CN106650503A - Cloud side data integrity verification and restoration method based on IDA - Google Patents
Cloud side data integrity verification and restoration method based on IDA Download PDFInfo
- Publication number
- CN106650503A CN106650503A CN201611128811.5A CN201611128811A CN106650503A CN 106650503 A CN106650503 A CN 106650503A CN 201611128811 A CN201611128811 A CN 201611128811A CN 106650503 A CN106650503 A CN 106650503A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- matrix
- auditing
- integrity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a cloud side data integrity verification and restoration method based on IDA. The method comprises the following steps of 1, user initialization; 2, storage block generation; 3, vector quantity encryption; 4, label generation; 5, challenging auditing; 6, challenging responding; 7, responding verification; 8, original data restoration. According to the scheme, an original file is encoded, and damaged data is completely restored on the basis of verifying cloud side data integrity. Meanwhile, under the condition of guaranteeing system safety, the complexity of completely verifying labels and restoring calculation is reduced, and the efficiency of the method is effectively improved.
Description
Technical field
The present invention relates to cloud storage and information security field, are related specifically to a kind of high in the clouds data integrity based on IDA
Checking and restoration methods.
Background technology
With the extensive application of cloud storage service, increasing user stores data into high in the clouds.But Cloud Server is
" half is credible ", data are stored in behind high in the clouds and can lose the control to data by user, therefore cannot determine the number in Cloud Server
According to whether complete, when data are destroyed, corresponding initial data cannot be even more recovered.Therefore, it is how complete in checking data
The initial data of destroyed data is recovered while whole property becomes a problem demanding prompt solution.
For this problem of integrity verification, research worker proposes the auditing party of integrity verification in many cloud storages
Case.These schemes carry out integrity verification using means such as signature, labels to high in the clouds data.However, these schemes are being verified
Can not recover to destroying data after whole property, therefore, researcher proposes the recoverable concept of data.
Although having there is the recoverable research of data, existing scheme majority is also all merely resting on integrity verification
Stage, without actual restoration methods;Or simply simply original document is encoded using correcting and eleting codes, but this side
Method recovery rate is relatively low.
Additionally, some minorities are realized in the recoverable scheme of data based on what is encoded, the computing cost of scheme greatly, increases
The overhead burden of whole system.For example, user is not directly the corresponding integrity verification label of memory block calculating, but is first
Original block calculates label, and storage label is then calculated again, has more a redundant computation;Or, user's certain server of auditing out is deposited
When data are destroyed, the server is replaced using a new server generation, recalculate all data blocks of the server storage
And label.
The content of the invention
It is an object of the invention to provide a kind of high in the clouds data integrity validation and restoration methods based on IDA, the method
System model as shown in Fig. 2 include three class entities:Cloud storage service device, auditing by third party person TPA and user.When user needs
When verifying the integrity of high in the clouds data, user sends audit request to TPA, and TPA to cloud storage service device sends challenge message.
After receiving challenge message, Cloud Server can generate corresponding response message and return to TPA.TPA verifies the correctness of response message,
And return result to user.When discovery has destroyed data, user initiates recovery request, and TPA audits and finds out m and is good for
The data of respective stored are simultaneously returned to user by health server.User is received after not destroyed data, extensive using these data
The initial data of destroyed data of appearing again.
The inventive method can not only support the checking of high in the clouds data integrity, and go back when there is destroyed data block
The initial data of destroyed data can be effectively recovered, the secret protection of data can be realized, it is ensured that in audit process not
The private information of user is revealed, while reducing label complexity, the efficiency of method is effectively improved.
The technical solution for realizing the object of the invention is:A kind of high in the clouds data integrity validation and recovery based on IDA
Method, specifically includes following steps:
(1) user's initialization:
User is that system arranges open parameter { G, GT,q,g,e,H1,H2,spk,x1,x2,…,xn, name }, and keep
{ssk,υ,KencPrivately owned.
(2) memory block is generated:
Coefficient vector is chosen, and original document F is carried out into piecemeal, the file after coefficient vector and piecemeal is carried out into Matrix Multiplication
Method, obtains file to be stored F*。
(3) encryption vector:
Using key KencN coefficient vector is encrypted respectively, obtains encryption vector εi。
(4) label is generated:
User randomly selects filename name, and for file calculation document label t, then respectively blocks of files cikWith vectorial ai
Calculate corresponding integrity verification label and generate σikAnd ωi, obtain file set of blocks Fi *With integrity tag set Ψi, finally
By { t, Fi *,εi,Ψi,ωi(1≤i≤n) is uploaded on i-th server.
(5) audit challenge:
When user needs to verify the integrity of high in the clouds data, to auditing by third party person audit request is sent, then the 3rd
Square audit person generates challenge server sequence number set and challenge message, and the cloud that the challenge message is sent in sequence number set is deposited
Storage server.
(6) response challenge:
Cloud Server is received after challenge message, generates response message, then the response message is returned to into auditing by third party
Person.
(7) response is verified:
Auditing by third party person receives and verify after response message the integrity of data and reach a conclusion, then returns result to use
Family.
(8) initial data is recovered:
When auditing by third party person notifies that user has destroyed data block, user initiates recovery request.Third party examines
Meter person audits and t (as long as just can realize during t >=m completely recover) individual health servers and returns its data storage to using again
Family.User is calculated the initial data of destroyed block.
Compared with prior art, its remarkable result is the present invention:(1) recovery completely to destroying data, the present invention are realized
The high in the clouds data integrity validation and restoration methods based on IDA is proposed first.The thought of IDA is applied to into high in the clouds destruction data
In recovery, the recovery completely to destroying data is realized.(2) computation complexity is reduced, reduces computing cost, this invention simplifies complete
Integrity verification label, reduces computation complexity, and using the less multiplication of expense and addition during data are recovered
Computing, solves the problems, such as to a certain extent computing cost in background technology.(3) safety of invention be it is evincible, the
Tripartite audit person requires no knowledge about the private information of user during checking integrity, it is ensured that the private information of user is not
Can reveal.Because different block and label can not generate identical checking information, therefore integrity label has and can not forge
Property, the label that any attacker forges can not all pass through integrity verification.
Description of the drawings
Fig. 1 is the basic flow sheet of the present invention.
Fig. 2 is the system model of the present invention.
Fig. 3 is the relation for destroying data recovery rate and health servers number t audited again.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
Choose user U under a cloud storage environment to verify its integrity of data stored and data recovery event.
As shown in the inventive method basic flow sheet (Fig. 1), the present embodiment specific implementation step is as follows:
Step 101:User initializes:User is that system chooses open parameter and arranges the public key and private key of system.
It is specific as follows:
1) multiplication loop group G, G that rank is q are chosenT, g is the generation unit of G;Choose bilinear map e:G×G→GT;Choosing
Take two one-way Hash functions H1:T → G, H2:Z → G, wherein, Z is a set of integers, T ∈ (i, k) | 1≤i≤n, 1≤k≤
N/m}.Above parameter is disclosed.
2) user is that system arranges public key pk=(spk, z, { xi}1≤i≤n) and private key sk=(ssk, Kenc,υ).Concrete step
It is rapid as follows:
(1a) signature key is randomly selected to (spk, ssk).
(1b) x is randomly selected1,x2,…,xn←Zp。
(1c) secret value υ, K are randomly selectedenc←Zp, calculate z=gυ。
Step 102:Memory block is generated:Choose coefficient vector, and original document F carried out into piecemeal, by coefficient vector and point
File after block carries out matrix multiplication, obtains file to be stored F*.It is specific as follows:
1) user randomly selects n m dimensional vectorAnd combine n vector
To coefficient matrix M=[ai,j] (1≤i≤n, 1≤j≤m) (any m*m matrixes must be reversible in M).
2) by original document F={ b1,b2,…,bNN/m blocks are divided into, obtain file the F={ (b after piecemeal1,…,
bm),(bm+1,…,b2m),…,(…,bN), the blocked file combination is obtained into the document matrix of m* (N/m).
3) coefficient matrix for randomly selecting and document matrix are done into matrix multiplication as follows, obtains file to be stored
F*。
Wherein, cik=ai*Sk=ai1*b(k-1)m+1+…+aim*bkm, the i-th row blocks of files Fi *={ ci1,ci2,…,ciN/mDeposit
Store up in i-th server.
Step 103:Encryption vector:User uses private key KencN coefficient vector is encrypted respectively, obtain encrypting to
Amount
Step 104:Label is generated:User is file calculation document label t, then respectively blocks of files cikWith vectorial aiCalculate
Corresponding integrity verification label generates σikAnd ωi, obtain file set of blocks Fi *With integrity tag set Ψi, finally incite somebody to action t,
Fi *,εi,Ψi,ωi(1≤i≤n) is uploaded on i-th server.It is specific as follows:
1) calculation document label t processes are as follows:
(1a) user's random selection filename name ← Zp。
(1b) by name, n, x1,x2,…,xnLink | | n | | x that obtain θ=name1||…||xn。
(1c) θ is signed using private key ssk, and θ its corresponding signature links is obtained into file label t=
(name||n||x1||…||xn)||Sigssk(name||n||x1||…||xn)。
2) data block c is calculatedikIntegrity verification label
3) encryption vector ε is calculatediIntegrity verification label ωi=H2(i)·εi υ。
4) integrity verification tag set Ψ={ Ψ is exportedi={ σik}1≤k≤N/m}1≤i≤n, Γ={ ωi}1≤i < n。
5) by { t, Fi,εi,Ψi,ωiUpload on i-th server, delete initial data local.
Step 105:Audit challenge:When user needs to verify the integrity of high in the clouds data, send to auditing by third party person
Audit request, then auditing by third party person generates challenge server sequence number set and challenge message, and the challenge message is sent
To the cloud storage service device in sequence number set.It is specific as follows:
1) TPA random selections one from [1, n] have subset I of L element, and element representation is challenged the index of server
Number.
2) random number v is generatedk←Zp, wherein k ∈ [1, N/m].
3) by challenge collection Q={ (k, vk)}1≤k≤N/mCloud server is sent to, k represents the index of data block in server
Number, the call number of server is in set I.
Step 106:Response is challenged:Cloud Server is received after challenge message, response message is generated, then by the response message
The person that returns to auditing by third party.It is specific as follows:
1) Cloud Server is calculatedWith
2) by response message R={ t, μi,σi,εi,ωiReturn to TPA.
Step 107:Checking response:Auditing by third party person receives and verify after response message the integrity of data and draw knot
By, then return result to user.It is specific as follows:
1) TPA public key spk verify the signature in file label, and if signature is effective { x is recovered1,x2,…,xn, if
Invalid audit is interrupted.
2) TPA is calculated
3) verify whether following equalities are set up:
e(∏i∈Iσi, g)=e (∏i∈Iδi·ηi,z)
e(∏i∈Iωi, g)=e (∏i∈IH2(i)·εi,z)
If 4) two above equation is set up, effective response is returned to user, user high in the clouds data are otherwise notified immediately
There are destroyed data.
Step 108:Recover initial data:When auditing by third party person notifies that user has destroyed data block, user
Initiate recovery request.Auditing by third party person audits t (as long as just can realize during t >=m completely recover) individual health servers again
And its data storage is returned to user.User is calculated the initial data of destroyed block.It is specific as follows:
1) user uses private key KencCoefficient vector is decrypted, is obtained
2) coefficient vector is combined and obtains m*m matrix As=(aij)1≤i,j≤m, due to recovering to need at least m health service
Device, here matrix directly write as m*m.
3) inverse matrix A of A is calculated-1=(αij)1≤i,j≤m。
4) inverse matrix and the memory block for returning are done into matrix operationss, obtains initial data, calculating process is as follows:
Wherein, bj=αi1·c1k+…+αim·cmk。
Embodiment:The number for arranging server is 50, and the value of m provides destruction data recovery rate and examine again for 8, Fig. 3
The relation of health servers number t of meter.
Claims (4)
1. a kind of high in the clouds data integrity validation and restoration methods based on IDA, the method cloud storage data model is related to
Entity includes:User (Users), cloud storage service device (Cloud Storage Servers) and auditing by third party person TPA (the
Third Party Auditor);
It is characterized in that step is as follows:
(1) user's initialization:
It is { G, G that user arranges the open parameter of systemT,q,g,e,H1,H2,spk,x1,x2,…,xn, privately owned parameter for ssk,
υ,Kenc, wherein, G, GTIt is multiplication loop group, exponent number is q, and g is the generation unit of G;Bilinear map mapping e meets:e:G×G
→GT;One-way Hash function H1、H2Meet:H1:T→Z,H2:Z → G, wherein T ∈ (i, k) | and 1≤i≤n, 1≤k≤N/m }, Z is
Set of integers;Spk/ssk is the public private key-pair for calculating signature;Randomly select x1,x2,…,xn←Zp, υ, Kenc←Zp;
(2) memory block is generated:
User chooses the coefficient vector { a of n m dimension1..., ai..., an};Piecemeal is carried out to original document F and obtains F={ (b1,…,
bm),(bm+1,…,b2m),…,(…,bN), coefficient vector and blocked file are carried out into matrix multiplication, obtain file to be stored F*
=Fi *={ ci1,ci2,…,ciN/m}(1≤i≤n);
(3) encryption vector:
Using key KencN coefficient vector is encrypted respectively, obtains encryption vectorWherein, 1≤i≤
N, Enc are symmetric encipherment algorithms;
(4) label is generated:
User randomly selects filename name ← Zp, it is file calculation document label t, then respectively blocks of files cikWith vectorial aiMeter
Calculate corresponding integrity verification label σikAnd ωi, obtain integrity tag set Ψi, finally by { t, Fi *,εi,Ψi,ωi}(1
≤ i≤n) upload on i-th server;Wherein, 1≤i≤n, 1≤k≤N/m, t=(name | | n | | x1||…||xn)||
Sigssk(name||n||x1||…||xn), Sig is Digital Signature Algorithm,ωi=H2(i)·εi υ,
Ψi={ σi1,…,σik,…,σi(N/m)};
(5) audit challenge:
When user needs to verify the integrity of high in the clouds data, to auditing by third party person audit request, auditing by third party person are sent
Generate sequence number set I and challenge collection Q={ (k, vk)}1≤k≤N/m, and the server challenge collection being sent in set I;Wherein,
I is the subset of [1, n], there is l (l>M) individual element;Random number vk←Zp;
(6) response challenge:
Cloud Server is received after challenge collection, generates response message R={ t, μi,σi,εi,ωi, and the message is returned to into third party
Audit person;Wherein,
(7) response is verified:
Auditing by third party person receives and verify after response message the integrity of data and reach a conclusion, then returns result to user;
(8) initial data is recovered:
When auditing by third party person notifies that user has destroyed data block, user initiates recovery request;Auditing by third party person
Again t health servers of auditing simultaneously return its data storage to user, as long as just can realize recovering completely during t >=m;User
It is calculated the initial data of destroyed block.
2. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step
Suddenly the generating process of memory block is as follows in (2):
1) coefficient vector of n m dimension is randomly selected
2) coefficient vector of selection is combined into into a coefficient matrix M=[ai,j](1≤i≤n,1≤j≤m);
3) coefficient matrix and initial data block matrix are done into matrix multiplication to obtain storing block matrix, calculating process is as follows:
Wherein, cik=ai*Sk=ai1*b(k-1)m+1+…+aim*bkm。
3. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step
Suddenly checking answering is as follows in (7):
1) TPA public key spk verify whether the signature on file label t is correct, and { x is extracted if correct1,x2,…,xn, if wrong
By mistake then audit terminates;
2) TPA is calculated
3) verify whether below equation is set up:
e(∏i∈Iσi, g)=e (∏i∈Iδi·ηi,z)
e(∏i∈Iωi, g)=e (∏i∈IH2(i)·εi,z)
If 4) two above equation is set up, TPA to user returns effective response;Otherwise notify that user is present immediately destroyed
Block.
4. the high in the clouds data integrity validation and restoration methods based on IDA according to claim 1, it is characterised in that:Step
Suddenly the initial data process for recovering destroyed block in (8) is as follows:
1) coefficient vector in the t health servers that decryption is received
2) inverse matrix A of coefficient matrix is solved-1=(αij)1≤i,j≤m, recover to need at least m health servers, here matrix is straight
Connect and write as m*m;
3) do matrix multiplication with inverse matrix and corresponding health data block and obtain original data block, process is as follows:
Wherein, bj=αi1·c1k+…+αim·cmk。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128811.5A CN106650503B (en) | 2016-12-09 | 2016-12-09 | Cloud data integrity validation and restoration methods based on IDA |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128811.5A CN106650503B (en) | 2016-12-09 | 2016-12-09 | Cloud data integrity validation and restoration methods based on IDA |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650503A true CN106650503A (en) | 2017-05-10 |
CN106650503B CN106650503B (en) | 2019-10-18 |
Family
ID=58824042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611128811.5A Active CN106650503B (en) | 2016-12-09 | 2016-12-09 | Cloud data integrity validation and restoration methods based on IDA |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650503B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107423637A (en) * | 2017-07-31 | 2017-12-01 | 南京理工大学 | Support the traceable integrality auditing method of electronic health record data on cloud |
CN108256048A (en) * | 2018-01-12 | 2018-07-06 | 哈尔滨工业大学深圳研究生院 | The auditing by third party method that user file data is supported to restore |
CN109104449A (en) * | 2017-06-21 | 2018-12-28 | 北京大学 | A kind of more Backup Data property held methods of proof under cloud storage environment |
CN109117672A (en) * | 2018-08-24 | 2019-01-01 | 青岛大学 | Carry out the hiding cloud storage Data Audit method of sensitive information |
CN109145650A (en) * | 2018-08-07 | 2019-01-04 | 暨南大学 | The outsourcing big data auditing method of highly effective and safe under a kind of cloud environment |
CN109688103A (en) * | 2018-11-09 | 2019-04-26 | 杭州安恒信息技术股份有限公司 | The auditable encryption storage method of one kind and system |
CN110210254A (en) * | 2019-06-13 | 2019-09-06 | 东华大学 | The optimization verification method of repeated data in a kind of more data integrity validations |
CN110752932A (en) * | 2019-10-18 | 2020-02-04 | 西安建筑科技大学 | Efficient cloud data integrity verification method suitable for third-party audit |
CN111210378A (en) * | 2019-12-30 | 2020-05-29 | 北京工业大学 | Recoverability method based on image data on industrial cloud |
CN111447064A (en) * | 2020-03-06 | 2020-07-24 | 电子科技大学 | Password reverse firewall method suitable for certificateless encryption |
CN111800258A (en) * | 2020-06-01 | 2020-10-20 | 南京信息工程大学 | Data integrity auditing method supporting damaged data recovery under cloud education |
CN111931249A (en) * | 2020-09-22 | 2020-11-13 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
CN112182662A (en) * | 2020-09-09 | 2021-01-05 | 北京科技大学 | Agile development cloud platform-oriented data integrity verification method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218574A (en) * | 2013-04-09 | 2013-07-24 | 电子科技大学 | Hash tree-based data dynamic operation verifiability method |
CN104850786A (en) * | 2015-06-03 | 2015-08-19 | 舒辉 | Environmental reconstruction based malicious-code integrity analysis method |
CN104993937A (en) * | 2015-07-07 | 2015-10-21 | 电子科技大学 | Method for testing integrity of cloud storage data |
CN105939191A (en) * | 2016-07-08 | 2016-09-14 | 南京理工大学 | Client secure deduplication method of ciphertext data in cloud storage |
-
2016
- 2016-12-09 CN CN201611128811.5A patent/CN106650503B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103218574A (en) * | 2013-04-09 | 2013-07-24 | 电子科技大学 | Hash tree-based data dynamic operation verifiability method |
CN104850786A (en) * | 2015-06-03 | 2015-08-19 | 舒辉 | Environmental reconstruction based malicious-code integrity analysis method |
CN104993937A (en) * | 2015-07-07 | 2015-10-21 | 电子科技大学 | Method for testing integrity of cloud storage data |
CN105939191A (en) * | 2016-07-08 | 2016-09-14 | 南京理工大学 | Client secure deduplication method of ciphertext data in cloud storage |
Non-Patent Citations (1)
Title |
---|
ZHEN MO等: "A Dynamic Proof of Retrievability (PoR) Scheme", 《IEEE ICC 2012 - COMMUNICATION AND INFORMATION SYSTEMS SECURITY SYMPOSIUM》 * |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109104449B (en) * | 2017-06-21 | 2020-12-22 | 北京大学 | Multi-backup data possession proving method in cloud storage environment |
CN109104449A (en) * | 2017-06-21 | 2018-12-28 | 北京大学 | A kind of more Backup Data property held methods of proof under cloud storage environment |
CN107423637A (en) * | 2017-07-31 | 2017-12-01 | 南京理工大学 | Support the traceable integrality auditing method of electronic health record data on cloud |
CN108256048A (en) * | 2018-01-12 | 2018-07-06 | 哈尔滨工业大学深圳研究生院 | The auditing by third party method that user file data is supported to restore |
CN109145650A (en) * | 2018-08-07 | 2019-01-04 | 暨南大学 | The outsourcing big data auditing method of highly effective and safe under a kind of cloud environment |
CN109145650B (en) * | 2018-08-07 | 2021-10-08 | 暨南大学 | Efficient and safe outsourcing big data auditing method in cloud environment |
CN109117672A (en) * | 2018-08-24 | 2019-01-01 | 青岛大学 | Carry out the hiding cloud storage Data Audit method of sensitive information |
CN109688103B (en) * | 2018-11-09 | 2021-07-16 | 杭州安恒信息技术股份有限公司 | Auditable encryption storage method |
CN109688103A (en) * | 2018-11-09 | 2019-04-26 | 杭州安恒信息技术股份有限公司 | The auditable encryption storage method of one kind and system |
CN110210254A (en) * | 2019-06-13 | 2019-09-06 | 东华大学 | The optimization verification method of repeated data in a kind of more data integrity validations |
CN110210254B (en) * | 2019-06-13 | 2023-06-02 | 东华大学 | Optimization verification method for repeated data in multiple data integrity verification |
CN110752932A (en) * | 2019-10-18 | 2020-02-04 | 西安建筑科技大学 | Efficient cloud data integrity verification method suitable for third-party audit |
CN110752932B (en) * | 2019-10-18 | 2022-09-27 | 西安建筑科技大学 | Efficient cloud data integrity verification method suitable for third-party audit |
CN111210378A (en) * | 2019-12-30 | 2020-05-29 | 北京工业大学 | Recoverability method based on image data on industrial cloud |
CN111210378B (en) * | 2019-12-30 | 2023-09-19 | 北京工业大学 | Restorability method based on image data on industrial cloud |
CN111447064A (en) * | 2020-03-06 | 2020-07-24 | 电子科技大学 | Password reverse firewall method suitable for certificateless encryption |
CN111800258A (en) * | 2020-06-01 | 2020-10-20 | 南京信息工程大学 | Data integrity auditing method supporting damaged data recovery under cloud education |
CN112182662A (en) * | 2020-09-09 | 2021-01-05 | 北京科技大学 | Agile development cloud platform-oriented data integrity verification method and system |
CN111931249A (en) * | 2020-09-22 | 2020-11-13 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
CN111931249B (en) * | 2020-09-22 | 2021-01-08 | 西南石油大学 | Medical secret data statistical analysis method supporting transmission fault-tolerant mechanism |
Also Published As
Publication number | Publication date |
---|---|
CN106650503B (en) | 2019-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106650503B (en) | Cloud data integrity validation and restoration methods based on IDA | |
CN105939191B (en) | The client secure De-weight method of ciphertext data in a kind of cloud storage | |
CN109194466A (en) | A kind of cloud data integrity detection method and system based on block chain | |
Yu et al. | Improved security of a dynamic remote data possession checking protocol for cloud storage | |
CN107800688A (en) | A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption | |
CN105791321A (en) | Cloud storage data common auditing method possessing secret key leakage resistance characteristic | |
CN104320393B (en) | The controllable efficient attribute base proxy re-encryption method of re-encryption | |
Azraoui et al. | Stealthguard: Proofs of retrievability with hidden watchdogs | |
CN105516340B (en) | A kind of cloud storage data restorability verification method and system | |
CN112187798B (en) | Bidirectional access control method and system applied to cloud-side data sharing | |
CN111523133A (en) | Block chain and cloud data collaborative sharing method | |
CN107423637B (en) | Integrity auditing method supporting traceability of electronic medical record data on cloud | |
Nirmala et al. | Data confidentiality and integrity verification using user authenticator scheme in cloud | |
CN109670826B (en) | Anti-quantum computation block chain transaction method based on asymmetric key pool | |
CN114219483B (en) | Method, equipment and storage medium for sharing block chain data based on LWE-CPBE | |
CN110138543A (en) | Blind label decryption method under lattice public-key cryptosystem | |
CN112491529B (en) | Data file encryption and integrity verification method and system used in untrusted server environment | |
CN110750796B (en) | Encrypted data deduplication method supporting public audit | |
CN105406966A (en) | Threshold secret information distribution, restoration, integrity verification method and device | |
CN104219047A (en) | A signature verification method and apparatus | |
CN112906056A (en) | Cloud storage key security management method based on block chain | |
CN108881186A (en) | A kind of shared compressed sensing encryption method with Error Control of achievable key | |
CN110176995A (en) | Afterwards without certificate label decryption method on the lattice of quantum safety | |
CN106612171A (en) | Data soft recovery method in cloud storage | |
CN117201132A (en) | Multi-committee attribute base encryption method capable of achieving complete decentralization and application of multi-committee attribute base encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |