CN109194466A - A kind of cloud data integrity detection method and system based on block chain - Google Patents

A kind of cloud data integrity detection method and system based on block chain Download PDF

Info

Publication number
CN109194466A
CN109194466A CN201811264304.3A CN201811264304A CN109194466A CN 109194466 A CN109194466 A CN 109194466A CN 201811264304 A CN201811264304 A CN 201811264304A CN 109194466 A CN109194466 A CN 109194466A
Authority
CN
China
Prior art keywords
cloud
user
data
signature
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811264304.3A
Other languages
Chinese (zh)
Other versions
CN109194466B (en
Inventor
刘晓光
王国浩
王刚
阎萌
凤佳琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nankai University
Original Assignee
Nankai University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nankai University filed Critical Nankai University
Priority to CN201811264304.3A priority Critical patent/CN109194466B/en
Publication of CN109194466A publication Critical patent/CN109194466A/en
Application granted granted Critical
Publication of CN109194466B publication Critical patent/CN109194466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of data integrity detection method and system based on block chain.It include: that 1. users handle file to obtain multiple blocks of files using Encryption Algorithm and correcting and eleting codes.2. user signs to each obtained blocks of files using private key for user.3. obtained data block and signature are uploaded to cloud by user.4. the data block and its digital signature that receive are verified using signature verification algorithm in cloud.5. if cloud saves the data block received and its signature, and is published in block chain after carrying out dual signature to data block signature using cloud private key, and respective stored address is returned to user be proved to be successful in 4.6. user carries out completeness check to cloud data using storage address described in hash algorithm, private key for user described in 2 and cloud public key, 5.7. cloud carries out completeness check to data using storage address described in hash algorithm, client public key and cloud public key, 5.

Description

A kind of cloud data integrity detection method and system based on block chain
[technical field]
The invention belongs to cloud storage technical field, in particular to a kind of the integrality detection method and system of cloud data.
[background technique]
Cloud storage is a kind of data service model by third party cloud service provider's maintenance and management data.In order to guarantee The availability of cloud storage, user need periodically payment purchase service so that they can on any smart machine access number According to.Due to the increase of data volume and the finiteness of personal memory device, cloud storage is widely used by various clients, including Personal user and enterprise customer.Cloud storage technology brings many conveniences to people's lives, however, when cloud storage service failure There is generation.Data are during storing and transmitting because network transmission mistake or hacker attack and the maloperation of administrator cause to use User data error, not can guarantee using the integrality of user data.
Block chain is one " decentralization " distributed account book system, and feature can not exactly be changed, can not be forged, and is made The characteristics of it can not be distorted for a kind of emerging technology has attracted the concern of many industries, including finance, health care, public affairs With cause, real estate and government organs.Each of block chain network node can share entity, but none is saved Point can control modification entity.This technology is designed to pair that the confrontation in environment with keen competition carries out criminal manipulation Hand.
When data are uploaded to cloud by user, user loses the control to data, judge cloud data whether be completely One new challenge.
[summary of the invention]
In the case where for user and cloud mutual mistrust, to the integrality of the cloud data of user The integrality detection method and system of a kind of cloud data based on block chain technology are provided, it can be effectively to cloud data Integrality is detected, and more parts of different data for uploading cloud for user can quickly judge whether certain part of data are usurped Change.
For the purpose for realizing foregoing invention, present invention firstly provides a kind of integralities of cloud data based on block chain Detection method.Referring to Fig.1, key step includes:
Step 1 (101), user handle file to obtain multiple blocks of files using Encryption Algorithm and correcting and eleting codes.
Step 2 (102), user sign to each blocks of files obtained by 101 using private key for user.
Step 3 (103), user's data block as obtained in 101 and the signature as obtained in 102 are uploaded to cloud.
The data block and its digital signature that receive are verified using signature verification algorithm in step 4 (104), cloud.
Step 5 (105), if being proved to be successful in 104, cloud saves the data block received and its signature, and uses cloud End private key signs to data block carry out dual signature after this dual signature is published in block chain, and by respective stored address Return to user.
Step 6 (106), user are public using cloud described in hash algorithm described in 102, private key for user and 105 Key, storage address carry out completeness check to cloud data.
Step 7 (107), cloud are public using cloud described in hash algorithm described in 102, client public key and 105 Key, storage address carry out completeness check to data.
Optionally, the hash algorithm is SHA256 algorithm.
Optionally, the non-encrypted algorithm is AES encryption algorithm.
Optionally, the cloud is the cloudy cloud being made of several cloud service providers.
Optionally, the block chain is the block chain network using bit coin as representative.
For achieving the above object, the present invention also provides a kind of integrity detections of cloud data based on block chain System, and the validity of the system is demonstrated in experimental situation.Referring to Fig. 3, which includes: user's uploading module, cloud Accept module, user's detection module and cloud detection module.Wherein,
User's uploading module accepts module for being handled file and uploading to cloud;
Cloud accepts module, verifies for cloud to the data block and digital signature that receive, if being proved to be successful On the address passback user for carrying out dual signature to data block and being uploaded to block chain network, and block chain network is returned Transmission module;
User's detection module carries out completeness check to cloud data for user, accepts module from cloud and stored Data, and from cloud accept module return block chain network address voucher, user's detection module using obtain data and Voucher detects cloud data integrity;
Cloud detection module carries out completeness check to data for cloud, and cloud detection module use is from block link network The address voucher and available data that network obtains carry out the detection of cloud data integrity.
The advantages of the present invention are that it is possible to effectively detect the integrality of cloud data, for The more parts of different data that user uploads cloud can quickly judge whether certain part of data are tampered, and the present invention can fit extensively Integrity detection field for cloud storage.
[Detailed description of the invention]
Fig. 1 is the integrality detection method flow chart of cloud data of the invention;
Fig. 2 is the method flow diagram of the integrity detection scheme processing file of cloud data of the invention;
Fig. 3 is the program output of the integrity detection scheme detection process of cloud data of the invention;
Fig. 4 is the integrity detection system schematic diagram of cloud data of the invention;
Fig. 5 is the chronergy comparison diagram of the integrity detection experiment of cloud data of the invention.
[specific embodiment]
The above objects, features and advantages of the present invention for ease of understanding, with reference to the accompanying drawing with specific embodiment to this Invention is described in further detail.Obviously, following embodiments are only a part of the embodiments of the present invention, rather than whole Embodiment.Based on the algorithm idea and embodiment in the present invention, those skilled in the art's other embodiments obtained all belong to In protection category of the invention.
In the present embodiment, user and cloud are the both sides of mutual mistrust, in order to audit save data beyond the clouds whether by It distorts, the open account book by block chain as storage validating documents.Block chain is distribution account book disclosed in one kind, rewrite or The cost that person modifies transaction is very high.Once information is by verifying and being added in block chain, which permanent will be stored Get up, unless most of node in system can be controlled simultaneously, be otherwise to the modification of information on individual node it is invalid, Therefore block chain can be considered with the characteristic that can not be distorted;And block chain has publicity, and the data of block chain are to owner Open, anyone can access block chain data and exploitation related application.Therefore block chain can be used as independently of user and The trusted third party in cloud.
Embodiment 1,
The integrality detection method of cloud data provided by the invention based on block chain, as shown in Figure 1, key step packet It includes:
[101] step 1: user handles file to obtain multiple blocks of files using Encryption Algorithm and correcting and eleting codes.
The processing includes encrypting to file.It is described to file carry out encryption be in order to prevent data content by not by The user of letter accesses.The file of user may include privacy and confidential information under cloud storage scene, and user distrusts cloud service Quotient, therefore cloud service provider reads the content of user file in order to prevent, guarantees data security, and needs before file upload to it It is encrypted.
Specifically, the encryption can select to calculate using symmetric encipherment algorithm or asymmetric encryption according to different scenes Method encrypts file.As other users that the file that user is uploaded only allows oneself to read, be not shared in system When, using symmetric encryption method, that is, encrypts and decryption uses the same key.User generates at random before executing Encryption Algorithm One encryption key encrypts file with the key, and when decryption also uses the key.When the file that user is uploaded allows other use When family is read, using asymmet-ric encryption method, user generates a pair of of public key and private key, user at random before executing Encryption Algorithm Using private key encryption file, and public key is disclosed to the trusted users for being allowed to read this document, public affairs can be used in these users Key is decrypted file to read file content.
Particularly, for the key, user can save it in client personal computer or be securely stored in Cloud.The method of described " being securely stored in cloud " is that encryption key is spread to multiple servers by privacy sharing method On.
Illustratively, when user wants the file of a 8M size saving the use not allowed for beyond the clouds in addition to oneself Family read file content when, first use random algorithm generate a random key, then using AES encryption algorithm to file into Row encryption, i.e., using filename text and newly-generated key as the input of AES encryption function, function export it is encrypted after it is close Text.Encryption to have read the data saved beyond the clouds even if attacker, as can not decrypt ciphertext and obtain not To any information about plaintext document.The key that user uses when locally saving encryption, when user wants to read this document When, as long as downloading ciphertext from cloud and being decrypted using previously stored key-pair file, can successfully read in file Hold.
The treatment process further includes carrying out redundancy encoding to file using correcting and eleting codes.The use of the correcting and eleting codes be in order to Improve the reliability of storage, even if so that file distorted, the fortuitous events such as partial destruction when be still able to be read. After user stores files into cloud, the control to file is just lost;And it is possible to meet on Cloud Server each Kind failure and attack: the file of user is possible to lose a part of information because of disk failure, it is possible to be attacked and be led Data are caused partially to be distorted, etc..These failures and attack will lead to file permanent damages and can not read.It is deposited to improve File division is equal-sized several blocks of files using correcting and eleting codes technology, includes one in these blocks of files by the reliability of storage A little redundancies, therefore even if there is partial document block to be damaged can use the blocks of files that is not damaged still to restore File out.
It specifically, first will be literary when being encoded using the RS code that parameter is (k, n) to the file that a size is F Part cutting is the blocks of files that length is F/k;Particularly, it if the last one file block length is less than F/k, is mended at its end 0 to length be equal to F/k.The value of other (n-k) a block is calculated using this k block, the length of this (n-k) a block is also equal to F/k.Thus n blocks of files is obtained, original can be recovered by arbitrarily choosing k block from this n blocks of files.
Illustratively, the file of one 8MB is encoded using the RS code that parameter is (4,6).First by file cutting For 4 blocks of files that length is 2MB, the value of other 2 blocks is calculated using this 4 blocks, obtains 6 blocks of files.So, from this Original can be recovered by arbitrarily choosing 4 in 6 blocks of files.
As shown in Fig. 2, described handle file to obtain the specific of multiple blocks of files using Encryption Algorithm and correcting and eleting codes Process is as follows:
Step 1.1: being directed to a file, user encrypts file using Encryption Algorithm to obtain ciphertext.
The Encryption Algorithm refers to AES encryption.
Step 1.2: the ciphertext obtained for encryption, user is encoded to obtain equal-sized using correcting and eleting codes to ciphertext Multiple data blocks.
The correcting and eleting codes refer to that parameter is the RS code of (k, n), and the value of parameter is specified by user.After the coding with the RS code The number of the data block arrived is n.
[102] step 2: user signs to each blocks of files obtained by 101 using user's signature private key.
The signature process includes following two steps:
Step 2.1: to each data block Fi, user obtains the cryptographic Hash H of data block using hash algorithmi
Hash algorithm is a kind of common compression mapping method, the input data of random length can be mapped as fixing The output data of length, referred to as " cryptographic Hash " of the input data.SHA (Secure Hash Algorithm) secure Hash system Column algorithm can guarantee that two different input datas will not generate identical cryptographic Hash, once that is, input data change it is defeated Cryptographic Hash out also can be different, therefore can be by verification data cryptographic Hash come verification of data integrity.Different SHA algorithms can To generate the cryptographic Hash of different length, the cryptographic Hash length that SHA256 algorithm generates is 256 bits.
Illustratively, Hash operation is carried out to the blocks of files that a length is 2MB using SHA256 hash algorithm and obtains one A length is the character string of 256 bits.
Step 2.2: to each data block cryptographic Hash Hi, user encrypted to obtain digital signature S using private key for useri
Used private key when the user's signature private key is different from the use of rivest, shamir, adelman encryption file.The label Name private key generates when being user's registration, is served only for user and signs to blocks of files.Signature private key is locally taken care of by user, signature Public key is disclosed to cloud service provider and other trusted users.Defined in signature algorithm using signature private key carry out signature algorithm and The signature verification algorithm carried out using public signature key.
Illustratively, user is generated when first time system being added by key defined in operation elliptic curve Algorithm generates a pair of private key and public key for signature, meanwhile, which also defines is calculated using the signature that signature private key carries out Method and the signature verification algorithm carried out using public signature key.Signature private key is safely stored in local by user, by public signature key It is disclosed to cloud service provider.It signs each time after this, user uses current signature private key generated, runs signature algorithm It signs;And the cloud service provider for only possessing public signature key can run signature verification algorithm to verify the number that user sends It is whether consistent according to signing with it, to verify the integrality of signer identity and data.
[103] step 3: user's data block as obtained in 101 and the signature as obtained in 102 are uploaded to cloud.
Channel used in the upload procedure is trusted channel, and the attack of information stealth will not occur, i.e. information will not Leakage.But the trusted channel is in transmission process it is possible that mistake, the signature of data block is precisely in order to prevent such ask Topic.Cloud service provider can verify the data received by operation signature verification algorithm after receiving data block and its signature The integrality of block so that detect error in data in time.So far, processing terminate for file by user.
[104] step 4: the data block and its digital signature that receive are verified using signature verification algorithm in cloud.
Signature verification algorithm described in step 2.2 in the signature verification algorithm i.e. 102.Cloud is public using the signature of user Key runs signature verification algorithm, can verify the integrality of signer identity and data block.Described in 103 There is mistake to the signature process of file in error of transmission or user, can be fast by signature verification algorithm in this step Speed detected, and the data of mistake are saved so as to avoid cloud.This is the first time detection for data integrity.Especially Result can be fed back to user and request data retransmission by ground, when failing the authentication, cloud.
Illustratively, the example in 102 is corresponded to, cloud is directed to each data block F receivedi, breathed out using SHA256 Uncommon algorithm obtains its cryptographic Hash Hash (Fi).The digital signature S received for eachi, cloud is solved using client public key It is close to obtain Dec (Si), if Hash (Fi) and Dec (Si) identical, it is proved to be successful, otherwise output 0 exports 1.
The verification process has been to ensure that the non-something unexpected happened of the upload procedure from user to cloud: Hash (Fi) and Dec(Si) it is identical illustrate the data that cloud receives and the data that user uploads be it is identical, i.e., accident does not occur for upload procedure.
[105] step 5: if being proved to be successful in 104, cloud saves the data block received and its signature, and uses cloud End signature private key is disclosed in block chain after carrying out dual signature to data block signature, and respective stored address is returned to User.
The cloud signature private key is identical as user's signature private key functionality described in 102, signs for cloud.Its is right The public signature key answered is disclosed to all users by cloud, for carrying out signature verification.It signs described in the endorsement method and 102 Method is identical, includes two steps described in 102.
Specifically, cloud generates a pair of private key and public key for signature by operation elliptic curve, meanwhile, the calculation Method also defines the signature algorithm carried out using signature private key and the signature verification algorithm carried out using public signature key.Cloud will be signed Name private key safely saves, and public signature key is disclosed to all users, and all users can be with this public signature key to cloud Signature and signature contents verified.When the verification result is successfully in 104, cloud saves the number received in 103 It tries again signature, i.e. dual signature according to block and its signature, and using private key to these data blocks signature, it is then that these are secondary Signature is published in block chain.
The dual signature refer to cloud by the data block received signature as signature algorithm input data thus The new signature generated is the equal of second of signature to former data block.
The block chain is that one kind can only execute the distributed data base increased with search operation, not with content on chain The attribute that can be distorted.Bit coin block chain is used to record the bit coin transaction in bit coin network, retains in every transaction certain Space message of transacting business, which is greater than the size of voucher (i.e. dual signature) being calculated in this step, therefore can Voucher to be stored in the transaction of block chain.Since each transaction identifier is unique, the address of voucher is unique, use Family can give voucher for change according to address.Bit coin block chain is current reliability and the strongest block chain of stability.Voucher is deposited It can choose the global public chain or system development of such as bit coin block chain, ether mill block chain when storing up block chain The private chain being only made of cloud and user that person's neotectonics goes out.If using public chain, the announcement process is come using existing api It will be in signature write-in block chain;If announcing process i.e. cloud using private chain and successfully initiating a transaction and transaction in network It is successfully packaged into block and is received by most of nodes in network.
The storage address with openly on block chain data content correspond, any use for possessing the storage address Family can request data content corresponding to this storage address to block chain.
Illustratively, after being proved to be successful, cloud is by data block F1,…,FnWith digital signature S1,…,SnIt saves.For Each digital signature S receivedi, cloud signs it to obtain S using cloud private keyi', then mentioned using Tierion The open api supplied passes through http request for S according to regulation formati' send, and pass through Chainpoint agreement for Si' anchor Determine into bit coin block chain, cloud can receive the anchoring successful information and storage address of Tierion return after being anchored successfully. Anchoring successful information is for proving Si' it has successfully been anchored to bit coin block chain, storage address is for reading Si’。
So far the upload of step, data has been completed.User and cloud can at any time carry out the data uploaded Whole property detection.
[106] step 6: user is public using cloud described in hash algorithm described in 102, private key for user and 105 Key, storage address carry out completeness check to cloud data.
Specific step is as follows for the completeness check:
Step 6.1: the data block F that user uploads from cloud downloading 1031,…,Fn
Step 6.2: user requests to obtain data block F from block chain using storage address K1,…,FnCorresponding voucher S1’,…,Sn’。
Illustratively, the api interface that user is provided by Tierion sends http request, request according to the format of regulation Comprising storage address obtained in 105, Tierion can return to the content that user is anchored on block chain, i.e. this step is asked The voucher asked.
Step 6.3: downloading obtained data block F for eachi, user obtains the Kazakhstan of digital signature using hash algorithm Uncommon value Hash (Fi), and it is signed using private key for user to obtain digital signature Sign (Hash (Fi))。
Step 6.4: being directed to each data block voucher Si', user is decrypted it to obtain Dec using cloud public key (Si'), if Sign (Hash (Fi')) and Dec (Si') it is identical, then user can primary data it is complete, otherwise data integrity is by broken It is bad.
Illustratively, the byte number that the file of a 8MB size includes is 8388600, and carrying out end polishing makes this article The byte number for the file that the multiple that part is 16 obtains is 8388608, with length and the length of the plaintext phase of ciphertext after AES encryption Together.It is encoded by the RS code that parameter is (4,6), obtains the blocks of files that 6 byte numbers are 2097152.According to method described in 101 It is handled to obtain 6 sizes to be 2MB blocks of files (it is the RS code of (4,6) that we, which use parameter, herein).With first file Block citing, is signed to obtain 256 signature 3F789D362290A847B432 using user's signature private key
[107] step 7: cloud is public using cloud described in hash algorithm described in 102, client public key and 105 Key, storage address carry out completeness check to data.
Specific step is as follows for the completeness check:
Step 7.1: requesting to obtain the corresponding voucher S of data block from block chain using storage address K in cloud1’,…,Sn’。
Illustratively, the api interface that cloud is provided by Tierion sends http request, request according to the format of regulation Comprising storage address obtained in 105, Tierion can return to the content that cloud is anchored on block chain, i.e. this step is asked The voucher asked.
Step 7.2: the data block F received in 103 for eachi, cloud obtains its Hash using hash algorithm Value Hash (Fi)。
Step 7.3: being directed to each data block voucher Si', cloud is successively decrypted using cloud public key and private key for user To Dec (Dec (Si')), if Hash (Fi) and Dec (Dec (Si')) it is identical, then cloud can primary data it is complete, otherwise data are complete Property is destroyed.
Illustratively, there is detection data block integrality using the program code that the integrity checking method is realized out Function, when a data block is that completely, program passes through integrity verification is returned;When a data block is distorted, journey Sequence will return to integrity verification failure, show that data block is distorted.Experimental result output is as shown in Figure 3.Such as in Fig. 3 147 rows export shown, when the data block that we download to from cloud is complete, integrity detection output " good Signature " (correctly signature);As shown in the 148th row in Fig. 3, when the data block that we download to from cloud is to be tampered , complete heart difficulty measured data " BAD SIGNATURE " (bad signature).
Embodiment 2,
Another embodiment of the invention additionally provides a kind of integrity detection system of cloud data, as shown in figure 3, should System includes: that user's uploading module, cloud accept module, user's detection module and cloud detection module.Wherein,
User's uploading module accepts module for being handled file and being uploaded to cloud, and specific method can refer to reality Step 101,102 and 103 in example 1;
Cloud accepts module, verifies for cloud to the data block and digital signature that receive, if being proved to be successful On the address passback user for carrying out dual signature to data block and being uploaded to block chain network, and block chain network is returned Transmission module, specific method can refer to step 104 and 105 in example 1;
User's detection module carries out completeness check to cloud data for user, accepts module from cloud and stored Data, and from cloud accept module return block chain network address voucher, user's detection module using obtain data Cloud data integrity is detected with voucher, specific method can refer to step 106 in example 1;
Cloud detection module carries out completeness check to data for cloud, and cloud detection module use is from block link network The address voucher and available data that network obtains carry out the detection of cloud data integrity, and specific method can refer to step in example 1 107。
The file that one size is 8MB is handled using the integrity detection system, it will be in file handling procedure The parameter of RS code is set as (3,6).Under the simulation cloud environment that we are established, which is tested, is obtained File upload, downloading and integrity detection required for the time it is as shown in Figure 4.
Detailed Jie has been carried out to the integrality detection method and system of the cloud data of the invention based on block chain above It continues, specific examples are applied in the present invention is illustrated the principle of the present invention and embodiment, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (6)

1. a kind of cloud data integrity detection method based on block chain, which is characterized in that the described method comprises the following steps:
Step 1, user handles file to obtain multiple blocks of files using Encryption Algorithm and correcting and eleting codes;
Step 2, user signs to each blocks of files as obtained in step 1 using private key for user;
Step 3, user's data block as obtained in step 1 and the signature as obtained in step 2 are uploaded to cloud;
Step 4, the data block and its digital signature that receive are verified using signature verification algorithm in cloud;
Step 5, if being proved to be successful in step 4, cloud saves the data block received and its signature, and uses cloud private key pair This dual signature is published in block chain by data block signature after carrying out dual signature, and respective stored address is returned to use Family;
Step 6, user stores ground using described in private key for user described in hash algorithm, step 2 and cloud public key, step 5 Location carries out completeness check to cloud data;
Step 7, cloud using storage address described in hash algorithm, client public key and cloud public key, step 5 to data into Row completeness check.
2. the method as described in claim 1, which is characterized in that the hash algorithm is SHA256 algorithm.
3. the method as described in claim 1, which is characterized in that the Encryption Algorithm is AES encryption algorithm.
4. the method as described in claim 1, which is characterized in that the cloud is the cloudy cloud of several cloud service providers composition.
5. the method as described in claim 1, which is characterized in that the block chain is the block link network using bit coin as representative Network.
6. a kind of integrity detection system of cloud data characterized by comprising user's uploading module, cloud accept module, User's detection module and cloud detection module;Wherein,
User's uploading module accepts module for being handled file and uploading to cloud;
Cloud accepts module, verifies for cloud to the data block and digital signature that receive, the logarithm if being proved to be successful Dual signature is carried out according to block and is uploaded to block chain network, and the address passback user that block chain network is returned uploads mould Block;
User's detection module carries out completeness check to cloud data for user, accepts the number that module obtains storage from cloud According to, and from cloud accept module return block chain network address voucher, user's detection module using obtain data and voucher Cloud data integrity is detected;
Cloud detection module carries out completeness check to data for cloud, and cloud detection module use is obtained from block chain network The address voucher and available data obtained carries out the detection of cloud data integrity.
CN201811264304.3A 2018-10-29 2018-10-29 Block chain-based cloud data integrity detection method and system Active CN109194466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811264304.3A CN109194466B (en) 2018-10-29 2018-10-29 Block chain-based cloud data integrity detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811264304.3A CN109194466B (en) 2018-10-29 2018-10-29 Block chain-based cloud data integrity detection method and system

Publications (2)

Publication Number Publication Date
CN109194466A true CN109194466A (en) 2019-01-11
CN109194466B CN109194466B (en) 2021-07-06

Family

ID=64944194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811264304.3A Active CN109194466B (en) 2018-10-29 2018-10-29 Block chain-based cloud data integrity detection method and system

Country Status (1)

Country Link
CN (1) CN109194466B (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767221A (en) * 2019-01-16 2019-05-17 杭州趣链科技有限公司 A kind of cross-platform endorsement method of movement towards block chain safety
CN109787765A (en) * 2019-02-27 2019-05-21 东南大学 A kind of teledata gateway encryption method for monitoring water quality on line
CN109871366A (en) * 2019-01-17 2019-06-11 华东师范大学 A kind of storage of block chain fragment and querying method based on correcting and eleting codes
CN109889497A (en) * 2019-01-15 2019-06-14 南京邮电大学 A kind of data integrity verification method for going to trust
CN109918942A (en) * 2019-02-21 2019-06-21 领信智链(北京)科技有限公司 A kind of decentralization identification code management system based on ether mill block chain
CN110008756A (en) * 2019-04-04 2019-07-12 浙江数值跳跃网络科技有限公司 Data verification method combining block chain system and intelligent hardware equipment
CN110018924A (en) * 2019-02-21 2019-07-16 同方股份有限公司 A kind of file damage preventing method based on block chain and correcting and eleting codes
CN110287048A (en) * 2019-05-09 2019-09-27 清华大学 Data exception detection method and device
CN110324150A (en) * 2019-06-12 2019-10-11 东软集团股份有限公司 Date storage method, device, computer readable storage medium and electronic equipment
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
CN110532809A (en) * 2019-08-21 2019-12-03 杭州趣链科技有限公司 A kind of block chain multistage endorsement method based on configuration block
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN110832519A (en) * 2019-03-27 2020-02-21 阿里巴巴集团控股有限公司 Improving integrity of communications between blockchain networks and external data sources
CN110851080A (en) * 2019-11-04 2020-02-28 紫光云技术有限公司 Distributed storage management system of multi-cloud-disk platform
CN111083105A (en) * 2019-11-05 2020-04-28 湖南大学 Cloud data possession verification method and system based on block chain
CN111079155A (en) * 2019-11-13 2020-04-28 北京海益同展信息科技有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111526219A (en) * 2020-07-03 2020-08-11 支付宝(杭州)信息技术有限公司 Alliance chain consensus method and alliance chain system
CN111597590A (en) * 2020-05-12 2020-08-28 重庆邮电大学 Block chain-based data integrity rapid inspection method
CN111639939A (en) * 2020-06-08 2020-09-08 杭州复杂美科技有限公司 Block restoring method, equipment and storage medium
CN111723397A (en) * 2020-05-21 2020-09-29 天津大学 Block chain-based Internet of things data protection method
CN111917558A (en) * 2020-08-13 2020-11-10 南开大学 Video frame data double-authentication and hierarchical encryption method based on block chain
CN112039837A (en) * 2020-07-09 2020-12-04 中原工学院 Electronic evidence preservation method based on block chain and secret sharing
CN112565264A (en) * 2020-12-04 2021-03-26 湖南大学 Block chain-based cloud storage data integrity detection method and system
CN112738090A (en) * 2020-12-29 2021-04-30 重庆邮电大学 Data integrity detection method based on green computing consensus mechanism block chain in edge computing
CN112733203A (en) * 2021-01-14 2021-04-30 南方科技大学 Contact data storage method, device, equipment and storage medium
CN112861162A (en) * 2021-03-15 2021-05-28 深圳市互联在线云计算股份有限公司 Block chain storage safety guarantee system based on distributed storage
CN112887076A (en) * 2021-01-15 2021-06-01 上海天俣可信物联网科技有限公司 Internet of things system based on NB-IoT and blockchain technology and implementation method
CN113067703A (en) * 2021-03-19 2021-07-02 上海摩联信息技术有限公司 Terminal equipment data uplink method and system
CN113556232A (en) * 2021-06-30 2021-10-26 东风汽车集团股份有限公司 Signature checking method for vehicle cloud communication and file transmission
CN113660202A (en) * 2021-07-08 2021-11-16 武汉光庭信息技术股份有限公司 Method and system for checking driving data consistency
CN114726533A (en) * 2022-03-23 2022-07-08 扬州大学 Block chain based redundant data detection and deletion method in edge computing environment
CN114726878A (en) * 2022-03-28 2022-07-08 广州广电运通金融电子股份有限公司 Cloud storage system, equipment and method
CN117335997A (en) * 2023-11-29 2024-01-02 广东电网有限责任公司湛江供电局 Data processing method, system, equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326856A (en) * 2013-05-20 2013-09-25 西北工业大学 Cloud storage data responsibility confirmation structure and method based on two-way digital signature
CN105320899A (en) * 2014-07-22 2016-02-10 北京大学 User-oriented cloud storage data integrity protection method
CN106487801A (en) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 Information Authentication method and device based on block chain
US20170279774A1 (en) * 2016-03-28 2017-09-28 International Business Machines Corporation Decentralized Autonomous Edge Compute Coordinated by Smart Contract On A Blockchain
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107770154A (en) * 2017-09-22 2018-03-06 中国科学院信息工程研究所 Block chain reliable data storage method, terminal and system based on cloud storage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326856A (en) * 2013-05-20 2013-09-25 西北工业大学 Cloud storage data responsibility confirmation structure and method based on two-way digital signature
CN105320899A (en) * 2014-07-22 2016-02-10 北京大学 User-oriented cloud storage data integrity protection method
US20170279774A1 (en) * 2016-03-28 2017-09-28 International Business Machines Corporation Decentralized Autonomous Edge Compute Coordinated by Smart Contract On A Blockchain
CN106487801A (en) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 Information Authentication method and device based on block chain
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107770154A (en) * 2017-09-22 2018-03-06 中国科学院信息工程研究所 Block chain reliable data storage method, terminal and system based on cloud storage

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889497A (en) * 2019-01-15 2019-06-14 南京邮电大学 A kind of data integrity verification method for going to trust
CN109889497B (en) * 2019-01-15 2021-09-07 南京邮电大学 Distrust-removing data integrity verification method
CN109767221A (en) * 2019-01-16 2019-05-17 杭州趣链科技有限公司 A kind of cross-platform endorsement method of movement towards block chain safety
CN109871366B (en) * 2019-01-17 2021-09-10 华东师范大学 Block chain fragment storage and query method based on erasure codes
CN109871366A (en) * 2019-01-17 2019-06-11 华东师范大学 A kind of storage of block chain fragment and querying method based on correcting and eleting codes
CN109918942B (en) * 2019-02-21 2020-07-31 领信智链(北京)科技有限公司 Decentralized identifier management system based on ether house block chain
CN109918942A (en) * 2019-02-21 2019-06-21 领信智链(北京)科技有限公司 A kind of decentralization identification code management system based on ether mill block chain
CN110018924A (en) * 2019-02-21 2019-07-16 同方股份有限公司 A kind of file damage preventing method based on block chain and correcting and eleting codes
CN109787765A (en) * 2019-02-27 2019-05-21 东南大学 A kind of teledata gateway encryption method for monitoring water quality on line
CN110832519A (en) * 2019-03-27 2020-02-21 阿里巴巴集团控股有限公司 Improving integrity of communications between blockchain networks and external data sources
CN110832519B (en) * 2019-03-27 2024-03-19 创新先进技术有限公司 Improving integrity of communications between a blockchain network and external data sources
CN110008756A (en) * 2019-04-04 2019-07-12 浙江数值跳跃网络科技有限公司 Data verification method combining block chain system and intelligent hardware equipment
CN110287048A (en) * 2019-05-09 2019-09-27 清华大学 Data exception detection method and device
CN110324150A (en) * 2019-06-12 2019-10-11 东软集团股份有限公司 Date storage method, device, computer readable storage medium and electronic equipment
CN110324150B (en) * 2019-06-12 2022-03-22 东软集团股份有限公司 Data storage method and device, computer readable storage medium and electronic equipment
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
CN110532809A (en) * 2019-08-21 2019-12-03 杭州趣链科技有限公司 A kind of block chain multistage endorsement method based on configuration block
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN110782252B (en) * 2019-10-24 2022-09-16 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN110851080A (en) * 2019-11-04 2020-02-28 紫光云技术有限公司 Distributed storage management system of multi-cloud-disk platform
CN110851080B (en) * 2019-11-04 2023-07-04 紫光云技术有限公司 Distributed storage management system of multi-cloud-disk platform
CN111083105A (en) * 2019-11-05 2020-04-28 湖南大学 Cloud data possession verification method and system based on block chain
CN111079155A (en) * 2019-11-13 2020-04-28 北京海益同展信息科技有限公司 Data processing method and device, electronic equipment and computer storage medium
CN111597590A (en) * 2020-05-12 2020-08-28 重庆邮电大学 Block chain-based data integrity rapid inspection method
CN111597590B (en) * 2020-05-12 2023-08-25 重庆邮电大学 Block chain-based data integrity quick inspection method
CN111723397A (en) * 2020-05-21 2020-09-29 天津大学 Block chain-based Internet of things data protection method
CN111639939A (en) * 2020-06-08 2020-09-08 杭州复杂美科技有限公司 Block restoring method, equipment and storage medium
CN111526219A (en) * 2020-07-03 2020-08-11 支付宝(杭州)信息技术有限公司 Alliance chain consensus method and alliance chain system
US11368317B2 (en) 2020-07-03 2022-06-21 Alipay (Hangzhou) Information Technology Co., Ltd. Consensus method of consortium blockchain, and consortium blockchain system
CN112039837A (en) * 2020-07-09 2020-12-04 中原工学院 Electronic evidence preservation method based on block chain and secret sharing
CN111917558B (en) * 2020-08-13 2021-03-23 南开大学 Video frame data double-authentication and hierarchical encryption method based on block chain
CN111917558A (en) * 2020-08-13 2020-11-10 南开大学 Video frame data double-authentication and hierarchical encryption method based on block chain
CN112565264A (en) * 2020-12-04 2021-03-26 湖南大学 Block chain-based cloud storage data integrity detection method and system
CN112738090A (en) * 2020-12-29 2021-04-30 重庆邮电大学 Data integrity detection method based on green computing consensus mechanism block chain in edge computing
CN112733203A (en) * 2021-01-14 2021-04-30 南方科技大学 Contact data storage method, device, equipment and storage medium
CN112887076A (en) * 2021-01-15 2021-06-01 上海天俣可信物联网科技有限公司 Internet of things system based on NB-IoT and blockchain technology and implementation method
CN112861162B (en) * 2021-03-15 2024-05-03 深圳市互联在线云计算股份有限公司 Block chain storage safety guarantee system based on distributed storage
CN112861162A (en) * 2021-03-15 2021-05-28 深圳市互联在线云计算股份有限公司 Block chain storage safety guarantee system based on distributed storage
CN113067703A (en) * 2021-03-19 2021-07-02 上海摩联信息技术有限公司 Terminal equipment data uplink method and system
CN113067703B (en) * 2021-03-19 2022-09-20 上海摩联信息技术有限公司 Terminal equipment data uplink method and system
CN113556232A (en) * 2021-06-30 2021-10-26 东风汽车集团股份有限公司 Signature checking method for vehicle cloud communication and file transmission
CN113660202A (en) * 2021-07-08 2021-11-16 武汉光庭信息技术股份有限公司 Method and system for checking driving data consistency
CN114726533A (en) * 2022-03-23 2022-07-08 扬州大学 Block chain based redundant data detection and deletion method in edge computing environment
CN114726533B (en) * 2022-03-23 2023-12-01 扬州大学 Method for detecting and deleting redundant data in edge computing environment based on block chain
CN114726878B (en) * 2022-03-28 2024-02-23 广州广电运通金融电子股份有限公司 Cloud storage system, equipment and method
CN114726878A (en) * 2022-03-28 2022-07-08 广州广电运通金融电子股份有限公司 Cloud storage system, equipment and method
CN117335997A (en) * 2023-11-29 2024-01-02 广东电网有限责任公司湛江供电局 Data processing method, system, equipment and medium
CN117335997B (en) * 2023-11-29 2024-03-19 广东电网有限责任公司湛江供电局 Data processing method, system, equipment and medium

Also Published As

Publication number Publication date
CN109194466B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
US11621833B2 (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
CN111066046B (en) Replay attack resistant authentication protocol
KR101999188B1 (en) Secure personal devices using elliptic curve cryptography for secret sharing
CN109067524B (en) Public and private key pair generation method and system
CN106254374B (en) A kind of cloud data public audit method having duplicate removal function
CN107800688A (en) A kind of high in the clouds data deduplication and integrality auditing method based on convergent encryption
CN108292402A (en) The determination of the public secret of secure exchange for information and level certainty key
US10528751B2 (en) Secure and efficient cloud storage with retrievability guarantees
US9531540B2 (en) Secure token-based signature schemes using look-up tables
CN106899406B (en) A kind of method of proof of cloud data storage integrality
CN101552669A (en) Method and system of data transmission
US9230114B1 (en) Remote verification of file protections for cloud data storage
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
CN109670826B (en) Anti-quantum computation block chain transaction method based on asymmetric key pool
US11153074B1 (en) Trust framework against systematic cryptographic
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN115333857B (en) Detection method for preventing data from being tampered based on smart city system cloud platform
KR20110028968A (en) Method for verifying the integrity of a user's data in remote computing and system thereof
CN115225409B (en) Cloud data safety duplicate removal method based on multi-backup joint verification
CN108777673B (en) Bidirectional identity authentication method in block chain
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
US8346742B1 (en) Remote verification of file protections for cloud data storage
Ponnuramu et al. Secured storage for dynamic data in cloud
CN113722749A (en) Data processing method and device for block chain BAAS service based on encryption algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
OL01 Intention to license declared
OL01 Intention to license declared