CN107659654B - The efficient method and device of calling to account of cloudy data integrity damage based on prestige - Google Patents
The efficient method and device of calling to account of cloudy data integrity damage based on prestige Download PDFInfo
- Publication number
- CN107659654B CN107659654B CN201710909484.5A CN201710909484A CN107659654B CN 107659654 B CN107659654 B CN 107659654B CN 201710909484 A CN201710909484 A CN 201710909484A CN 107659654 B CN107659654 B CN 107659654B
- Authority
- CN
- China
- Prior art keywords
- cloud storage
- service provider
- storage service
- cloudy
- btt
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Abstract
The present invention proposes a kind of efficient method and device of calling to account of cloudy data integrity damage based on prestige, wherein this method comprises: receiving the integrality audit request for being directed to cloudy storage system, wherein cloudy storage system includes multiple cloud storage service providers;Based on integrality audit request, the Backward Tree RB-BTT structure based on prestige corresponding with cloudy storage system is obtained, judges whether the proof information of root node in RB-BTT structure passes through data integrity validation;If it is judged that the proof information of root node does not pass through data integrity validation, the unverified target leaf node of data integrity is then found from RB-BTT structure, and return to cloud storage service provider corresponding to target leaf node, thus, the one or more cloud storage service providers for causing corrupted data can be efficiently found based on the prestige of cloud storage service provider, and the result that will call to account is supplied to user, it improves cloudy data integrity and damages the efficiency called to account, effectively save the expense of auditing party, reduce the time that user waits result of calling to account, improve the Experience Degree of user.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of cloudy data integrity damage based on prestige is efficient
It calls to account method and device.
Background technique
The diversity of continuous development and the user demand of cloud storage technology opens the new era of cloudy storage service.It is cloudy
Storage service is cooperated by multiple cloud storage service providers, the common data cloud storage service provided for user.It compares
Single cloud storage, cloudy store can satisfy the different data storage demand of user, therefore have stronger practical significance and higher
Application value.
However, user is also required to place the data in cloud platform in cloudy storage scene, and therefore, the same face of data
Face the risk of integrity breaks.In order to ensure being stored in the safety and availability of data in cloudy storage system, user has must
The cloudy storage system of high reliablity is selected to provide data storage service for oneself.
Wherein, a cloud storage service provider reliability is influenced, usually there are two factors.One is its stored number
According to the probability being damaged, the second is executing the probability that data update failure in cloud storage service provider.The former can lead to
It crosses and multiple integrality audit is carried out to the data of cloud storage service provider storage and is obtained, similar, the latter can be by more
Secondary dynamic updates verifying and acquires.
In the related technology, a kind of data property the held cooperation proof mechanism of cloudy storage system is proposed, is realized cloudy
The integrality of data is audited.Wherein, which is provided with an organizer in cloudy storage system, on the one hand, audit person will
Challenge information is sent to organizer, is transmitted to corresponding cloud storage service provider by organizer.On the other hand, organizer receives
Collect the proof information that the cloud storage service provider that each in cloudy device challenged returns, be sent to after polymerization audit person into
Row verifying.In this way, audit person can effectively have found corrupted data.On the basis of working herein, in the related technology
The cloudy memory system data property held that also proposed a kind of identity-based proves mechanism.Scheme by using identity-based public affairs
Key cipher system improves safety and reduces the expense of auditing party.
However, the two mechanism have the following problems: firstly, these mechanism can only realize that integrality is examined to static data
Meter, and the more new data of the dynamic in cloudy storage can not be verified;Secondly, they are to the data being stored in cloudy device
Execute integrality audit, if audit the result is that data are correctly preserved, it may be considered that each of cloudy device
Cloud both provides primary normal data storage service.Once however, auditing result show data integrality be damaged, these
It is which of cloudy storage system cloud storage service provider causes corrupted data that mechanism, which can not be found, cannot achieve and chases after
Duty.Both of these problems cause above-mentioned cloudy data integrity Audit Mechanism and are not used to evaluate cloud storage in cloudy device
The reliability of service provider.
Summary of the invention
The present invention is directed to solve above-mentioned technical problem at least to a certain extent.
For this purpose, the first purpose of this invention is to propose that a kind of cloudy data integrity damage based on prestige efficiently chases after
Duty method, this method can efficiently find the one or more for causing corrupted data based on the prestige of cloud storage service provider
Cloud storage service provider, and the result that will call to account is supplied to user, improves cloudy data integrity and damages the efficiency called to account, has
Effect saves the expense of auditing party, reduces the time that user waits result of calling to account, improves the Experience Degree of user.
Second object of the present invention is to propose a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige
It sets.
Third object of the present invention is to propose a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige
It sets.
Fourth object of the present invention is to propose a kind of computer readable storage medium.
5th purpose of the invention is to propose a kind of computer program product.
In order to achieve the above object, to propose a kind of cloudy data based on prestige complete for embodiment according to a first aspect of the present invention
Property damage efficiently call to account method, comprising: receive the integrality audit request for being directed to cloudy storage system, wherein described cloudy to deposit
Storage system includes multiple cloud storage service providers;Based on the integrality audit request, obtain and the cloudy storage system
The corresponding Backward Tree RB-BTT structure based on prestige, wherein the leaf node of the RB-BTT structure and the cloudy storage
The proof information of cloud storage service provider in system is corresponding, the leaf node of the RB-BTT structure from left to right be according to
What the credit value of cloud storage service provider corresponding to the proof information arranged from high to low, the proof information includes number
According to the aggregation information of block and the aggregation information of label;Judge whether the proof information of root node in the RB-BTT structure passes through number
According to integrity verification;If it is judged that the proof information of the root node does not pass through data integrity validation, then from the RB-
The unverified target leaf node of data integrity is found in BTT structure, and returns to cloud corresponding to the target leaf node
Storage service provider.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy
The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established
Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that
When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test
The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage
The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account
It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use
Family waits the time for result of calling to account, and improves the Experience Degree of user.
Second aspect of the present invention embodiment proposes a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige
It sets, comprising: receiving module, for receiving the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system
System includes multiple cloud storage service providers;Obtain module, for be based on the integrality audit request, obtain with it is described cloudy
The corresponding Backward Tree RB-BTT structure based on prestige of storage system, wherein the leaf node of the RB-BTT structure with it is described
The proof information of cloud storage service provider in cloudy storage system is corresponding, the leaf section of the RB-BTT structure from left to right
Point is arranged from high to low according to the credit value of cloud storage service provider corresponding to the proof information, the permit
Breath includes the aggregation information of data block and the aggregation information of label;Judgment module, for judging root section in the RB-BTT structure
Whether the proof information of point passes through data integrity validation;Processing module, if the proof information for the root node is not led to
Data integrity validation is crossed, then finds the unverified target leaf node of data integrity from the RB-BTT structure, and
Return to cloud storage service provider corresponding to the target leaf node.
The efficient device of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy
The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established
Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that
When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test
The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage
The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account
It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use
Family waits the time for result of calling to account, and improves the Experience Degree of user.
Third aspect present invention embodiment proposes a kind of efficient dress of calling to account of cloudy data integrity damage based on prestige
It sets, comprising: processor;Memory for storage processor executable instruction;Wherein, the processor is configured to executing sheet
The efficient method of calling to account of cloudy data integrity damage based on prestige of invention first aspect embodiment.
Fourth aspect present invention embodiment proposes a kind of computer readable storage medium, is stored thereon with computer journey
Sequence realizes the cloudy data integrity based on prestige such as first aspect present invention embodiment when described program is executed by processor
The efficient method of calling to account of damage.
Fifth aspect present invention embodiment proposes a kind of computer program product, when in the computer program product
When instruction processing unit executes, the cloudy data integrity damage based on prestige for executing first aspect present invention embodiment is efficiently chased after
Duty method.
Additional aspect and advantage of the invention will be set forth in part in the description, and will partially become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures
Obviously and it is readily appreciated that, in which:
Fig. 1 is method of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention
Flow chart;
Fig. 2 is the refined flow chart for constructing RB-BTT structure;
Fig. 3 is the exemplary diagram that the cloudy data integrity based on prestige damages system of calling to account;
Fig. 4 is the exemplary diagram of the RB-BTT structure comprising polymerization methods;
Fig. 5 is to damage the efficiently side of calling to account according to the cloudy data integrity based on prestige of one specific embodiment of the present invention
The flow chart of method;
Fig. 6 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention
Structural schematic diagram.
Fig. 7 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of another embodiment of the present invention
Structural schematic diagram;
Fig. 8 is system of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention
Structural schematic diagram.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term " multiple " refers to two or more;Term " first ",
" second " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Below with reference to the accompanying drawings the cloudy data integrity damage according to an embodiment of the present invention based on prestige is described efficiently to chase after
Blame methods, devices and systems.
Fig. 1 is method of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention
Flow chart.Wherein, it should be noted that the cloudy data integrity damage that the method for the embodiment is based on prestige efficiently chases after
In duty system.
The method as shown in Figure 1, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account
Include the following steps.
S11 receives the integrality audit request for being directed to cloudy storage system.
Wherein, cloudy storage system includes multiple cloud storage service providers.
The embodiment of property as an example, during user uses cloudy storage system storing data, user
Integrality audit can be carried out to cloudy storage system used in oneself.Specifically, user can be to the integrality oneself specified
Structure of auditing sends the integrality audit request for being directed to cloudy storage system.
S12 is based on integrality audit request, obtains Backward Tree RB-BTT based on prestige corresponding with cloudy storage system
Structure.
The embodiment of property as an example is receiving user for the integrality audit request of cloudy storage system
Afterwards, integrality auditing bodies can obtain the Backward Tree RB-BTT structure based on prestige corresponding with cloudy storage system.Wherein,
The leaf node of RB-BTT structure is corresponding with the proof information of cloud storage service provider in cloudy storage system, RB-BTT knot
The leaf node of structure from left to right is arranged from high to low according to the credit value of cloud storage service provider corresponding to proof information
Column.
Wherein, it was demonstrated that information includes the aggregation information of data block and the aggregation information of label.
Wherein, it should be noted that the aggregation information of the data block of each upper layer node in above-mentioned RB-BTT structure is
As obtained by being added the aggregation information of corresponding data block with two nodes in next node layer corresponding to upper layer node
It arrives, the aggregation information of the label of each upper layer node in RB-BTT structure is as saving with next layer corresponding to upper layer node
The aggregation information of corresponding label be multiplied obtained by two nodes in point.
Wherein, the aggregation information of data block refer to cloud storage service provider for challenge information, calculating by challenge number
According to the summation of block and corresponding random number product.
The aggregation information of label refers to cloud storage service provider for challenge information, the mark by challenge data block of calculating
Label are to correspond to product of the random number as exponential form.
Wherein, it is to be understood that Backward Tree RB-BTT (the Reputation Based based on prestige in the embodiment
Backtracking Tree) structure is pre- according to the credit value of each cloud storage service provider in cloudy storage system institute
First construct.That is, obtaining the backtracking based on prestige corresponding with cloudy storage system being based on integrality audit request
It, can also be according to the preparatory structure of credit value of each cloud storage service provider in cloudy storage system before setting RB-BTT structure
Build RB-BTT structure.Wherein, it should be noted that the process of building RB-BTT structure will be illustrated in subsequent descriptions.
S13, judges whether the proof information of root node in RB-BTT structure passes through data integrity validation.
In one embodiment of the invention, Backward Tree RB- based on prestige corresponding with cloudy storage system is being obtained
After BTT structure, whether true pre-set Bilinear Identity can be verified, that is to say, that can according to the proof information of root node
Whether whether the proof information of verifying root node can make pre-set Bilinear Identity true.
Wherein, if verifying Bilinear Identity is invalid, judge that the proof information of root node does not pass through data verification
Verifying.
Wherein, it is to be understood that Bilinear Identity be it is pre-set can by prove information carry out data integrity
Verifying.
The embodiment of property as an example, for the root node { μ in RB-BTT structurer,σr, it may be verified that verifying is double
Linear equalityIt is whether true.
Wherein, above-mentioned g, u and v expression are the open parameters being arranged in integrality auditing bodies.It is assumed that G1And G2It respectively indicates
The multiplicative cyclic group of Prime Orders p, u indicate G1In take fixed element at random, g indicates G2Generation member, v=gx, wherein x indicates p
Complete residue class ZpIn random element.H(mi) indicate to be requested by direction of audit organizer and obtained, organizer is according to existing
Cloudy storage dynamic updates authentication mechanism, the structure of the cloudy cooperation Merkel's Hash tree of maintenance one, H (mi) it is the cloudy cooperation
The leaf node of Merkel's Hash tree, IiIndicate the rope in cloudy storage system in the corresponding challenge of i-th of cloud storage service provider
Fuse breath.
Wherein, it should be noted that cloudy cooperation Merkel's Hash tree is the cloudy data dynamic of support of organizer's maintenance
Update a kind of data structure of verifying.Wherein, the quantity of subtree is corresponding to cloudy storage in cloudy cooperation Merkel's Hash tree
The quantity of cloud service provider in system, each sub-tree structure are to generate the one of maintenance by corresponding cloud storage service provider
A Merkel's Hash tree.
Wherein, it is to be understood that if the proof information of root node can be such that pre-set Bilinear Identity sets up,
Determine that the data integrity of user is not destroyed in cloudy storage system.
S14 is then looked for from RB-BTT structure if it is judged that the proof information of root node does not pass through data integrity validation
The target leaf node unverified to data integrity, and return to cloud storage service provider corresponding to target leaf node.
The embodiment of property as an example does not pass through data integrity validation in the proof information for determining root node
When, it can continue to carry out data integrity validation to the node in RB-BTT structure in the second layer, and according to the node in the second layer
Verification result continue to search, to find the unverified target leaf node of data integrity, and return to target leaf
Cloud storage service provider corresponding to node.
Wherein, it is to be understood that cloud storage service provider corresponding to target leaf node is to cause user data
The cloud storage service provider of integrity violations.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy
The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established
Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that
When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test
The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage
The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account
It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use
Family waits the time for result of calling to account, and improves the Experience Degree of user.
The embodiment of property as an example constructs the process of RB-BTT structure, as shown in Fig. 2, may include:
S21 obtains the credit value of each cloud storage service provider in cloudy storage system.
S22 calculates the average and standard deviation of credit value according to the credit value of each cloud storage service provider.
S23 calculates separately the difference between the credit value and average value of each cloud storage service provider.
S24 deposits cloud according to the difference between standard deviation and the credit value and average value of each cloud storage service provider
All cloud storage service providers in storage system classify.
The embodiment of property as an example, in the credit value and average value for calculating each cloud storage service provider
Between difference after, for each cloud storage service provider, can determine whether the credit value of cloud storage service provider and average
Whether the difference between value is above standard difference, if the difference between the credit value and average value of cloud storage service provider is more than
Standard deviation, it is determined that cloud storage service provider is the cloud storage service provider for belonging to the first kind.
In addition, if the difference between the credit value and average value of cloud storage service provider is less than standard deviation, into
One step judges whether the difference between the credit value and average value of cloud storage service provider is less than preset threshold, wherein default
Threshold value is corresponding with the negative of standard deviation.
If judging, the difference between the credit value and average value of cloud storage service provider is more than or equal to default threshold
Value, it is determined that cloud storage service provider is the cloud storage service provider for belonging to the second class;If judging, cloud storage service is mentioned
It is less than preset threshold for the difference between the credit value and average value of quotient, it is determined that cloud storage service provider is to belong to third class
Cloud storage service provider.
That is, in the embodiment cloudy storage system organizer according to cloud storage service provider credit value with
Mean value, the relationship of standard deviation divide them into three classifications, from the point of view of the index of credit rating, in the cloudy storage system
In, the cloud storage service provider of these three classifications is that prestige is preferable, prestige is medium, prestige is poor respectively.This classification is compared
To the random alignment of not classifying of cloud storage service provider in traditional approach, so that the cloud storage service provider of three set goes out
Wrong probability is sequentially increased, and each probability for gathering the cloud storage service provider error for including is also to be sequentially increased.This
Sample allows for error-prone cloud storage system no matter between three set, or respectively internal in three set, all concentrates on
Latter half, the structure for supporting cloudy data integrity damage efficiently to call to account for construction lay the foundation.
Wherein, it should be noted that the RB-BTT structure constructed in the embodiment enables to the cloud storage clothes of error
Business provider is concentrated in the right-hand branch of structure with high probability.And in the inside of each branch, error-prone cloud also with
High probability concentrates on right part.In this way during subsequent call to account, the number of user's checking can be efficiently reduced, is improved
The efficiency of calling to account of auditing party.
S25, for each classification, according to the cloud storage service provider in classification according to credit value from small to large sequence according to
Minor sort, to obtain putting in order for classification medium cloud storage service provider.
S26 obtains the proof information of each cloud storage service provider.
S27, for each classification, according to putting in order for classification medium cloud storage service provider, by corresponding cloud storage clothes
The proof information of business provider is arranged successively.
S28 constructs RB-BTT structure according to classification for the rank results for proving information.
Wherein, it is to be understood that arrange leaf node relative to according to the logical number of cloud storage service provider
For Backward Tree (BTT, Backtracking Tree) structure, the embodiment by using cloud storage service provider prestige
Value arranges the RB-BTT structure of leaf node, can substantially reduce subsequent complexity of calling to account when being called to account based on the RB-BTT structure
Degree can especially substantially reduce in cloud storage system while the data of multiple cloud storage service provider storages being protected to occur completely
Property destroy when, the complexity called to account can reduce the expense during calling to account as a result,.
The efficiently side of calling to account is damaged below with reference to the cloudy data integrity in prestige of Fig. 3, Fig. 4 and Fig. 5 to the embodiment
The detailed process of method is described in detail.
Wherein, Fig. 3 is the exemplary diagram that the cloudy data integrity based on prestige damages system of calling to account;Fig. 4 is comprising polymerization
The exemplary diagram of the RB-BTT structure of mode;Fig. 5 is complete according to the cloudy data based on prestige of a specific embodiment of the invention
The flow chart of the whole efficient method of calling to account of property damage.In this embodiment it is assumed that the cloudy storage system of user is by n cloud storage
Service provider's composition.
The method as shown in figure 5, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account
Include the following steps.
S51, user send the integrality audit request for being directed to cloudy storage system to integrality auditing bodies.
During using cloudy storage system storing data, user can be to the integrality auditing bodies hair oneself specified
Send integrality audit request.Specifically, the integrality auditing bodies that user can be specified by the terminal that oneself is used to oneself
Send integrality audit request.
Wherein, terminal can include but is not limited to computer, mobile phone, portable device etc. with the hard of various operating devices
Part equipment, the implementation are not construed as limiting terminal.
S52, integrality auditing bodies send integrality audit challenge to the organizer of cloudy storage system.
Specifically, the integrality auditing bodies that user specifies has been initiated to organizer of the user in cloudy storage system
Whole property audit challenge
S53, organizer send credit value inquiry request to credit assessment mechanism.
Accordingly, the integrality that organizer receives that integrality auditing bodies is sent is audited challenge, and to credit assessment mechanism
Inquire the credit value of n cloud storage service provider.
Wherein, it should be noted that the organizer in the embodiment is the server being managed to cloudy storage system.
S54, organizer receive the credit value { Rep for the n cloud storage service provider that credit assessment mechanism returns1,
Rep2,…Repn}。
Wherein, RepiIndicate the credit value of i-th of cloud storage service provider, wherein the value of i be 1,2 ... .n.
S55, organizer calculate the average and standard deviation of the credit value of this n cloud storage service device provider.
Specifically, organizer receives the credit value { Rep of credit assessment mechanism return1,Rep2,…RepnAfter, it calculates
The mean value of the credit value of this n cloud storage service device provider isAnd standard deviation
S56, organizer calculate separately the difference between the credit value and average value of each cloud storage service provider.
Specifically, next organizer calculates the difference between each cloud storage service provider credit value and average value
ci=Repi-E。
S57, organizer according to the difference between standard deviation and the credit value and average value of each cloud storage service provider,
Classify to all cloud storage service providers in cloud storage system.
Specifically, according to ciThe size relation of value and S, by corresponding cloud storage service provider { CSP1,CSP2,…
CSPnIt is divided into three classes: { CSPi}i∈I, { CSPj}j∈II{ CSPk}k∈III, in every one kind, cloud storage service quotient is according to credit value
It is arranged successively from small to large.Wherein, for the cloud storage service quotient for including in the first kind, there is ci>S,i∈I;For in the second class
The cloud storage service quotient for including, there is-S≤cj<S,j∈II;In third class, ck<-S,k∈III。
S58, for each classification, organizer according to the cloud storage service provider in classification according to credit value from small to large
Sequence successively sorts, to obtain putting in order for classification medium cloud storage service provider.
S59, organizer obtain the proof information of each cloud storage service provider.
Specifically, organizer will challengeN correspondence being transmitted in cloud storage system respectively
Cloud storage service provider, corresponding cloud storage service provider return respectively prove information Pi={ μi,σi},i∈[1,n]。
Wherein, PiIndicate the proof information of i-th of cloud storage service provider, μiIndicate i-th of cloud storage service provider
Data block aggregation information, σiIndicate the aggregation information of the label of i-th of cloud storage service provider.
S60, organizer construct RB-BTT structure.
After the proof information for obtaining each cloud storage service provider, for each classification, organizer is according in classification
Cloud storage service provider puts in order, and the proof information of corresponding cloud storage service provider is arranged successively, and according to
Classification constructs RB-BTT structure for the rank results for proving information.
Specifically, will demonstrate that correspondence is divided into three classes according to the three classes cloud storage service provider divided above.Respectively
According to three set { CSPi}i∈I, { CSPj}j∈II{ CSPk}k∈IIIMedium cloud storage service provider puts in order, by them
Corresponding proof is arranged successively, the leaf node as RB-BTT.Three classes leaf node is polymerize two-by-two respectively, obtains upper layer node.
For example, as shown in figure 4, the cloud storage service provider in the second class return prove PII-1={ μII-1,
σII-1, PII-2={ μII-2,σII-2And PII-3={ μII-3,σII-3}.The method polymerizeing upwards is μII-a=μII-1+μII-2,σII-a=
σII-1·σII-2, μII-r=μII-a+μII-3, σII-r=σII-a·σII-3.By the corresponding sub- root node of three classifications according to shown in Fig. 4
Polymerization methods polymerize, obtain the root node { μ of RB-BTTr,σr}。
S61, organizer send the root node to RB-BTT structure to integrality audit structure.
S62, integrality audit structure carries out data integrity validation to the root node of RB-BTT structure, if being verified,
The auditing result that the data in cloud storage system are not destroyed then is returned to user, if it is not, then requesting its of RB-BTT structure
His node, to obtain the unverified target leaf node of data integrity.
Cloud storage service provider corresponding to target leaf node is supplied to user by S63, integrality audit structure.
Specifically, organizer is by the root node { μ of RB-BTT structurer,σrReturn to the integrality audit machine that user specifies
Structure, as the response challenged it.After integrality auditing bodies receives root node, Bilinear Identity is verifiedIt is whether true, wherein g and v expression is that user audits in traditional integrality
The open parameter being arranged in mechanism, H (mi) it is to be requested by direction of audit organizer and obtained, organizer is according to existing cloudy storage
Dynamic updates authentication mechanism, the structure of the cloudy cooperation Merkel's Hash tree of maintenance one, H (mi) it is that the cloudy cooperation Merkel breathes out
The leaf node of uncommon tree.If the verification passes, then it can confirm that the data integrity of user is not destroyed in cloudy storage system.
Conversely, integrality auditing bodies requests the second node layer in RB-BTT to continue to verify to organizer, to find data integrity
Unverified target leaf node, and cloud storage service provider corresponding to target leaf node is supplied to user.For example,
As shown in figure 4, under the request of integrality auditing bodies, organizer is returned after the root node authentication failed of RB-BTT structure
The second node layer { μ of RB-BTTI-r,σI-rAnd { μa,σa, it separately verifies
WithIt is whether true, find the former set up, and the latter not at
It is vertical.Therefore, continue that the lower level node of the latter is requested to be verified, until finding the unacceptable target leaf node { μ of verifyingIII-1,
σIII-1And { μIII-2,σIII-2, the corresponding cloud storage service provider of target leaf node is that user data integrality is caused to damage
Bad cloud storage service provider.
The efficient method of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy
The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established
Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that
When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test
The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage
The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account
It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use
Family waits the time for result of calling to account, and improves the Experience Degree of user.
In order to realize above-described embodiment, the present invention also proposes that a kind of cloudy data integrity damage based on prestige efficiently chases after
Blame device.
Fig. 6 is device of efficiently being called to account according to the cloudy data integrity damage based on prestige of one embodiment of the invention
Structural schematic diagram.Wherein, it is to be understood that the cloudy data integrity damage that the device is based on prestige, which is efficiently called to account, is
In system.
The device as shown in fig. 6, the cloudy data integrity damage according to an embodiment of the present invention based on prestige is efficiently called to account
Including receiving module 110, obtain module 120, judgment module 130 and processing module 140, in which:
Receiving module 110 is used to receive the integrality audit request for cloudy storage system.
Wherein, cloudy storage system includes multiple cloud storage service providers.
It obtains module 120 to be used to be based on integrality audit request, obtain corresponding with cloudy storage system based on prestige
Backward Tree RB-BTT structure.
Wherein, the proof information of the leaf node of RB-BTT structure and the cloud storage service provider in cloudy storage system
Corresponding, the leaf node of RB-BTT structure from left to right is according to the prestige for proving cloud storage service provider corresponding to information
What value arranged from high to low, it was demonstrated that information includes the aggregation information of data block and the aggregation information of label, in RB-BTT structure
The aggregation information of the data block of each upper layer node is as inciting somebody to action with two nodes in next node layer corresponding to upper layer node
The aggregation information of corresponding data block be added obtained, the polymerization letter of the label of each upper layer node in RB-BTT structure
Breath is as the aggregation information of corresponding label is multiplied with two nodes in next node layer corresponding to upper layer node
It is obtained.
Judgment module 130 is for judging whether the proof information of root node in RB-BTT structure is tested by data integrity
Card.
If proof information of the processing module 140 for root node does not pass through data integrity validation, tied from RB-BTT
The unverified target leaf node of data integrity is found in structure, and is returned to cloud storage service corresponding to target leaf node and mentioned
For quotient.
In one embodiment of the invention, judgment module is specifically used for: according to the proof information of root node, verifying is preparatory
Whether the Bilinear Identity of setting is true, wherein if verifying Bilinear Identity is invalid, judges the permit of root node
Breath is not verified by data verification.
In one embodiment of the invention, on the basis of shown in Fig. 6, as shown in fig. 7, the device can also include
RB-BTT structure constructs module 150, in which:
RB-BTT structure building module 150 is used to obtain the prestige of each cloud storage service provider in cloudy storage system
Value, and according to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated, then, is counted respectively
The difference between the credit value and average value of each cloud storage service provider is calculated, later, according to standard deviation and each cloud storage
Difference between the credit value and average value of service provider carries out all cloud storage service providers in cloud storage system
Classification, and be directed to each classification, according to the cloud storage service provider in classification according to credit value from small to large sequence successively
Then sequence, obtains the card of each cloud storage service provider to obtain putting in order for classification medium cloud storage service provider
Bright information provides corresponding cloud storage service according to putting in order for classification medium cloud storage service provider for each classification
The proof information of quotient is arranged successively, and constructs RB-BTT structure for the rank results for proving information according to classification.
In one embodiment of the invention, RB-BTT structure building module 150 is specifically used for: taking for each cloud storage
Be engaged in provider, judges whether the difference between the credit value and average value of cloud storage service provider is above standard difference;If cloud
Difference between the credit value and average value of storage service provider is above standard difference, it is determined that cloud storage service provider is to belong to
In the cloud storage service provider of the first kind;
In one embodiment of the invention, RB-BTT structure building module 150 is also used to: if cloud storage service provides
Difference between the credit value and average value of quotient is less than standard deviation, then further judges the credit value of cloud storage service provider
Whether the difference between average value is less than preset threshold, wherein preset threshold is corresponding with the negative of standard deviation;If judging cloud
Difference between the credit value and average value of storage service provider is more than or equal to preset threshold, it is determined that cloud storage service
Provider is the cloud storage service provider for belonging to the second class;If judging the credit value and average value of cloud storage service provider
Between difference be less than preset threshold, it is determined that cloud storage service provider is the cloud storage service provider for belonging to third class.
Wherein, it should be noted that the aforementioned cloudy data integrity damage based on prestige efficiently calls to account what method was implemented
Illustrate the efficient device of calling to account of cloudy data integrity damage based on prestige for being also applied for the embodiment, realization principle
Similar, details are not described herein again.
The efficient device of calling to account of cloudy data integrity damage based on prestige of the embodiment of the present invention, receives and deposits for cloudy
The integrality audit request of storage system, and obtain and be in advance based on the RB-BTT knot that the credit value of cloud storage service provider is established
Then whether structure passes through data integrity validation by the proof information to root node in RB-BTT structure, and if it is determined that
When the proof information of root node does not pass through data integrity validation out, from RB-BTT structure finds data integrity and do not pass through and test
The target leaf node of card, and return to cloud storage service provider corresponding to target leaf node.Thereby, it is possible to be taken based on cloud storage
The prestige of business provider efficiently finds the one or more cloud storage service providers for causing corrupted data, and the result that will call to account
It is supplied to user, cloudy data integrity is improved and damages the efficiency called to account, effectively save the expense of auditing party, reduce use
Family waits the time for result of calling to account, and improves the Experience Degree of user.
Wherein, Fig. 8 is cloudy data integrity damage efficient call to account system of the one embodiment of the present of invention based on prestige
Structural schematic diagram, as shown in figure 8, the system may include integrality auditing bodies, cloudy storage system and credit assessment machine
Structure three parts composition.
Wherein, integrality auditing bodies is responsible for the proof information for initiating challenge and verifying organizer returns;
It include organizer and cloud storage service provider in cloudy storage system, wherein organizer is responsible for inquiry composition and uses
The credit value of the cloud storage service provider of the cloudy storage system in family, according to credit value and this specification method pair presented above
Cloud storage service provider classifies, by the challenge classification transmission of audit person to corresponding cloud storage service provider, and
Establish RB-BTT tree.Cloud storage service provider, which is responsible for being generated according to the challenge received, to be proved and returns to tissue
Person;Credit assessment mechanism is responsible for safeguarding and updating the credit value of cloud storage service provider.
As shown in figure 8, integrality auditing bodies is mainly made of two modules of challenge generation module and checking module,
Organizer in cloudy storage system is mainly by three reputation query module, categorization module and RB-BTT generation module module groups
At the cloud storage service provider in cloudy storage system mainly includes proof generation module, and credit assessment mechanism mainly includes
Prestige maintenance module.
The concrete function of each functional module is described below:
1, generation module is challenged
When user entrusts integrality auditing bodies to be stored in the progress integrality audit of the data in cloudy storage to it, by
Integrality auditing bodies generates challenge, and challenge includes n label-set of random numbers, and (n is in the cloudy storage system of user
Cloud storage service provider quantity).After challenge generates, user is sent in its cloudy storage by integrality auditing bodies
The organizer specified in system.
2, checking module
Integrality auditing bodies uses the module after receiving the proof that the organizer in cloudy storage system returns
Verify the correctness proved.If verification result is to pass through, result is fed back into user;, whereas if checking is obstructed
It crosses, then the next node layer proof information that includes for notifying organizer to continue to send RB-BTT structure is verified, until verifying
To the leaf node of RB-BTT, the cloud storage service provider of error is found, and the result that will call to account feeds back to user.
3, reputation query module
After organizer is by receiving integrality audit challenge, according to the module, inquires and challenge to credit assessment mechanism
In include cloud storage service provider credit value, and save the result of inquiry.
4, categorization module
Organizer passes through the mean value of module calculating credit value, standard deviation and each cloud storage service provider
The difference of credit value and standard deviation classifies corresponding cloud storage service provider according to calculated result.
5, RB-BTT generation module
Challenge information is transmitted to corresponding cloud storage service provider by organizer, and receives the permit that they are returned
Breath.By the module, the proof information for the cloud storage service provider classified above is arranged in order, the leaf as RB-BTT
Node, and category polymerize upwards two-by-two.After obtaining the sub- root of each classification, then upward layers of polymer, obtain the root of RB-BTT.
6, generation module is proved
After each of cloudy storage system cloud storage service provider receives its corresponding challenge information, pass through
This module, polymerize the data block information and label information of its storage respectively, returns to organizer as proof.
7, prestige maintenance module
Credit assessment mechanism is responsible for responding the reputation query of organizer in cloudy storage system, and is responsible for management cloud storage
The credit value of ISP updates work.
To realize above-described embodiment, the invention also provides a kind of, and the cloudy data integrity damage based on prestige is efficiently chased after
Device is blamed, the device that should efficiently call to account based on the cloudy data integrity damage of prestige includes: processor;It can for storage processor
The memory executed instruction;Wherein, processor is configured as executing the cloudy data integrity based on prestige of above-described embodiment
The efficient method of calling to account of damage.
To realize above-described embodiment, the invention also provides a kind of computer readable storage mediums, are stored thereon with calculating
Machine program realizes that the cloudy data integrity damage based on prestige of above-described embodiment is efficiently called to account when program is executed by processor
Method.
To realize above-described embodiment, the invention also provides a kind of computer program products, when in computer program product
Instruction processing unit when executing, the cloudy data integrity damage based on prestige for executing above-described embodiment is efficiently called to account method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is two or more, unless separately
There is clearly specific restriction.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction executing device, device or equipment (such as computer based device, including the device of processor or other can be held from instruction
Luggage sets, device or equipment instruction fetch and the device executed instruction) it uses, or combine these instruction executing devices, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction executing device, device or equipment or the dress used in conjunction with these instruction executing devices, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings
Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction executing device with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention
Type.
Claims (8)
- A kind of method 1. cloudy data integrity damage based on prestige is efficiently called to account, which comprises the following steps:Receive the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system includes multiple cloud storages Service provider;Based on the integrality audit request, Backward Tree RB-BTT based on prestige corresponding with the cloudy storage system is obtained Structure, wherein the card of the cloud storage service provider in the leaf node of the RB-BTT structure and the cloudy storage system Bright information is corresponding, and the leaf node of the RB-BTT structure from left to right is taken according to cloud storage corresponding to the proof information What the credit value of business provider arranged from high to low, it is described to prove that information includes the aggregation information of data block and the polymerization letter of label Breath;Judge whether the proof information of root node in the RB-BTT structure passes through data integrity validation;If it is judged that the proof information of the root node does not pass through data integrity validation, then looked for from the RB-BTT structure The target leaf node unverified to data integrity, and the offer of cloud storage service corresponding to the target leaf node is provided Quotient;Wherein, described to obtain the Backward Tree RB-BTT structure based on prestige corresponding with the cloudy storage system, it specifically includes:Obtain the credit value of each cloud storage service provider in the cloudy storage system;According to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated;Calculate separately the difference between the credit value and the average value of each cloud storage service provider;According to the difference between the standard deviation and the credit value and the average value of each cloud storage service provider, to described All cloud storage service providers in cloud storage system classify;For each classification, according to the cloud storage service provider in the classification, according to credit value, sequence is successively arranged from small to large Sequence, to obtain putting in order for the classification medium cloud storage service provider;Obtain the proof information of each cloud storage service provider;Corresponding cloud storage service is mentioned according to putting in order for the classification medium cloud storage service provider for each classification It is arranged successively for the proof information of quotient;According to classification for the rank results for proving information, the RB-BTT structure is constructed.
- 2. the method as described in claim 1, which is characterized in that the permit of root node in the judgement RB-BTT structure Whether breath passes through data integrity validation, comprising:According to the proof information of the root node, whether true pre-set Bilinear Identity is verified, wherein if verifying institute It states that Bilinear Identity is invalid, then judges that the proof information of the root node does not pass through data verification and verifies.
- 3. the method as described in claim 1, which is characterized in that described to be provided according to the standard deviation and each cloud storage service Difference between the credit value of quotient and the average value carries out all cloud storage service providers in the cloud storage system Classification, comprising:For each cloud storage service provider, judge between the credit value and the average value of the cloud storage service provider Difference whether be more than the standard deviation;If the difference between the credit value and the average value of the cloud storage service provider is more than the standard deviation, really The fixed cloud storage service provider is the cloud storage service provider for belonging to the first kind.
- 4. method as claimed in claim 3, which is characterized in that the method also includes:If the difference between the credit value and the average value of the cloud storage service provider is less than the standard deviation, Further judge whether the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Wherein, the preset threshold is corresponding with the negative of the standard deviation;If it is pre- to judge that the difference between the credit value and the average value of the cloud storage service provider is more than or equal to If threshold value, it is determined that the cloud storage service provider is the cloud storage service provider for belonging to the second class;If judging, the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Determine that the cloud storage service provider is the cloud storage service provider for belonging to third class.
- The device 5. a kind of cloudy data integrity damage based on prestige is efficiently called to account characterized by comprisingReceiving module, for receiving the integrality audit request for being directed to cloudy storage system, wherein the cloudy storage system packet Include multiple cloud storage service providers;Module is obtained, for being based on the integrality audit request, is obtained corresponding with the cloudy storage system based on prestige Backward Tree RB-BTT structure, wherein the cloud storage in the leaf node of the RB-BTT structure and the cloudy storage system The proof information of service provider is corresponding, and the leaf node of the RB-BTT structure from left to right is according to proof information institute What the credit value of corresponding cloud storage service provider arranged from high to low, it is described to prove that information includes the aggregation information of data block With the aggregation information of label;Judgment module, for judging whether the proof information of root node in the RB-BTT structure passes through data integrity validation;Processing module, if the proof information for the root node does not pass through data integrity validation, from the RB-BTT The unverified target leaf node of data integrity is found in structure, and returns to cloud storage corresponding to the target leaf node Service provider;RB-BTT structure constructs module, for obtaining the prestige of each cloud storage service provider in the cloudy storage system Value, and according to the credit value of each cloud storage service provider, the average and standard deviation of credit value is calculated, then, is counted respectively The difference between the credit value and the average value of each cloud storage service provider is calculated, later, according to the standard deviation and often Difference between the credit value and the average value of a cloud storage service provider, deposits all clouds in the cloud storage system Storage service provider classifies, and is directed to each classification, according to the cloud storage service provider in the classification according to letter Sequence successively sorts reputation value from small to large, to obtain putting in order for the classification medium cloud storage service provider, then, obtains The proof information of each cloud storage service provider, for each classification, according to the classification medium cloud storage service provider It puts in order, the proof information of corresponding cloud storage service provider is arranged successively, and according to classification for proof information Rank results construct the RB-BTT structure.
- 6. device as claimed in claim 5, which is characterized in that the judgment module is specifically used for:According to the proof information of the root node, whether true pre-set Bilinear Identity is verified, wherein if verifying institute It states that Bilinear Identity is invalid, then judges that the proof information of the root node does not pass through data verification and verifies.
- 7. device as claimed in claim 5, which is characterized in that the RB-BTT structure constructs module, is specifically used for:For each cloud storage service provider, judge between the credit value and the average value of the cloud storage service provider Difference whether be more than the standard deviation;If the difference between the credit value and the average value of the cloud storage service provider is more than the standard deviation, really The fixed cloud storage service provider is the cloud storage service provider for belonging to the first kind.
- 8. device as claimed in claim 7, which is characterized in that the RB-BTT structure constructs module, is also used to:If the difference between the credit value and the average value of the cloud storage service provider is less than the standard deviation, Further judge whether the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Wherein, the preset threshold is corresponding with the negative of the standard deviation;If it is pre- to judge that the difference between the credit value and the average value of the cloud storage service provider is more than or equal to If threshold value, it is determined that the cloud storage service provider is the cloud storage service provider for belonging to the second class;If judging, the difference between the credit value and the average value of the cloud storage service provider is less than preset threshold, Determine that the cloud storage service provider is the cloud storage service provider for belonging to third class.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710909484.5A CN107659654B (en) | 2017-09-29 | 2017-09-29 | The efficient method and device of calling to account of cloudy data integrity damage based on prestige |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710909484.5A CN107659654B (en) | 2017-09-29 | 2017-09-29 | The efficient method and device of calling to account of cloudy data integrity damage based on prestige |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107659654A CN107659654A (en) | 2018-02-02 |
CN107659654B true CN107659654B (en) | 2019-08-09 |
Family
ID=61117345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710909484.5A Active CN107659654B (en) | 2017-09-29 | 2017-09-29 | The efficient method and device of calling to account of cloudy data integrity damage based on prestige |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107659654B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664221B (en) * | 2018-05-11 | 2022-04-01 | 北京奇虎科技有限公司 | Data holding certification method, device and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801524A (en) * | 2012-06-13 | 2012-11-28 | 天津大学 | Trust-theory-based trusted service system based on trusted authentication system |
CN103268460A (en) * | 2013-06-20 | 2013-08-28 | 北京航空航天大学 | Integrity verification method of cloud storage data |
CN105474166A (en) * | 2013-03-15 | 2016-04-06 | 先进元素科技公司 | Methods and systems for purposeful computing |
CN106230626A (en) * | 2016-07-28 | 2016-12-14 | 昆明理工大学 | A kind of online service measures of reputation method of the relation that is dominant based on service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070220614A1 (en) * | 2006-03-14 | 2007-09-20 | Jason Ellis | Distributed access to valuable and sensitive documents and data |
-
2017
- 2017-09-29 CN CN201710909484.5A patent/CN107659654B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801524A (en) * | 2012-06-13 | 2012-11-28 | 天津大学 | Trust-theory-based trusted service system based on trusted authentication system |
CN105474166A (en) * | 2013-03-15 | 2016-04-06 | 先进元素科技公司 | Methods and systems for purposeful computing |
CN103268460A (en) * | 2013-06-20 | 2013-08-28 | 北京航空航天大学 | Integrity verification method of cloud storage data |
CN106230626A (en) * | 2016-07-28 | 2016-12-14 | 昆明理工大学 | A kind of online service measures of reputation method of the relation that is dominant based on service |
Non-Patent Citations (1)
Title |
---|
基于信誉的P2P网络信任机制的研究与实现;唐鑫;《中国优秀硕士学位论文全文数据库信息科技辑I139-233》;20120731;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN107659654A (en) | 2018-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105868369B (en) | A kind of data model verifying System and method for based on Merkle tree construction | |
KR102237014B1 (en) | System and method for blockchain-based authentication | |
EP3590226A2 (en) | System and method for generating digital marks | |
CN110264354A (en) | It creates block chain account and verifies the method and device of block chain transaction | |
CN110990879B (en) | Data evidence storing method based on block chain | |
CN110266872A (en) | Management-control method, device and the cloud address book system of address book data | |
US20210112160A1 (en) | Decentralized automatic phone fraud risk management | |
US20190229931A1 (en) | Distributed telephone number ledger and register | |
CN107124426A (en) | The method for authenticating and device of a kind of user's right | |
EP3942787A1 (en) | Validating telephone calls by verifying entity identities using blockchains | |
CN113886501A (en) | Block chain service module extension method based on multi-chain architecture | |
CN105871888A (en) | Identity authentication method, device and system | |
CN107659654B (en) | The efficient method and device of calling to account of cloudy data integrity damage based on prestige | |
CN111010282B (en) | Block chain-based information processing method, related device and storage medium | |
Etemad et al. | Database outsourcing with hierarchical authenticated data structures | |
CN112804207B (en) | Alliance chain node security admission method applied to electronic government affair scene | |
CN113722285A (en) | Multi-chain-based cross-chain distributed file storage and verification system | |
Phiri et al. | Modelling and information fusion in digital identity management systems | |
CN110071966B (en) | Block chain networking and data processing method based on cloud platform | |
CN108170860A (en) | Data query method, apparatus, electronic equipment and computer readable storage medium | |
US20140059044A1 (en) | Node validation in a network | |
CN109711979A (en) | A kind of user information auditing system and checking method | |
CN110689424B (en) | Funds supply and demand matching method and system | |
CN113435517A (en) | Abnormal data point output method and device, computer equipment and storage medium | |
CN110910091A (en) | Data processing method, device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |