CN107659654B - The efficient method and device of calling to account of cloudy data integrity damage based on prestige - Google Patents

The efficient method and device of calling to account of cloudy data integrity damage based on prestige Download PDF

Info

Publication number
CN107659654B
CN107659654B CN201710909484.5A CN201710909484A CN107659654B CN 107659654 B CN107659654 B CN 107659654B CN 201710909484 A CN201710909484 A CN 201710909484A CN 107659654 B CN107659654 B CN 107659654B
Authority
CN
China
Prior art keywords
cloud storage
service provider
storage service
cloudy
btt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710909484.5A
Other languages
Chinese (zh)
Other versions
CN107659654A (en
Inventor
唐鑫
黄永峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201710909484.5A priority Critical patent/CN107659654B/en
Publication of CN107659654A publication Critical patent/CN107659654A/en
Application granted granted Critical
Publication of CN107659654B publication Critical patent/CN107659654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Abstract

The present invention proposes a kind of efficient method and device of calling to account of cloudy data integrity damage based on prestige, wherein this method comprises: receiving the integrality audit request for being directed to cloudy storage system, wherein cloudy storage system includes multiple cloud storage service providers;Based on integrality audit request, the Backward Tree RB-BTT structure based on prestige corresponding with cloudy storage system is obtained, judges whether the proof information of root node in RB-BTT structure passes through data integrity validation;If it is judged that the proof information of root node does not pass through data integrity validation, the unverified target leaf node of data integrity is then found from RB-BTT structure, and return to cloud storage service provider corresponding to target leaf node, thus, the one or more cloud storage service providers for causing corrupted data can be efficiently found based on the prestige of cloud storage service provider, and the result that will call to account is supplied to user, it improves cloudy data integrity and damages the efficiency called to account, effectively save the expense of auditing party, reduce the time that user waits result of calling to account, improve the Experience Degree of user.

Description

The efficient method and device of calling to account of cloudy data integrity damage based on prestige
Technical field
The present invention relates to field of computer technology, in particular to a kind of cloudy data integrity damage based on prestige is efficient It calls to account method and device.
Background technique
The diversity of continuous development and the user demand of cloud storage technology opens the new era of cloudy storage service.It is cloudy Storage service is cooperated by multiple cloud storage service providers, the common data cloud storage service provided for user.It compares Single cloud storage, cloudy store can satisfy the different data storage demand of user, therefore have stronger practical significance and higher Application value.
However, user is also required to place the data in cloud platform in cloudy storage scene, and therefore, the same face of data Face the risk of integrity breaks.In order to ensure being stored in the safety and availability of data in cloudy storage system, user has must The cloudy storage system of high reliablity is selected to provide data storage service for oneself.
Wherein, a cloud storage service provider reliability is influenced, usually there are two factors.One is its stored number According to the probability being damaged, the second is executing the probability that data update failure in cloud storage service provider.The former can lead to It crosses and multiple integrality audit is carried out to the data of cloud storage service provider storage and is obtained, similar, the latter can be by more Secondary dynamic updates verifying and acquires.
In the related technology, a kind of data property the held cooperation proof mechanism of cloudy storage system is proposed, is realized cloudy The integrality of data is audited.Wherein, which is provided with an organizer in cloudy storage system, on the one hand, audit person will Challenge information is sent to organizer, is transmitted to corresponding cloud storage service provider by organizer.On the other hand, organizer receives Collect the proof information that the cloud storage service provider that each in cloudy device challenged returns, be sent to after polymerization audit person into Row verifying.In this way, audit person can effectively have found corrupted data.On the basis of working herein, in the related technology The cloudy memory system data property held that also proposed a kind of identity-based proves mechanism.Scheme by using identity-based public affairs Key cipher system improves safety and reduces the expense of auditing party.
However, the two mechanism have the following problems: firstly, these mechanism can only realize that integrality is examined to static data Meter, and the more new data of the dynamic in cloudy storage can not be verified;Secondly, they are to the data being stored in cloudy device Execute integrality audit, if audit the result is that data are correctly preserved, it may be considered that each of cloudy device Cloud both provides primary normal data storage service.Once however, auditing result show data integrality be damaged, these It is which of cloudy storage system cloud storage service provider causes corrupted data that mechanism, which can not be found, cannot achieve and chases after Duty.Both of these problems cause above-mentioned cloudy data integrity Audit Mechanism and are not used to evaluate cloud storage in cloudy device The reliability of service provider.
Summary of the invention
The present invention is directed to solve above-mentioned technical problem at least to a certain extent.
For this purpose, the first purpose of this invention is to propose that a kind of cloudy data integrity damage based on prestige efficiently chases after Duty method, this method can efficiently find the one or more for causing corrupted data based on the prestige of cloud storage service provider Cloud storage service provider, and the result that will call to account is supplied to user, improves cloudy data integrity and damages the efficiency called to account, has Effect saves the expense of auditing party, reduces the time that user waits result of calling to account, improves the Experience Degree of user.
Second object of the present invention is to propose a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige It sets.
Third object of the present invention is to propose a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige It sets.
Fourth object of the present invention is to propose a kind of computer readable storage medium.
5th purpose of the invention is to propose a kind of computer program product.
In order to achieve the above object, to propose a kind of cloudy data based on prestige complete for embodiment according to a first aspect of the present invention Property damage efficiently call to account method, comprising: receive the integrality audit request for being directed to cloudy storage system, wherein described cloudy to deposit Storage system includes multiple cloud storage service providers;Based on the integrality audit request, obtain and the cloudy storage system The corresponding Backward Tree RB-BTT structure based on prestige, wherein the leaf node of the RB-BTT structure and the cloudy storage The proof information of cloud storage service provider in system is corresponding, the leaf node of the RB-BTT structure from left to right be according to What the credit value of cloud storage service provider corresponding to the proof information arranged from high to low, the proof information includes number According to the aggregation information of block and the aggregation information of label;Judge whether the proof information of root node in the RB-BTT structure passes through number According to integrity verification;If it is judged that the proof information of the root node does not pass through data integrity validation, then from the RB- The unverified target leaf node of data integrity is found in BTT structure, and returns to cloud corresponding to the target leaf node Storage service provider.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use Family waits the time for result of calling to account, and improves the Experience Degree of user.
Second aspect of the present invention embodiment proposes a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige It sets, comprising: receiving module, for receiving the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system System includes multiple cloud storage service providers;Obtain module, for be based on the integrality audit request, obtain with it is described cloudy The corresponding Backward Tree RB-BTT structure based on prestige of storage system, wherein the leaf node of the RB-BTT structure with it is described The proof information of cloud storage service provider in cloudy storage system is corresponding, the leaf section of the RB-BTT structure from left to right Point is arranged from high to low according to the credit value of cloud storage service provider corresponding to the proof information, the permit Breath includes the aggregation information of data block and the aggregation information of label;Judgment module, for judging root section in the RB-BTT structure Whether the proof information of point passes through data integrity validation;Processing module, if the proof information for the root node is not led to Data integrity validation is crossed, then finds the unverified target leaf node of data integrity from the RB-BTT structure, and Return to cloud storage service provider corresponding to the target leaf node.
The efficient device of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use Family waits the time for result of calling to account, and improves the Experience Degree of user.
Third aspect present invention embodiment proposes a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige It sets, comprising: processor;Memory for storage processor executable instruction;Wherein, the processor is configured to executing sheet The efficient method of calling to account of cloudy data integrity damage based on prestige of invention first aspect embodiment.
Fourth aspect present invention embodiment proposes a kind of computer readable storage medium, is stored thereon with computer journey Sequence realizes the cloudy data integrity based on prestige such as first aspect present invention embodiment when described program is executed by processor The efficient method of calling to account of damage.
Fifth aspect present invention embodiment proposes a kind of computer program product, when in the computer program product When instruction processing unit executes, the cloudy data integrity damage based on prestige for executing first aspect present invention embodiment is efficiently chased after Duty method.
Additional aspect and advantage of the invention will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures Obviously and it is readily appreciated that, in which:
Fig. 1 is method of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention Flow chart;
Fig. 2 is the refined flow chart for constructing RB-BTT structure;
Fig. 3 is the exemplary diagram that the cloudy data integrity based on prestige damages system of calling to account;
Fig. 4 is the exemplary diagram of the RB-BTT structure comprising polymerization methods;
Fig. 5 is to damage the efficiently side of calling to account according to the cloudy data integrity based on prestige of one specific embodiment of the present invention The flow chart of method;
Fig. 6 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention Structural schematic diagram.
Fig. 7 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of another embodiment of the present invention Structural schematic diagram;
Fig. 8 is system of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention Structural schematic diagram.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term " multiple " refers to two or more;Term " first ", " second " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Below with reference to the accompanying drawings the cloudy data integrity damage according to an embodiment of the present invention based on prestige is described efficiently to chase after Blame methods, devices and systems.
Fig. 1 is method of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention Flow chart.Wherein, it should be noted that the cloudy data integrity damage that the method for the embodiment is based on prestige efficiently chases after In duty system.
The method as shown in Figure 1, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account Include the following steps.
S11 receives the integrality audit request for being directed to cloudy storage system.
Wherein, cloudy storage system includes multiple cloud storage service providers.
The embodiment of property as an example, during user uses cloudy storage system storing data, user Integrality audit can be carried out to cloudy storage system used in oneself.Specifically, user can be to the integrality oneself specified Structure of auditing sends the integrality audit request for being directed to cloudy storage system.
S12 is based on integrality audit request, obtains Backward Tree RB-BTT based on prestige corresponding with cloudy storage system Structure.
The embodiment of property as an example is receiving user for the integrality audit request of cloudy storage system Afterwards, integrality auditing bodies can obtain the Backward Tree RB-BTT structure based on prestige corresponding with cloudy storage system.Wherein, The leaf node of RB-BTT structure is corresponding with the proof information of cloud storage service provider in cloudy storage system, RB-BTT knot The leaf node of structure from left to right is arranged from high to low according to the credit value of cloud storage service provider corresponding to proof information Column.
Wherein, it was demonstrated that information includes the aggregation information of data block and the aggregation information of label.
Wherein, it should be noted that the aggregation information of the data block of each upper layer node in above-mentioned RB-BTT structure is As obtained by being added the aggregation information of corresponding data block with two nodes in next node layer corresponding to upper layer node It arrives, the aggregation information of the label of each upper layer node in RB-BTT structure is as saving with next layer corresponding to upper layer node The aggregation information of corresponding label be multiplied obtained by two nodes in point.
Wherein, the aggregation information of data block refer to cloud storage service provider for challenge information, calculating by challenge number According to the summation of block and corresponding random number product.
The aggregation information of label refers to cloud storage service provider for challenge information, the mark by challenge data block of calculating Label are to correspond to product of the random number as exponential form.
Wherein, it is to be understood that Backward Tree RB-BTT (the Reputation Based based on prestige in the embodiment Backtracking Tree) structure is pre- according to the credit value of each cloud storage service provider in cloudy storage system institute First construct.That is, obtaining the backtracking based on prestige corresponding with cloudy storage system being based on integrality audit request It, can also be according to the preparatory structure of credit value of each cloud storage service provider in cloudy storage system before setting RB-BTT structure Build RB-BTT structure.Wherein, it should be noted that the process of building RB-BTT structure will be illustrated in subsequent descriptions.
S13, judges whether the proof information of root node in RB-BTT structure passes through data integrity validation.
In one embodiment of the invention, Backward Tree RB- based on prestige corresponding with cloudy storage system is being obtained After BTT structure, whether true pre-set Bilinear Identity can be verified, that is to say, that can according to the proof information of root node Whether whether the proof information of verifying root node can make pre-set Bilinear Identity true.
Wherein, if verifying Bilinear Identity is invalid, judge that the proof information of root node does not pass through data verification Verifying.
Wherein, it is to be understood that Bilinear Identity be it is pre-set can by prove information carry out data integrity Verifying.
The embodiment of property as an example, for the root node { μ in RB-BTT structurerr, it may be verified that verifying is double Linear equalityIt is whether true.
Wherein, above-mentioned g, u and v expression are the open parameters being arranged in integrality auditing bodies.It is assumed that G1And G2It respectively indicates The multiplicative cyclic group of Prime Orders p, u indicate G1In take fixed element at random, g indicates G2Generation member, v=gx, wherein x indicates p Complete residue class ZpIn random element.H(mi) indicate to be requested by direction of audit organizer and obtained, organizer is according to existing Cloudy storage dynamic updates authentication mechanism, the structure of the cloudy cooperation Merkel's Hash tree of maintenance one, H (mi) it is the cloudy cooperation The leaf node of Merkel's Hash tree, IiIndicate the rope in cloudy storage system in the corresponding challenge of i-th of cloud storage service provider Fuse breath.
Wherein, it should be noted that cloudy cooperation Merkel's Hash tree is the cloudy data dynamic of support of organizer's maintenance Update a kind of data structure of verifying.Wherein, the quantity of subtree is corresponding to cloudy storage in cloudy cooperation Merkel's Hash tree The quantity of cloud service provider in system, each sub-tree structure are to generate the one of maintenance by corresponding cloud storage service provider A Merkel's Hash tree.
Wherein, it is to be understood that if the proof information of root node can be such that pre-set Bilinear Identity sets up, Determine that the data integrity of user is not destroyed in cloudy storage system.
S14 is then looked for from RB-BTT structure if it is judged that the proof information of root node does not pass through data integrity validation The target leaf node unverified to data integrity, and return to cloud storage service provider corresponding to target leaf node.
The embodiment of property as an example does not pass through data integrity validation in the proof information for determining root node When, it can continue to carry out data integrity validation to the node in RB-BTT structure in the second layer, and according to the node in the second layer Verification result continue to search, to find the unverified target leaf node of data integrity, and return to target leaf Cloud storage service provider corresponding to node.
Wherein, it is to be understood that cloud storage service provider corresponding to target leaf node is to cause user data The cloud storage service provider of integrity violations.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use Family waits the time for result of calling to account, and improves the Experience Degree of user.
The embodiment of property as an example constructs the process of RB-BTT structure, as shown in Fig. 2, may include:
S21 obtains the credit value of each cloud storage service provider in cloudy storage system.
S22 calculates the average and standard deviation of credit value according to the credit value of each cloud storage service provider.
S23 calculates separately the difference between the credit value and average value of each cloud storage service provider.
S24 deposits cloud according to the difference between standard deviation and the credit value and average value of each cloud storage service provider All cloud storage service providers in storage system classify.
The embodiment of property as an example, in the credit value and average value for calculating each cloud storage service provider Between difference after, for each cloud storage service provider, can determine whether the credit value of cloud storage service provider and average Whether the difference between value is above standard difference, if the difference between the credit value and average value of cloud storage service provider is more than Standard deviation, it is determined that cloud storage service provider is the cloud storage service provider for belonging to the first kind.
In addition, if the difference between the credit value and average value of cloud storage service provider is less than standard deviation, into One step judges whether the difference between the credit value and average value of cloud storage service provider is less than preset threshold, wherein default Threshold value is corresponding with the negative of standard deviation.
If judging, the difference between the credit value and average value of cloud storage service provider is more than or equal to default threshold Value, it is determined that cloud storage service provider is the cloud storage service provider for belonging to the second class;If judging, cloud storage service is mentioned It is less than preset threshold for the difference between the credit value and average value of quotient, it is determined that cloud storage service provider is to belong to third class Cloud storage service provider.
That is, in the embodiment cloudy storage system organizer according to cloud storage service provider credit value with Mean value, the relationship of standard deviation divide them into three classifications, from the point of view of the index of credit rating, in the cloudy storage system In, the cloud storage service provider of these three classifications is that prestige is preferable, prestige is medium, prestige is poor respectively.This classification is compared To the random alignment of not classifying of cloud storage service provider in traditional approach, so that the cloud storage service provider of three set goes out Wrong probability is sequentially increased, and each probability for gathering the cloud storage service provider error for including is also to be sequentially increased.This Sample allows for error-prone cloud storage system no matter between three set, or respectively internal in three set, all concentrates on Latter half, the structure for supporting cloudy data integrity damage efficiently to call to account for construction lay the foundation.
Wherein, it should be noted that the RB-BTT structure constructed in the embodiment enables to the cloud storage clothes of error Business provider is concentrated in the right-hand branch of structure with high probability.And in the inside of each branch, error-prone cloud also with High probability concentrates on right part.In this way during subsequent call to account, the number of user's checking can be efficiently reduced, is improved The efficiency of calling to account of auditing party.
S25, for each classification, according to the cloud storage service provider in classification according to credit value from small to large sequence according to Minor sort, to obtain putting in order for classification medium cloud storage service provider.
S26 obtains the proof information of each cloud storage service provider.
S27, for each classification, according to putting in order for classification medium cloud storage service provider, by corresponding cloud storage clothes The proof information of business provider is arranged successively.
S28 constructs RB-BTT structure according to classification for the rank results for proving information.
Wherein, it is to be understood that arrange leaf node relative to according to the logical number of cloud storage service provider For Backward Tree (BTT, Backtracking Tree) structure, the embodiment by using cloud storage service provider prestige Value arranges the RB-BTT structure of leaf node, can substantially reduce subsequent complexity of calling to account when being called to account based on the RB-BTT structure Degree can especially substantially reduce in cloud storage system while the data of multiple cloud storage service provider storages being protected to occur completely Property destroy when, the complexity called to account can reduce the expense during calling to account as a result,.
The efficiently side of calling to account is damaged below with reference to the cloudy data integrity in prestige of Fig. 3, Fig. 4 and Fig. 5 to the embodiment The detailed process of method is described in detail.
Wherein, Fig. 3 is the exemplary diagram that the cloudy data integrity based on prestige damages system of calling to account;Fig. 4 is comprising polymerization The exemplary diagram of the RB-BTT structure of mode;Fig. 5 is complete according to the cloudy data based on prestige of a specific embodiment of the invention The flow chart of the whole efficient method of calling to account of property damage.In this embodiment it is assumed that the cloudy storage system of user is by n cloud storage Service provider's composition.
The method as shown in figure 5, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account Include the following steps.
S51, user send the integrality audit request for being directed to cloudy storage system to integrality auditing bodies.
During using cloudy storage system storing data, user can be to the integrality auditing bodies hair oneself specified Send integrality audit request.Specifically, the integrality auditing bodies that user can be specified by the terminal that oneself is used to oneself Send integrality audit request.
Wherein, terminal can include but is not limited to computer, mobile phone, portable device etc. with the hard of various operating devices Part equipment, the implementation are not construed as limiting terminal.
S52, integrality auditing bodies send integrality audit challenge to the organizer of cloudy storage system.
Specifically, the integrality auditing bodies that user specifies has been initiated to organizer of the user in cloudy storage system Whole property audit challenge
S53, organizer send credit value inquiry request to credit assessment mechanism.
Accordingly, the integrality that organizer receives that integrality auditing bodies is sent is audited challenge, and to credit assessment mechanism Inquire the credit value of n cloud storage service provider.
Wherein, it should be noted that the organizer in the embodiment is the server being managed to cloudy storage system.
S54, organizer receive the credit value { Rep for the n cloud storage service provider that credit assessment mechanism returns1, Rep2,…Repn}。
Wherein, RepiIndicate the credit value of i-th of cloud storage service provider, wherein the value of i be 1,2 ... .n.
S55, organizer calculate the average and standard deviation of the credit value of this n cloud storage service device provider.
Specifically, organizer receives the credit value { Rep of credit assessment mechanism return1,Rep2,…RepnAfter, it calculates The mean value of the credit value of this n cloud storage service device provider isAnd standard deviation
S56, organizer calculate separately the difference between the credit value and average value of each cloud storage service provider.
Specifically, next organizer calculates the difference between each cloud storage service provider credit value and average value ci=Repi-E。
S57, organizer according to the difference between standard deviation and the credit value and average value of each cloud storage service provider, Classify to all cloud storage service providers in cloud storage system.
Specifically, according to ciThe size relation of value and S, by corresponding cloud storage service provider { CSP1,CSP2,… CSPnIt is divided into three classes: { CSPi}i∈I, { CSPj}j∈II{ CSPk}k∈III, in every one kind, cloud storage service quotient is according to credit value It is arranged successively from small to large.Wherein, for the cloud storage service quotient for including in the first kind, there is ci>S,i∈I;For in the second class The cloud storage service quotient for including, there is-S≤cj<S,j∈II;In third class, ck<-S,k∈III。
S58, for each classification, organizer according to the cloud storage service provider in classification according to credit value from small to large Sequence successively sorts, to obtain putting in order for classification medium cloud storage service provider.
S59, organizer obtain the proof information of each cloud storage service provider.
Specifically, organizer will challengeN correspondence being transmitted in cloud storage system respectively Cloud storage service provider, corresponding cloud storage service provider return respectively prove information Pi={ μii},i∈[1,n]。
Wherein, PiIndicate the proof information of i-th of cloud storage service provider, μiIndicate i-th of cloud storage service provider Data block aggregation information, σiIndicate the aggregation information of the label of i-th of cloud storage service provider.
S60, organizer construct RB-BTT structure.
After the proof information for obtaining each cloud storage service provider, for each classification, organizer is according in classification Cloud storage service provider puts in order, and the proof information of corresponding cloud storage service provider is arranged successively, and according to Classification constructs RB-BTT structure for the rank results for proving information.
Specifically, will demonstrate that correspondence is divided into three classes according to the three classes cloud storage service provider divided above.Respectively According to three set { CSPi}i∈I, { CSPj}j∈II{ CSPk}k∈IIIMedium cloud storage service provider puts in order, by them Corresponding proof is arranged successively, the leaf node as RB-BTT.Three classes leaf node is polymerize two-by-two respectively, obtains upper layer node.
For example, as shown in figure 4, the cloud storage service provider in the second class return prove PII-1={ μII-1, σII-1, PII-2={ μII-2II-2And PII-3={ μII-3II-3}.The method polymerizeing upwards is μII-aII-1II-2II-a= σII-1·σII-2, μII-rII-aII-3, σII-rII-a·σII-3.By the corresponding sub- root node of three classifications according to shown in Fig. 4 Polymerization methods polymerize, obtain the root node { μ of RB-BTTrr}。
S61, organizer send the root node to RB-BTT structure to integrality audit structure.
S62, integrality audit structure carries out data integrity validation to the root node of RB-BTT structure, if being verified, The auditing result that the data in cloud storage system are not destroyed then is returned to user, if it is not, then requesting its of RB-BTT structure His node, to obtain the unverified target leaf node of data integrity.
Cloud storage service provider corresponding to target leaf node is supplied to user by S63, integrality audit structure.
Specifically, organizer is by the root node { μ of RB-BTT structurerrReturn to the integrality audit machine that user specifies Structure, as the response challenged it.After integrality auditing bodies receives root node, Bilinear Identity is verifiedIt is whether true, wherein g and v expression is that user audits in traditional integrality The open parameter being arranged in mechanism, H (mi) it is to be requested by direction of audit organizer and obtained, organizer is according to existing cloudy storage Dynamic updates authentication mechanism, the structure of the cloudy cooperation Merkel's Hash tree of maintenance one, H (mi) it is that the cloudy cooperation Merkel breathes out The leaf node of uncommon tree.If the verification passes, then it can confirm that the data integrity of user is not destroyed in cloudy storage system. Conversely, integrality auditing bodies requests the second node layer in RB-BTT to continue to verify to organizer, to find data integrity Unverified target leaf node, and cloud storage service provider corresponding to target leaf node is supplied to user.For example, As shown in figure 4, under the request of integrality auditing bodies, organizer is returned after the root node authentication failed of RB-BTT structure The second node layer { μ of RB-BTTI-rI-rAnd { μaa, it separately verifies WithIt is whether true, find the former set up, and the latter not at It is vertical.Therefore, continue that the lower level node of the latter is requested to be verified, until finding the unacceptable target leaf node { μ of verifyingIII-1, σIII-1And { μIII-2III-2, the corresponding cloud storage service provider of target leaf node is that user data integrality is caused to damage Bad cloud storage service provider.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use Family waits the time for result of calling to account, and improves the Experience Degree of user.
In order to realize above-described embodiment, the present invention also proposes that a kind of cloudy data integrity damage based on prestige efficiently chases after Blame device.
Fig. 6 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention Structural schematic diagram.Wherein, it is to be understood that the cloudy data integrity damage that the device is based on prestige, which is efficiently called to account, is In system.
The device as shown in fig. 6, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account Including receiving module 110, obtain module 120, judgment module 130 and processing module 140, in which:
Receiving module 110 is used to receive the integrality audit request for cloudy storage system.
Wherein, cloudy storage system includes multiple cloud storage service providers.
It obtains module 120 to be used to be based on integrality audit request, obtain corresponding with cloudy storage system based on prestige Backward Tree RB-BTT structure.
Wherein, the proof information of the leaf node of RB-BTT structure and the cloud storage service provider in cloudy storage system Corresponding, the leaf node of RB-BTT structure from left to right is according to the prestige for proving cloud storage service provider corresponding to information What value arranged from high to low, it was demonstrated that information includes the aggregation information of data block and the aggregation information of label, in RB-BTT structure The aggregation information of the data block of each upper layer node is as inciting somebody to action with two nodes in next node layer corresponding to upper layer node The aggregation information of corresponding data block be added obtained, the polymerization letter of the label of each upper layer node in RB-BTT structure Breath is as the aggregation information of corresponding label is multiplied with two nodes in next node layer corresponding to upper layer node It is obtained.
Judgment module 130 is for judging whether the proof information of root node in RB-BTT structure is tested by data integrity Card.
If proof information of the processing module 140 for root node does not pass through data integrity validation, tied from RB-BTT The unverified target leaf node of data integrity is found in structure, and is returned to cloud storage service corresponding to target leaf node and mentioned For quotient.
In one embodiment of the invention, judgment module is specifically used for: according to the proof information of root node, verifying is preparatory Whether the Bilinear Identity of setting is true, wherein if verifying Bilinear Identity is invalid, judges the permit of root node Breath is not verified by data verification.
In one embodiment of the invention, on the basis of shown in Fig. 6, as shown in fig. 7, the device can also include RB-BTT structure constructs module 150, in which:
RB-BTT structure building module 150 is used to obtain the prestige of each cloud storage service provider in cloudy storage system Value, and according to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated, then, is counted respectively The difference between the credit value and average value of each cloud storage service provider is calculated, later, according to standard deviation and each cloud storage Difference between the credit value and average value of service provider carries out all cloud storage service providers in cloud storage system Classification, and be directed to each classification, according to the cloud storage service provider in classification according to credit value from small to large sequence successively Then sequence, obtains the card of each cloud storage service provider to obtain putting in order for classification medium cloud storage service provider Bright information provides corresponding cloud storage service according to putting in order for classification medium cloud storage service provider for each classification The proof information of quotient is arranged successively, and constructs RB-BTT structure for the rank results for proving information according to classification.
In one embodiment of the invention, RB-BTT structure building module 150 is specifically used for: taking for each cloud storage Be engaged in provider, judges whether the difference between the credit value and average value of cloud storage service provider is above standard difference;If cloud Difference between the credit value and average value of storage service provider is above standard difference, it is determined that cloud storage service provider is to belong to In the cloud storage service provider of the first kind;
In one embodiment of the invention, RB-BTT structure building module 150 is also used to: if cloud storage service provides Difference between the credit value and average value of quotient is less than standard deviation, then further judges the credit value of cloud storage service provider Whether the difference between average value is less than preset threshold, wherein preset threshold is corresponding with the negative of standard deviation;If judging cloud Difference between the credit value and average value of storage service provider is more than or equal to preset threshold, it is determined that cloud storage service Provider is the cloud storage service provider for belonging to the second class;If judging the credit value and average value of cloud storage service provider Between difference be less than preset threshold, it is determined that cloud storage service provider is the cloud storage service provider for belonging to third class.
Wherein, it should be noted that the aforementioned cloudy data integrity damage based on prestige efficiently calls to account what method was implemented Illustrate the efficient device of calling to account of cloudy data integrity damage based on prestige for being also applied for the embodiment, realization principle Similar, details are not described herein again.
The efficient device of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use Family waits the time for result of calling to account, and improves the Experience Degree of user.
Wherein, Fig. 8 is cloudy data integrity damage efficient call to account system of the one embodiment of the present of invention based on prestige Structural schematic diagram, as shown in figure 8, the system may include integrality auditing bodies, cloudy storage system and credit assessment machine Structure three parts composition.
Wherein, integrality auditing bodies is responsible for the proof information for initiating challenge and verifying organizer returns;
It include organizer and cloud storage service provider in cloudy storage system, wherein organizer is responsible for inquiry composition and uses The credit value of the cloud storage service provider of the cloudy storage system in family, according to credit value and this specification method pair presented above Cloud storage service provider classifies, by the challenge classification transmission of audit person to corresponding cloud storage service provider, and Establish RB-BTT tree.Cloud storage service provider, which is responsible for being generated according to the challenge received, to be proved and returns to tissue Person;Credit assessment mechanism is responsible for safeguarding and updating the credit value of cloud storage service provider.
As shown in figure 8, integrality auditing bodies is mainly made of two modules of challenge generation module and checking module, Organizer in cloudy storage system is mainly by three reputation query module, categorization module and RB-BTT generation module module groups At the cloud storage service provider in cloudy storage system mainly includes proof generation module, and credit assessment mechanism mainly includes Prestige maintenance module.
The concrete function of each functional module is described below:
1, generation module is challenged
When user entrusts integrality auditing bodies to be stored in the progress integrality audit of the data in cloudy storage to it, by Integrality auditing bodies generates challenge, and challenge includes n label-set of random numbers, and (n is in the cloudy storage system of user Cloud storage service provider quantity).After challenge generates, user is sent in its cloudy storage by integrality auditing bodies The organizer specified in system.
2, checking module
Integrality auditing bodies uses the module after receiving the proof that the organizer in cloudy storage system returns Verify the correctness proved.If verification result is to pass through, result is fed back into user;, whereas if checking is obstructed It crosses, then the next node layer proof information that includes for notifying organizer to continue to send RB-BTT structure is verified, until verifying To the leaf node of RB-BTT, the cloud storage service provider of error is found, and the result that will call to account feeds back to user.
3, reputation query module
After organizer is by receiving integrality audit challenge, according to the module, inquires and challenge to credit assessment mechanism In include cloud storage service provider credit value, and save the result of inquiry.
4, categorization module
Organizer passes through the mean value of module calculating credit value, standard deviation and each cloud storage service provider The difference of credit value and standard deviation classifies corresponding cloud storage service provider according to calculated result.
5, RB-BTT generation module
Challenge information is transmitted to corresponding cloud storage service provider by organizer, and receives the permit that they are returned Breath.By the module, the proof information for the cloud storage service provider classified above is arranged in order, the leaf as RB-BTT Node, and category polymerize upwards two-by-two.After obtaining the sub- root of each classification, then upward layers of polymer, obtain the root of RB-BTT.
6, generation module is proved
After each of cloudy storage system cloud storage service provider receives its corresponding challenge information, pass through This module, polymerize the data block information and label information of its storage respectively, returns to organizer as proof.
7, prestige maintenance module
Credit assessment mechanism is responsible for responding the reputation query of organizer in cloudy storage system, and is responsible for management cloud storage The credit value of ISP updates work.
To realize above-described embodiment, the invention also provides a kind of, and the cloudy data integrity damage based on prestige is efficiently chased after Device is blamed, the device that should efficiently call to account based on the cloudy data integrity damage of prestige includes: processor;It can for storage processor The memory executed instruction;Wherein, processor is configured as executing the cloudy data integrity based on prestige of above-described embodiment The efficient method of calling to account of damage.
To realize above-described embodiment, the invention also provides a kind of computer readable storage mediums, are stored thereon with calculating Machine program realizes that the cloudy data integrity damage based on prestige of above-described embodiment is efficiently called to account when program is executed by processor Method.
To realize above-described embodiment, the invention also provides a kind of computer program products, when in computer program product Instruction processing unit when executing, the cloudy data integrity damage based on prestige for executing above-described embodiment is efficiently called to account method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is two or more, unless separately There is clearly specific restriction.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction executing device, device or equipment (such as computer based device, including the device of processor or other can be held from instruction Luggage sets, device or equipment instruction fetch and the device executed instruction) it uses, or combine these instruction executing devices, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction executing device, device or equipment or the dress used in conjunction with these instruction executing devices, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction executing device with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention Type.

Claims (8)

  1. A kind of method 1. cloudy data integrity damage based on prestige is efficiently called to account, which comprises the following steps:
    Receive the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system includes multiple cloud storages Service provider;
    Based on the integrality audit request, Backward Tree RB-BTT based on prestige corresponding with the cloudy storage system is obtained Structure, wherein the card of the cloud storage service provider in the leaf node of the RB-BTT structure and the cloudy storage system Bright information is corresponding, and the leaf node of the RB-BTT structure from left to right is taken according to cloud storage corresponding to the proof information What the credit value of business provider arranged from high to low, it is described to prove that information includes the aggregation information of data block and the polymerization letter of label Breath;
    Judge whether the proof information of root node in the RB-BTT structure passes through data integrity validation;
    If it is judged that the proof information of the root node does not pass through data integrity validation, then looked for from the RB-BTT structure The target leaf node unverified to data integrity, and the offer of cloud storage service corresponding to the target leaf node is provided Quotient;
    Wherein, described to obtain the Backward Tree RB-BTT structure based on prestige corresponding with the cloudy storage system, it specifically includes:
    Obtain the credit value of each cloud storage service provider in the cloudy storage system;
    According to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated;
    Calculate separately the difference between the credit value and the average value of each cloud storage service provider;
    According to the difference between the standard deviation and the credit value and the average value of each cloud storage service provider, to described All cloud storage service providers in cloud storage system classify;
    For each classification, according to the cloud storage service provider in the classification, according to credit value, sequence is successively arranged from small to large Sequence, to obtain putting in order for the classification medium cloud storage service provider;
    Obtain the proof information of each cloud storage service provider;
    Corresponding cloud storage service is mentioned according to putting in order for the classification medium cloud storage service provider for each classification It is arranged successively for the proof information of quotient;
    According to classification for the rank results for proving information, the RB-BTT structure is constructed.
  2. 2. the method as described in claim 1, which is characterized in that the permit of root node in the judgement RB-BTT structure Whether breath passes through data integrity validation, comprising:
    According to the proof information of the root node, whether true pre-set Bilinear Identity is verified, wherein if verifying institute It states that Bilinear Identity is invalid, then judges that the proof information of the root node does not pass through data verification and verifies.
  3. 3. the method as described in claim 1, which is characterized in that described to be provided according to the standard deviation and each cloud storage service Difference between the credit value of quotient and the average value carries out all cloud storage service providers in the cloud storage system Classification, comprising:
    For each cloud storage service provider, judge between the credit value and the average value of the cloud storage service provider Difference whether be more than the standard deviation;
    If the difference between the credit value and the average value of the cloud storage service provider is more than the standard deviation, really The fixed cloud storage service provider is the cloud storage service provider for belonging to the first kind.
  4. 4. method as claimed in claim 3, which is characterized in that the method also includes:
    If the difference between the credit value and the average value of the cloud storage service provider is less than the standard deviation, Further judge whether the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Wherein, the preset threshold is corresponding with the negative of the standard deviation;
    If it is pre- to judge that the difference between the credit value and the average value of the cloud storage service provider is more than or equal to If threshold value, it is determined that the cloud storage service provider is the cloud storage service provider for belonging to the second class;
    If judging, the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Determine that the cloud storage service provider is the cloud storage service provider for belonging to third class.
  5. The device 5. a kind of cloudy data integrity damage based on prestige is efficiently called to account characterized by comprising
    Receiving module, for receiving the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system packet Include multiple cloud storage service providers;
    Module is obtained, for being based on the integrality audit request, is obtained corresponding with the cloudy storage system based on prestige Backward Tree RB-BTT structure, wherein the cloud storage in the leaf node of the RB-BTT structure and the cloudy storage system The proof information of service provider is corresponding, and the leaf node of the RB-BTT structure from left to right is according to proof information institute What the credit value of corresponding cloud storage service provider arranged from high to low, it is described to prove that information includes the aggregation information of data block With the aggregation information of label;
    Judgment module, for judging whether the proof information of root node in the RB-BTT structure passes through data integrity validation;
    Processing module, if the proof information for the root node does not pass through data integrity validation, from the RB-BTT The unverified target leaf node of data integrity is found in structure, and returns to cloud storage corresponding to the target leaf node Service provider;
    RB-BTT structure constructs module, for obtaining the prestige of each cloud storage service provider in the cloudy storage system Value, and according to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated, then, is counted respectively The difference between the credit value and the average value of each cloud storage service provider is calculated, later, according to the standard deviation and often Difference between the credit value and the average value of a cloud storage service provider, deposits all clouds in the cloud storage system Storage service provider classifies, and is directed to each classification, according to the cloud storage service provider in the classification according to letter Sequence successively sorts reputation value from small to large, to obtain putting in order for the classification medium cloud storage service provider, then, obtains The proof information of each cloud storage service provider, for each classification, according to the classification medium cloud storage service provider It puts in order, the proof information of corresponding cloud storage service provider is arranged successively, and according to classification for proof information Rank results construct the RB-BTT structure.
  6. 6. device as claimed in claim 5, which is characterized in that the judgment module is specifically used for:
    According to the proof information of the root node, whether true pre-set Bilinear Identity is verified, wherein if verifying institute It states that Bilinear Identity is invalid, then judges that the proof information of the root node does not pass through data verification and verifies.
  7. 7. device as claimed in claim 5, which is characterized in that the RB-BTT structure constructs module, is specifically used for:
    For each cloud storage service provider, judge between the credit value and the average value of the cloud storage service provider Difference whether be more than the standard deviation;
    If the difference between the credit value and the average value of the cloud storage service provider is more than the standard deviation, really The fixed cloud storage service provider is the cloud storage service provider for belonging to the first kind.
  8. 8. device as claimed in claim 7, which is characterized in that the RB-BTT structure constructs module, is also used to:
    If the difference between the credit value and the average value of the cloud storage service provider is less than the standard deviation, Further judge whether the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Wherein, the preset threshold is corresponding with the negative of the standard deviation;
    If it is pre- to judge that the difference between the credit value and the average value of the cloud storage service provider is more than or equal to If threshold value, it is determined that the cloud storage service provider is the cloud storage service provider for belonging to the second class;
    If judging, the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Determine that the cloud storage service provider is the cloud storage service provider for belonging to third class.
CN201710909484.5A 2017-09-29 2017-09-29 The efficient method and device of calling to account of cloudy data integrity damage based on prestige Active CN107659654B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710909484.5A CN107659654B (en) 2017-09-29 2017-09-29 The efficient method and device of calling to account of cloudy data integrity damage based on prestige

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710909484.5A CN107659654B (en) 2017-09-29 2017-09-29 The efficient method and device of calling to account of cloudy data integrity damage based on prestige

Publications (2)

Publication Number Publication Date
CN107659654A CN107659654A (en) 2018-02-02
CN107659654B true CN107659654B (en) 2019-08-09

Family

ID=61117345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710909484.5A Active CN107659654B (en) 2017-09-29 2017-09-29 The efficient method and device of calling to account of cloudy data integrity damage based on prestige

Country Status (1)

Country Link
CN (1) CN107659654B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664221B (en) * 2018-05-11 2022-04-01 北京奇虎科技有限公司 Data holding certification method, device and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801524A (en) * 2012-06-13 2012-11-28 天津大学 Trust-theory-based trusted service system based on trusted authentication system
CN103268460A (en) * 2013-06-20 2013-08-28 北京航空航天大学 Integrity verification method of cloud storage data
CN105474166A (en) * 2013-03-15 2016-04-06 先进元素科技公司 Methods and systems for purposeful computing
CN106230626A (en) * 2016-07-28 2016-12-14 昆明理工大学 A kind of online service measures of reputation method of the relation that is dominant based on service

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070220614A1 (en) * 2006-03-14 2007-09-20 Jason Ellis Distributed access to valuable and sensitive documents and data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801524A (en) * 2012-06-13 2012-11-28 天津大学 Trust-theory-based trusted service system based on trusted authentication system
CN105474166A (en) * 2013-03-15 2016-04-06 先进元素科技公司 Methods and systems for purposeful computing
CN103268460A (en) * 2013-06-20 2013-08-28 北京航空航天大学 Integrity verification method of cloud storage data
CN106230626A (en) * 2016-07-28 2016-12-14 昆明理工大学 A kind of online service measures of reputation method of the relation that is dominant based on service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于信誉的P2P网络信任机制的研究与实现;唐鑫;《中国优秀硕士学位论文全文数据库信息科技辑I139-233》;20120731;全文 *

Also Published As

Publication number Publication date
CN107659654A (en) 2018-02-02

Similar Documents

Publication Publication Date Title
CN105868369B (en) A kind of data model verifying System and method for based on Merkle tree construction
KR102237014B1 (en) System and method for blockchain-based authentication
EP3590226A2 (en) System and method for generating digital marks
CN110264354A (en) It creates block chain account and verifies the method and device of block chain transaction
CN110990879B (en) Data evidence storing method based on block chain
CN110266872A (en) Management-control method, device and the cloud address book system of address book data
US20210112160A1 (en) Decentralized automatic phone fraud risk management
US20190229931A1 (en) Distributed telephone number ledger and register
CN107124426A (en) The method for authenticating and device of a kind of user&#39;s right
EP3942787A1 (en) Validating telephone calls by verifying entity identities using blockchains
CN113886501A (en) Block chain service module extension method based on multi-chain architecture
CN105871888A (en) Identity authentication method, device and system
CN107659654B (en) The efficient method and device of calling to account of cloudy data integrity damage based on prestige
CN111010282B (en) Block chain-based information processing method, related device and storage medium
Etemad et al. Database outsourcing with hierarchical authenticated data structures
CN112804207B (en) Alliance chain node security admission method applied to electronic government affair scene
CN113722285A (en) Multi-chain-based cross-chain distributed file storage and verification system
Phiri et al. Modelling and information fusion in digital identity management systems
CN110071966B (en) Block chain networking and data processing method based on cloud platform
CN108170860A (en) Data query method, apparatus, electronic equipment and computer readable storage medium
US20140059044A1 (en) Node validation in a network
CN109711979A (en) A kind of user information auditing system and checking method
CN110689424B (en) Funds supply and demand matching method and system
CN113435517A (en) Abnormal data point output method and device, computer equipment and storage medium
CN110910091A (en) Data processing method, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant