencN coefficient vector is encrypted respectively, obtain encrypting to Amount
Step 104:Label is generated:User is file calculation document label t, then respectively blocks of files cikWith vectorial aiCalculate Corresponding integrity verification label generates σikAnd ωi, obtain file set of blocks Fi *With integrity tag set Ψi, finally incite somebody to action t, Fi *iii(1≤i≤n) is uploaded on i-th server.It is specific as follows:
1) calculation document label t processes are as follows:
(1a) user's random selection filename name ← Zp
(1b) by name, n, x1,x2,…,xnLink | | n | | x that obtain θ=name1||…||xn
(1c) θ is signed using private key ssk, and θ its corresponding signature links is obtained into file label t= (name||n||x1||…||xn)||Sigssk(name||n||x1||…||xn)。
2) data block c is calculatedikIntegrity verification label
3) encryption vector ε is calculatediIntegrity verification label ωi=H2(i)·εi υ
4) integrity verification tag set Ψ={ Ψ is exportedi={ σik}1≤k≤N/m}1≤i≤n, Γ={ ωi}1≤i < n
5) by { t, FiiiiUpload on i-th server, delete initial data local.
Step 105:Audit challenge:When user needs to verify the integrity of high in the clouds data, send to auditing by third party person Audit request, then auditing by third party person generates challenge server sequence number set and challenge message, and the challenge message is sent To the cloud storage service device in sequence number set.It is specific as follows:
1) TPA random selections one from [1, n] have subset I of L element, and element representation is challenged the index of server Number.
2) random number v is generatedk←Zp, wherein k ∈ [1, N/m].
3) by challenge collection Q={ (k, vk)}1≤k≤N/mCloud server is sent to, k represents the index of data block in server Number, the call number of server is in set I.
Step 106:Response is challenged:Cloud Server is received after challenge message, response message is generated, then by the response message The person that returns to auditing by third party.It is specific as follows:
1) Cloud Server is calculatedWith
2) by response message R={ t, μiiiiReturn to TPA.
Step 107:Checking response:Auditing by third party person receives and verify after response message the integrity of data and draw knot By, then return result to user.It is specific as follows:
1) TPA public key spk verify the signature in file label, and if signature is effective { x is recovered1,x2,…,xn, if Invalid audit is interrupted.
2) TPA is calculated
3) verify whether following equalities are set up:
e(∏i∈Iσi, g)=e (∏i∈Iδi·ηi,z)
e(∏i∈Iωi, g)=e (∏i∈IH2(i)·εi,z)
If 4) two above equation is set up, effective response is returned to user, user high in the clouds data are otherwise notified immediately There are destroyed data.
Step 108:Recover initial data:When auditing by third party person notifies that user has destroyed data block, user Initiate recovery request.Auditing by third party person audits t (as long as just can realize during t >=m completely recover) individual health servers again And its data storage is returned to user.User is calculated the initial data of destroyed block.It is specific as follows:
1) user uses private key KencCoefficient vector is decrypted, is obtained
2) coefficient vector is combined and obtains m*m matrix As=(aij)1≤i,j≤m, due to recovering to need at least m health service Device, here matrix directly write as m*m.
3) inverse matrix A of A is calculated-1=(αij)1≤i,j≤m
4) inverse matrix and the memory block for returning are done into matrix operationss, obtains initial data, calculating process is as follows:
Wherein, bji1·c1k+…+αim·cmk
Embodiment:The number for arranging server is 50, and the value of m provides destruction data recovery rate and examine again for 8, Fig. 3 The relation of health servers number t of meter.

Claims (4)

1. a kind of high in the clouds data integrity validation and restoration methods based on IDA, the method cloud storage data model is related to Entity includes:User (Users), cloud storage service device (Cloud Storage Servers) and auditing by third party person TPA (the Third Party Auditor);
It is characterized in that step is as follows:
(1) user's initialization:
It is { G, G that user arranges the open parameter of systemT,q,g,e,H1,H2,spk,x1,x2,…,xn, privately owned parameter for ssk, υ,Kenc, wherein, G, GTIt is multiplication loop group, exponent number is q, and g is the generation unit of G;Bilinear map mapping e meets:e:G×G →GT;One-way Hash function H1、H2Meet:H1:T→Z,H2:Z → G, wherein T ∈ (i, k) | and 1≤i≤n, 1≤k≤N/m }, Z is Set of integers;Spk/ssk is the public private key-pair for calculating signature;Randomly select x1,x2,…,xn←Zp, υ, Kenc←Zp
(2) memory block is generated:
User chooses the coefficient vector { a of n m dimension1..., ai..., an};Piecemeal is carried out to original document F and obtains F={ (b1,…, bm),(bm+1,…,b2m),…,(…,bN), coefficient vector and blocked file are carried out into matrix multiplication, obtain file to be stored F* =Fi *={ ci1,ci2,…,ciN/m}(1≤i≤n);
(3) encryption vector:
Using key KencN coefficient vector is encrypted respectively, obtains encryption vectorWherein, 1≤i≤ N, Enc are symmetric encipherment algorithms;
(4) label is generated:
User randomly selects filename name ← Zp, it is file calculation document label t, then respectively blocks of files cikWith vectorial aiMeter Calculate corresponding integrity verification label σikAnd ωi, obtain integrity tag set Ψi, finally by { t, Fi *iii}(1 ≤ i≤n) upload on i-th server;Wherein, 1≤i≤n, 1≤k≤N/m, t=(name | | n | | x1||…||xn)|| Sigssk(name||n||x1||…||xn), Sig is Digital Signature Algorithm,ωi=H2(i)·εi υ, Ψi={ σi1,…,σik,…,σi(N/m)};
(5) audit challenge:
When user needs to verify the integrity of high in the clouds data, to auditing by third party person audit request, auditing by third party person are sent Generate sequence number set I and challenge collection Q={ (k, vk)}1≤k≤N/m, and the server challenge collection being sent in set I;Wherein, I is the subset of [1, n], there is l (l>M) individual element;Random number vk←Zp
(6) response challenge:
Cloud Server is received after challenge collection, generates response message R={ t, μiiii, and the message is returned to into third party Audit person;Wherein,
(7) response is verified:
Auditing by third party person receives and verify after response message the integrity of data and reach a conclusion, then returns result to user;
(8) initial data is recovered:
When auditing by third party person notifies that user has destroyed data block, user initiates recovery request;Auditing by third party person Again t health servers of auditing simultaneously return its data storage to user, as long as just can realize recovering completely during t >=m;User It is calculated the initial data of destroyed block.
2. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step Suddenly the generating process of memory block is as follows in (2):
1) coefficient vector of n m dimension is randomly selected
2) coefficient vector of selection is combined into into a coefficient matrix M=[ai,j](1≤i≤n,1≤j≤m);
3) coefficient matrix and initial data block matrix are done into matrix multiplication to obtain storing block matrix, calculating process is as follows:
Wherein, cik=ai*Sk=ai1*b(k-1)m+1+…+aim*bkm
3. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step Suddenly checking answering is as follows in (7):
1) TPA public key spk verify whether the signature on file label t is correct, and { x is extracted if correct1,x2,…,xn, if wrong By mistake then audit terminates;
2) TPA is calculated
3) verify whether below equation is set up:
e(∏i∈Iσi, g)=e (∏i∈Iδi·ηi,z)
e(∏i∈Iωi, g)=e (∏i∈IH2(i)·εi,z)
If 4) two above equation is set up, TPA to user returns effective response;Otherwise notify that user is present immediately destroyed Block.
4. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step Suddenly the initial data process for recovering destroyed block in (8) is as follows:
1) coefficient vector in the t health servers that decryption is received
2) inverse matrix A of coefficient matrix is solved-1=(αij)1≤i,j≤m, recover to need at least m health servers, here matrix is straight Connect and write as m*m;
3) do matrix multiplication with inverse matrix and corresponding health data block and obtain original data block, process is as follows:
Wherein, bji1·c1k+…+αim·cmk
CN201611128811.5A 2016-12-09 2016-12-09 Cloud data integrity validation and restoration methods based on IDA Active CN106650503B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611128811.5A CN106650503B (en) 2016-12-09 2016-12-09 Cloud data integrity validation and restoration methods based on IDA

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611128811.5A CN106650503B (en) 2016-12-09 2016-12-09 Cloud data integrity validation and restoration methods based on IDA

Publications (2)

Publication Number Publication Date
CN106650503A true CN106650503A (en) 2017-05-10
CN106650503B CN106650503B (en) 2019-10-18

Family

ID=58824042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611128811.5A Active CN106650503B (en) 2016-12-09 2016-12-09 Cloud data integrity validation and restoration methods based on IDA

Country Status (1)

Country Link
CN (1) CN106650503B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423637A (en) * 2017-07-31 2017-12-01 南京理工大学 Support the traceable integrality auditing method of electronic health record data on cloud
CN108256048A (en) * 2018-01-12 2018-07-06 哈尔滨工业大学深圳研究生院 The auditing by third party method that user file data is supported to restore
CN109104449A (en) * 2017-06-21 2018-12-28 北京大学 A kind of more Backup Data property held methods of proof under cloud storage environment
CN109117672A (en) * 2018-08-24 2019-01-01 青岛大学 Carry out the hiding cloud storage Data Audit method of sensitive information
CN109145650A (en) * 2018-08-07 2019-01-04 暨南大学 The outsourcing big data auditing method of highly effective and safe under a kind of cloud environment
CN109688103A (en) * 2018-11-09 2019-04-26 杭州安恒信息技术股份有限公司 The auditable encryption storage method of one kind and system
CN110210254A (en) * 2019-06-13 2019-09-06 东华大学 The optimization verification method of repeated data in a kind of more data integrity validations
CN110752932A (en) * 2019-10-18 2020-02-04 西安建筑科技大学 Efficient cloud data integrity verification method suitable for third-party audit
CN111210378A (en) * 2019-12-30 2020-05-29 北京工业大学 Recoverability method based on image data on industrial cloud
CN111447064A (en) * 2020-03-06 2020-07-24 电子科技大学 Password reverse firewall method suitable for certificateless encryption
CN111800258A (en) * 2020-06-01 2020-10-20 南京信息工程大学 Data integrity auditing method supporting damaged data recovery under cloud education
CN111931249A (en) * 2020-09-22 2020-11-13 西南石油大学 Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism
CN112182662A (en) * 2020-09-09 2021-01-05 北京科技大学 Agile development cloud platform-oriented data integrity verification method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218574A (en) * 2013-04-09 2013-07-24 电子科技大学 Hash tree-based data dynamic operation verifiability method
CN104850786A (en) * 2015-06-03 2015-08-19 舒辉 Environmental reconstruction based malicious-code integrity analysis method
CN104993937A (en) * 2015-07-07 2015-10-21 电子科技大学 Method for testing integrity of cloud storage data
CN105939191A (en) * 2016-07-08 2016-09-14 南京理工大学 Client secure deduplication method of ciphertext data in cloud storage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218574A (en) * 2013-04-09 2013-07-24 电子科技大学 Hash tree-based data dynamic operation verifiability method
CN104850786A (en) * 2015-06-03 2015-08-19 舒辉 Environmental reconstruction based malicious-code integrity analysis method
CN104993937A (en) * 2015-07-07 2015-10-21 电子科技大学 Method for testing integrity of cloud storage data
CN105939191A (en) * 2016-07-08 2016-09-14 南京理工大学 Client secure deduplication method of ciphertext data in cloud storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZHEN MO等: "A Dynamic Proof of Retrievability (PoR) Scheme", 《IEEE ICC 2012 - COMMUNICATION AND INFORMATION SYSTEMS SECURITY SYMPOSIUM》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104449B (en) * 2017-06-21 2020-12-22 北京大学 Multi-backup data possession proving method in cloud storage environment
CN109104449A (en) * 2017-06-21 2018-12-28 北京大学 A kind of more Backup Data property held methods of proof under cloud storage environment
CN107423637A (en) * 2017-07-31 2017-12-01 南京理工大学 Support the traceable integrality auditing method of electronic health record data on cloud
CN108256048A (en) * 2018-01-12 2018-07-06 哈尔滨工业大学深圳研究生院 The auditing by third party method that user file data is supported to restore
CN109145650A (en) * 2018-08-07 2019-01-04 暨南大学 The outsourcing big data auditing method of highly effective and safe under a kind of cloud environment
CN109145650B (en) * 2018-08-07 2021-10-08 暨南大学 Efficient and safe outsourcing big data auditing method in cloud environment
CN109117672A (en) * 2018-08-24 2019-01-01 青岛大学 Carry out the hiding cloud storage Data Audit method of sensitive information
CN109688103B (en) * 2018-11-09 2021-07-16 杭州安恒信息技术股份有限公司 Auditable encryption storage method
CN109688103A (en) * 2018-11-09 2019-04-26 杭州安恒信息技术股份有限公司 The auditable encryption storage method of one kind and system
CN110210254A (en) * 2019-06-13 2019-09-06 东华大学 The optimization verification method of repeated data in a kind of more data integrity validations
CN110210254B (en) * 2019-06-13 2023-06-02 东华大学 Optimization verification method for repeated data in multiple data integrity verification
CN110752932A (en) * 2019-10-18 2020-02-04 西安建筑科技大学 Efficient cloud data integrity verification method suitable for third-party audit
CN110752932B (en) * 2019-10-18 2022-09-27 西安建筑科技大学 Efficient cloud data integrity verification method suitable for third-party audit
CN111210378A (en) * 2019-12-30 2020-05-29 北京工业大学 Recoverability method based on image data on industrial cloud
CN111210378B (en) * 2019-12-30 2023-09-19 北京工业大学 Restorability method based on image data on industrial cloud
CN111447064A (en) * 2020-03-06 2020-07-24 电子科技大学 Password reverse firewall method suitable for certificateless encryption
CN111800258A (en) * 2020-06-01 2020-10-20 南京信息工程大学 Data integrity auditing method supporting damaged data recovery under cloud education
CN112182662A (en) * 2020-09-09 2021-01-05 北京科技大学 Agile development cloud platform-oriented data integrity verification method and system
CN111931249A (en) * 2020-09-22 2020-11-13 西南石油大学 Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism
CN111931249B (en) * 2020-09-22 2021-01-08 西南石油大学 Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism

Also Published As

Publication number Publication date
CN106650503B (en) 2019-10-18

Similar Documents

Publication Publication Date Title
CN106650503B (en) Cloud data integrity validation and restoration methods based on IDA
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
Yu et al. Improved security of a dynamic remote data possession checking protocol for cloud storage
CN107800688A (en) A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption
CN105791321A (en) Cloud storage data common auditing method possessing secret key leakage resistance characteristic
CN104320393B (en) The controllable efficient attribute base proxy re-encryption method of re-encryption
Azraoui et al. Stealthguard: Proofs of retrievability with hidden watchdogs
CN105516340B (en) A kind of cloud storage data restorability verification method and system
CN112187798B (en) Bidirectional access control method and system applied to cloud-side data sharing
CN111523133A (en) Block chain and cloud data collaborative sharing method
CN107423637B (en) Integrity auditing method supporting traceability of electronic medical record data on cloud
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
CN109670826B (en) Anti-quantum computation block chain transaction method based on asymmetric key pool
CN114219483B (en) Method, equipment and storage medium for sharing block chain data based on LWE-CPBE
CN110138543A (en) Blind label decryption method under lattice public-key cryptosystem
CN112491529B (en) Data file encryption and integrity verification method and system used in untrusted server environment
CN110750796B (en) Encrypted data deduplication method supporting public audit
CN105406966A (en) Threshold secret information distribution, restoration, integrity verification method and device
CN104219047A (en) A signature verification method and apparatus
CN112906056A (en) Cloud storage key security management method based on block chain
CN108881186A (en) A kind of shared compressed sensing encryption method with Error Control of achievable key
CN110176995A (en) Afterwards without certificate label decryption method on the lattice of quantum safety
CN106612171A (en) Data soft recovery method in cloud storage
CN117201132A (en) Multi-committee attribute base encryption method capable of achieving complete decentralization and application of multi-committee attribute base encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant