CN111898164B - Data integrity auditing method supporting label block chain storage and query - Google Patents
Data integrity auditing method supporting label block chain storage and query Download PDFInfo
- Publication number
- CN111898164B CN111898164B CN202010632016.XA CN202010632016A CN111898164B CN 111898164 B CN111898164 B CN 111898164B CN 202010632016 A CN202010632016 A CN 202010632016A CN 111898164 B CN111898164 B CN 111898164B
- Authority
- CN
- China
- Prior art keywords
- data
- tag
- evidence
- auditor
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012550 audit Methods 0.000 claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 8
- 238000005070 sampling Methods 0.000 claims abstract description 4
- 238000004364 calculation method Methods 0.000 claims description 14
- 238000005516 engineering process Methods 0.000 claims description 11
- 238000013507 mapping Methods 0.000 claims description 8
- 241001334134 Rugopharynx epsilon Species 0.000 claims description 3
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data integrity auditing method supporting label block chain storage and inquiry, which comprises the following steps: the client side blocks the data file and generates a data tag, the data is stored on the cloud server, and the data tag is stored on the blockchain platform in a T-Merkle tree structure; the auditor sends a sampling audit inquiry to the cloud server and the blockchain platform; the block chain platform executes a query algorithm to acquire a data tag, calculates ciphertext tag evidence and returns the ciphertext tag evidence to the auditor, and meanwhile, the cloud server calculates ciphertext data evidence and returns the ciphertext data evidence to the auditor; the auditor directly verifies the integrity of the data by the bilinear nature without decryption. The invention uses a block chain platform to store data labels, proposes a corresponding block chain storage structure and a query method, designs a bilinear pair verification method based on ZSS short signature, and improves the expandability of the system and the security and the high efficiency of data integrity audit.
Description
Technical Field
The invention relates to a data integrity auditing method supporting label block chain storage and inquiry, belonging to the field of information security.
Background
Cloud storage is an important service of cloud computing, allowing data owners to host their data in cloud servers and provide data access to users over networks. By means of virtualization, distributed storage and other technologies, cloud storage integrates storage devices of different manufacturers, different structures and different positions in a network to construct a storage resource pool. Users rent storage resource cloud storage to cloud service providers as a low-cost, high-scalability infrastructure service in a pay-per-demand manner according to their own needs, and are receiving increasing attention from individuals and businesses.
With the rapid development of cloud storage, massive data is more easily attacked when being stored on a cloud server, so that the cloud storage faces more complex security threat than traditional storage. Meanwhile, after the data owner stores the data in the cloud, physical control of the data is lost, so that the security of the data is highly dependent on the cloud service provider, and the cloud service provider cannot be completely trusted due to data leakage and loss events. It follows that cloud storage, while providing many advantages and benefits, does not guarantee the integrity of the data uploaded by the client.
In recent years, researchers have proposed a centralized third party public audit scheme to verify cloud data integrity. But has the defects that: 1) It is not reasonable to assume that the third party audit is completely trusted. 2) Auditors may not perform audit tasks according to contracts due to their own capacity limitations. Due to the characteristics of decentralization, transparency, non-tampering, security and the like, the appearance of the blockchain technology is a new method for solving the problems, but the problems of poor expandability of blockchain storage, low query efficiency and the like are faced. The new data integrity audit technology based on the blockchain is very important and significant for solving the data integrity problem in cloud storage and promoting the wide application of the cloud storage.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a data integrity auditing method supporting tag blockchain storage and query, which aims to solve the problems of bottleneck, poor blockchain expandability, low query efficiency and the like of centralized audit in the prior art, and the problems, if not solved, can lead to the limitation of wide application of cloud storage.
The technical scheme of the invention is a data integrity auditing method supporting label block chain storage and inquiry, which comprises the following steps:
(1) Initializing and setting security parameters, generating public parameters, and generating a public key and a private key for data signing by a client;
(2) The client side blocks the file by utilizing a data slicing technology, generates a data tag for the data block by utilizing a ZSS short signature technology, stores the data block on a cloud server, and stores the data tag on a blockchain platform;
(3) The auditor executes sampling audit and randomly selects part of data block subsets for verification;
(4) After receiving the audit request, the blockchain platform acquires a data tag by using a query algorithm, calculates ciphertext tag evidence and returns the ciphertext tag evidence to an auditor; after receiving the audit request, the cloud server executes the calculation of the evidence of the ciphertext data and returns the evidence to the auditor;
(5) The auditor verifies whether the data evidence and the label evidence are matched on the premise that decryption is not needed according to the double pair property, and if the matching indicates that the data is complete.
Further, the step (1) specifically includes: initializing and setting a safety parameter lambda to generate a cyclic addition group G with the order of prime number q 1 And G 2 And there is bilinear mapping e: G 1 ×G 1 →G 2 The method comprises the steps of carrying out a first treatment on the surface of the Client randomly selects sk e Z p Z as private key p Represents [0, p-1 ]]And calculates pk= skP as a public key, where P is G 1 Is a generator of (1); wherein the bilinear mapping has the following properties: 1) For arbitrary P, Q ε G 1 There is an efficient algorithm to calculate e (P, Q); 2) e (P, P) noteq1; 3) For any P, Q, R.epsilon.G 1 And a, b.epsilon.Z p The method comprises the following steps: e (aP, bQ) =e (P, Q) ab ,e(P+R,Q)=e(P,Q)·e(R,Q)。
Further, the step (2) specifically includes:
(2a) The client divides the data file into n blocks f= { m 1 ,m 2 ,…,m n And for each data block m i Calculation data tagGet Tag set t= { Tag 1 ,Tag 2 ,…,Tag n }, wherein H 1 Is a cryptographic hash function;
(2b) The client stores the data blocks on a cloud server, uploads the data labels to a blockchain platform, and stores the data blocks in a label blockchain in a T-Merkle tree mode, wherein each blocknode comprises k data labels and corresponding indexes v j ={Min j ,Max j ,1,Tag 1 ,2,Tag 2 ,…,k,Tag k ,H(v j ) }, where Min j And Max j Refers to the minimum and maximum values of the index of the current node store tag, the node hash value H (v j ) H is a cryptographic hash function calculated from hashes of the current node and the child node.
Further, the step (3) specifically includes: an auditor with public key and file identification randomly selects a data block subset and a corresponding random value to generate a challenge set Chall= { i, u i } i∈I Wherein i= { s 1 ,s 2 ,…,s c And c represents the number of data blocks to be challenged, s c Is the data block index 1, n]Is a subset of u i Is a random value, and the auditor sends a challenge set Chall to the cloud server and the blockchain platform.
Further, the step (4) specifically includes:
(4a) The cloud server calculates and encrypts data evidence after receiving the challenge setSending the DP to an auditor, wherein e represents a bilinear mapping relation;
(4b) After the block chain platform receives the inquiry set, the inquired label is searched by utilizing an inquiry algorithm, and the label evidence is calculated and encryptedAnd sends the TP to the auditor.
Further, the step (5) specifically includes:
(5a) After receiving the data evidence and the tag evidence, the auditor calculates by using the client public key pk and the challenge set Chall
(5b) The auditor verifies the correctness of the evidence according to the equation tp=dp·e (R, P), and if the equation is true, it is explained that the data stored on the cloud server is complete.
Further, in the step (2), the data is stored in the tag blockchain in a T-Merkle tree manner, and the method has the following characteristics: a) The data labels are stored in each tree node, not just in leaf nodes, and each node stores a plurality of data labels; b) Attaching a tag index to the data tag to support quick retrieval; c) Adding the block header into the current block to comprise the maximum value and the minimum value of the index; each T-Merkle tree node comprises a minimum value, a maximum value, an index and tag set of the index of the current node and a hash value of the current node, wherein the hash value of the current node is obtained by the hash calculation of the hash value of the current node and the hash value of the child node, and the calculation method comprises the following steps:
h(v j ) Is the hash value h (v j )=h(h(tag 1 )||h(tag 2 )||…||h(tag k ) H is a cryptographic hash function, || represents a string linking operation, rchild and lchild represent right and left child nodes, respectively, and when generating a T-Merkle tree, the T-tree is first constructed using data labels, and then a hash value of each node is calculated from leaf nodes to root nodes, thereby generating the T-Merkle tree.
Further, when searching the challenged tag by using the query algorithm in the step (4 b), when searching the tag with index ind, firstly comparing with the index range of the head of the latest block, and if not in the current block, searching the previous block; if in the current block, a fast find algorithm is performed in the current block.
The beneficial effects are that: in the embodiment of the invention, a short signature technology is adopted to generate the data tag, the T-Merkle tree structure storage block is designed, the storage space is saved, the storage expandability of the block chain is improved, a block chain query algorithm is provided, and the retrieval speed is improved. The cloud server and blockchain platform encrypt data evidence and tag evidence using bilinear pair properties. The ZSS signature verification method based on bilinear pairs is designed, and an auditor can directly verify the correctness of the correctness on the premise of no decryption. The method not only can protect the data privacy, but also can effectively reduce the operation of bilinear pairs and improve the auditing efficiency.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a block node storage block diagram of the present invention;
FIG. 3 is a block chain memory block diagram of the present invention;
FIG. 4 is a diagram of a tag blockchain architecture modified in accordance with the present invention;
FIG. 5 is a system initialization flow chart in accordance with the present invention;
fig. 6 is a flow chart of an integrity audit in accordance with the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In an embodiment of the invention, the data is stored on a cloud server and the data tag is stored on a blockchain platform. If the data is stored directly on the blockchain, it is limited by blockchain capacity, resulting in a system that is not widely applicable. The data label is generated by adopting a short signature technology and is stored by adopting a T-Merkle structure. The ZSS short signature technique uses a general hash function (such as MD5 or SHA-1) without a specially constructed hash function, and improves signature generation efficiency with fewer bilinear pairings (F.Zhang, R.Safavi-Naini, and W.Susilo, "An efficient signature scheme from bilinear pairings and its applications," in Proc. Int. Workshop Public Key Cryptor. Berlin, germany: springer,2004, pp. 277-290). FIG. 1 is a flow chart of the present invention, wherein clients are considered auditors for convenience of description. In fact, the auditor may be a client, cloud server, blockchain platform, or other third party authority.
The embodiment of the invention is realized in such a way that the data integrity auditing method supporting the storage and the inquiry of the tag blockchain comprises the following steps:
(1) System initialization phase: generating a private key and a public key, partitioning data, calculating a data tag, uploading the data to a cloud server for storage, and uploading the data tag to a blockchain platform for storage.
(2) Integrity audit phase: the auditor generates a challenge set and sends the challenge set to the cloud server and the blockchain platform, the cloud server and the blockchain platform respectively generate data evidence and tag evidence and return the data evidence and the tag evidence to the auditor, and the auditor verifies whether the data evidence and the tag evidence are matched.
Specifically, the system initialization stage in step (1) includes the following steps:
(a) The input is a safety parameter lambda and the output is a cyclic addition group G 1 And G 2 And there is bilinear mapping e: G 1 ×G 1 →G 2 The method comprises the steps of carrying out a first treatment on the surface of the Client randomly selects sk e Z p As private key and calculating p= skP as public key, the client randomly selects sk e Z p Z as private key p Represents [0, p-1 ]]And calculates pk= skP as a public key, where P is G 1 Is a generator of (1); wherein the bilinear mapping has the following properties: 1) For arbitrary P, Q ε G 1 There is an efficient algorithm to calculate e (P, Q);
2) e (P, P) noteq1; 3) For any P, Q, R.epsilon.G 1 And a, b.epsilon.Z p The method comprises the following steps: e (aP, bQ) =e (P, Q) ab ,e(P+R,Q)=e(P,Q)·e(R,Q)。
(b) The client divides the data file into n blocks f= { m 1 ,m 2 ,,m n And for each data block m i Calculation data tagGet Tag set t= { Tag 1 ,Tag 2 ,…,Tag n }, wherein H 1 Is a cryptographic hash function;
(c) The client stores the data blocks on a cloud server, uploads the data labels to a blockchain platform and forms a label chain in a T-Merkle tree mode. Each block node contains k data labels and corresponding index v j ={Min j ,Max j ,1,Tag 1 ,2,Tag 2 ,…,k,Tag k ,H(v j ) -wherein the node hash value H (v j ) Is obtained by hash calculation of the current node and the child node.
Specifically, the integrity audit phase in step (2) includes the steps of:
(a) Auditors with public keys and file identifications randomly select a subset of data blocks and corresponding random values to generate a challenge set Chall= { i, u i } i∈I Wherein i= { s 1 ,s 2 ,…,s c And c is the data block index 1, n]Is a subset of u i Is a random value. The auditor sends the challenge set Chall to the cloud server and the blockchain platform.
(b) Computing data evidence after cloud server receives challenge setAnd the DP is sent to the auditor. After the block chain platform receives the inquiry set, the inquired label is searched by utilizing an inquiry algorithm, and label evidence is calculatedAnd TP is sent to the auditor.
(c) After receiving the data evidence and the tag evidence, the auditor calculates by using the customer service side public key and the challenge set ChallAuditor verifies evidence tp=dp·e (R, P), if the equation is true, indicating that the data stored on the cloud server is completeA kind of electronic device.
Specifically, a data integrity audit method supporting tag blockchain storage and querying, the technique comprises the following parts:
(a) A short signature technique for calculating a data tag;
(b) The T-Merkle tree structure is used for storing the tag blocks;
(c) A query algorithm based on a T-Merkle tree is used for quickly searching labels;
(d) The tag evidence generation algorithm is used for calculating ciphertext tag evidence;
(e) The data evidence generation algorithm is used for calculating ciphertext data evidence;
(f) And the verification algorithm based on the ZSS short signature technology is used for verifying whether the ciphertext data evidence and the ciphertext label evidence are matched or not so as to ensure whether the data on the cloud server are complete or not.
The invention comprises the following parts: tag blockchain storage structures, blockfast query techniques, and dual linear pair based ZSS verification techniques.
The existing blocks store block data by using Merkle trees, the blocks are stored in leaf nodes, the storage utilization is low, and the whole block chain needs to be traversed when the blocks are searched. In order to save the storage overhead and improve the query efficiency, the invention improves the Merkle tree structure from 3 aspects: 1) The data labels are stored in each tree node, not just in leaf nodes, and each node stores multiple labels. 2) A tag index is appended to the data tag to support fast retrieval. 3) The block header joins the current block containing the maximum and minimum values of the index. The T-Merkle tree combines the features of the T-tree and the Merkle tree. Each T-Merkle tree node contains the minimum value of the index of the current node, the maximum value, the index and tag set, and the hash value of the current node. The node structure is described as in fig. 2. The hash value of the current node is calculated by the hash value of the current node and the hash of the child node.
The calculation method comprises the following steps:
h(v j ) Is the hash value h (v j )=h(h(tag 1 )||h(tag 2 )||…||h(tag k ) H is a hash function, || represents a string chaining operation. When generating a T-Merkle tree, the T tree is first constructed using data labels, and then the hash value of each node is calculated from the leaf node to the root node. The T-Merkle tree structure shown in FIG. 3, assuming a tag index from 1 to 14, stores two tags per node. To verify { Tag ] 5 ,Tag 6 Auxiliary information Ω=is required }<H(c),H(b),h(Tag 3 ),h(Tag 4 ),h(Tag 7 ),h(Tag 8 )>. The verifier calculates H (a) =h (H (Tag 5 )||h(Tag 6 )||H(c)||h(Tag 5 )||h(Tag 6 ) Then calculate the hash value H' (root) =h (H (Tag) 5 )||h(Tag 6 ) I H (a) i H (b)). Verifying whether the calculated H' (root) and the stored H (root) value agree. It was demonstrated that the T-Merkle tree retains the authentication properties of Merkle.
The blockchain fast query technique supports fast binary searches. The index range embedded in the current block at the block head. When the index is ind, firstly comparing with the index range of the head of the latest block, and if the index is not in the current block, searching the previous block; if in the current block, a binary search is performed in the current block. The label block chain structure is shown in fig. 4. The query algorithm is as follows:
the ZSS verification technology based on bilinear pairs solves the problem of data privacy protection in the auditing process. During the integrity audit process, the auditor may obtain data privacy through some means. For the purpose of statement Wen Shuju, the reviewer may obtain the original data chunk from the received data evidence. For encrypted data, the auditor may obtain the key through other means to be able to decrypt the data. Such an audit scheme may pose new security threats to the owner's data. Thus, the auditing method needs to support privacy protection, i.e., the auditor cannot obtain the data content. The system employs an interactive auditing method, as shown in fig. 5 and 6. When the cloud server and the blockchain platform calculate evidences, the bilinear pair encryption evidences are utilized, and auditors directly verify the correctness of the data evidences and the label evidences by utilizing the bilinear pair operation property under the condition that decryption is not needed. The correctness of the verification expression tp=dp·e (R, P) is demonstrated as follows:
the invention adopts sampling audit to reduce communication overhead and improve audit efficiency. Assuming that the number of data blocks is n, the number of corrupted or lost data blocks is d, the challenge set size is c, and the probability P that a block X data block is corrupted or lost is detected X The calculation method is as follows:
it can be found that no matter how large the file is, when the corruption rate is 1%, a detection probability of 95% can be achieved by merely challenging 300 pieces of data.
Claims (5)
1. A data integrity audit method supporting tag blockchain storage and querying, comprising the steps of:
(1) Initializing and setting security parameters, generating public parameters, and generating a public key and a private key for data signing by a client;
the step (1) specifically comprises: initializing and setting a safety parameter lambda to generate a cyclic addition group G with the order of prime number q 1 And G 2 And there is bilinear mapping e: G 1 ×G 1 →G 2 The method comprises the steps of carrying out a first treatment on the surface of the Client randomly selects sk e Z p Z as private key p Represents [0, p-1 ]]And calculates pk= skP as a public key, where P is G 1 Is a generator of (1); wherein the bilinear mapping has the following properties: 1) For arbitrary P, Q ε G 1 There is an efficient algorithm to calculate e (P, Q); 2) e (P, P) noteq1; 3) For any P, Q, R.epsilon.G 1 And a, b.epsilon.Z p The method comprises the following steps: e (aP, bQ) =e (P, Q) ab ,e(P+R,Q)=e(P,Q)·e(R,Q);
(2) The client side blocks the file by utilizing a data slicing technology, generates a data tag for the data block by utilizing a ZSS short signature technology, stores the data block on a cloud server, and stores the data tag on a blockchain platform;
the step (2) specifically comprises:
(2a) The client divides the data file into n blocks f= { m 1 ,m 2 ,...,m n And for each data block m i Calculation data tagGet Tag set t= { Tag 1 ,Tag 2 ,...,Tag n }, wherein H 1 Is a cryptographic hash function;
(2b) The client stores the data blocks on a cloud server, uploads the data labels to a blockchain platform, and stores the data blocks in a label blockchain in a T-Merkle tree mode, wherein each blocknode comprises k data labels and corresponding indexes v j ={Min j ,Max j ,1,Tag 1 ,2,Tag 2 ,…,k,Tag k ,H(v j ) }, where Min j And Max j Refers to the minimum and maximum values of the index of the current node store tag, the node hash value H (v j ) The hash calculation of the current node and the child node is carried out, and H is a cryptographic hash function;
in the step (2), the data is stored in a tag blockchain in a T-Merkle tree mode, and the mode has the following characteristics: a) The data labels are stored in each tree node, not just in leaf nodes, and each node stores a plurality of data labels; b) Attaching a tag index to the data tag to support quick retrieval; c) The block header is added to the current block and contains the maximum value and minimum value range fields of the index; each T-Merkle tree node comprises a minimum value, a maximum value, an index and tag set of the index of the current node and a hash value of the current node, wherein the hash value of the current node is obtained by the hash calculation of the hash value of the current node and the hash value of the child node, and the calculation method comprises the following steps:
h(v j ) Is the hash value h (v j )=h(h(tag 1 )||h(tag 2 )||…||h(tag k ) H is a cryptographic hash function, ||represents a string linking operation, rchild and lchild represent right and left child nodes respectively, and when a T-Merkle tree is generated, a T tree is firstly constructed by utilizing a data tag, and then a hash value of each node is calculated from a leaf node to a root node, so that the T-Merkle tree is generated;
(3) The auditor executes sampling audit and randomly selects part of data block subsets for verification;
(4) After receiving the audit request, the blockchain platform acquires a data tag by using a query algorithm, calculates ciphertext tag evidence and returns the ciphertext tag evidence to an auditor; after receiving the audit request, the cloud server executes calculation of ciphertext data evidence and returns the calculation result to the auditor;
(5) And the auditor verifies whether the data evidence and the label evidence are matched on the premise of not needing decryption according to the bilinear pairing property, and if the matching indicates that the data is complete.
2. The data integrity audit method supporting tag blockchain storage and querying as in claim 1, wherein: the step (3) specifically comprises: auditors with public keys and file identifications randomly select a subset of data blocks and corresponding random values to generate a challenge set Chall= { i, u i } i∈I Wherein i= { s 1 ,s 2 ,…,s c And c represents the number of data blocks to be challenged, s c Is a number ofAccording to block index [1, n ]]Is a subset of u i Is a random value, and the auditor sends a challenge set Chall to the cloud server and the blockchain platform.
3. A data integrity audit method supporting tag blockchain storage and querying as in claim 2, wherein: the step (4) specifically comprises:
(4a) The cloud server calculates and encrypts data evidence after receiving the challenge setSending the DP to an auditor, wherein e represents a bilinear mapping relation;
(4b) After the block chain platform receives the inquiry set, the inquired label is searched by utilizing an inquiry algorithm, and the label evidence is calculated and encryptedAnd sends the TP to the auditor.
4. The data integrity audit method supporting tag blockchain storage and querying of claim 3, wherein step (5) specifically comprises:
(5a) After receiving the data evidence and the tag evidence, the auditor calculates by using the client public key pk and the challenge set Chall
(5b) The auditor verifies the correctness of the evidence according to the equation tp=dp·e (R, P), and if the equation is true, it is explained that the data stored on the cloud server is complete.
5. A data integrity audit method supporting tag blockchain storage and querying as in claim 3, wherein: when searching the challenged tag by using the query algorithm in the step (4 b), when searching the tag with index ind, firstly comparing with the index range of the head of the latest block, and if not in the current block, searching the last block; if in the current block, a fast find algorithm is performed in the current block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010632016.XA CN111898164B (en) | 2020-07-02 | 2020-07-02 | Data integrity auditing method supporting label block chain storage and query |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010632016.XA CN111898164B (en) | 2020-07-02 | 2020-07-02 | Data integrity auditing method supporting label block chain storage and query |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111898164A CN111898164A (en) | 2020-11-06 |
CN111898164B true CN111898164B (en) | 2024-03-29 |
Family
ID=73192958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010632016.XA Active CN111898164B (en) | 2020-07-02 | 2020-07-02 | Data integrity auditing method supporting label block chain storage and query |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111898164B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565264B (en) * | 2020-12-04 | 2022-04-08 | 湖南大学 | Cloud storage data integrity detection method based on block chain |
CN113312574A (en) * | 2021-05-21 | 2021-08-27 | 太原科技大学 | Cloud data integrity auditing method based on block chain |
WO2023020429A1 (en) * | 2021-08-20 | 2023-02-23 | 清华大学 | Data auditing method and apparatus, and storage medium |
CN115085972B (en) * | 2022-05-16 | 2023-07-28 | 西安电子科技大学 | Efficient verifiable blockchain editing method supporting integrity audit |
CN115987979B (en) * | 2022-11-15 | 2024-05-17 | 重庆邮电大学 | Data integrity auditing method based on block trust election mechanism in edge calculation |
CN115604038B (en) * | 2022-12-14 | 2023-09-15 | 山东省计算中心(国家超级计算济南中心) | Cloud storage data auditing system and method based on blockchain and edge computing |
CN116776386B (en) * | 2023-07-05 | 2023-11-17 | 深圳钰丰信息技术有限公司 | Cloud service data information security management method and system |
CN118410108B (en) * | 2024-07-03 | 2024-09-10 | 厦门印向未来科技有限公司 | Method and system for analyzing label instruction of thermal printer |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104077625A (en) * | 2014-06-19 | 2014-10-01 | 中国科学院信息工程研究所 | Two-dimension code content verifying method based on electronic signature |
CN104902027A (en) * | 2015-06-12 | 2015-09-09 | 电子科技大学 | Cloud storage service-oriented dynamic data integrity auditing program |
CN105138478A (en) * | 2015-07-28 | 2015-12-09 | 哈尔滨工程大学 | Memory integrity protection method employing unbalanced hash tree mode |
CN105787389A (en) * | 2016-03-02 | 2016-07-20 | 四川师范大学 | Cloud file integrity public audit evidence generating method and public auditing method |
US9497028B1 (en) * | 2007-05-03 | 2016-11-15 | Google Inc. | System and method for remote storage auditing |
CN106304046A (en) * | 2015-06-01 | 2017-01-04 | 陈晓华 | To the encryption of iBeacon broadcast, the method for authentication |
CN106845280A (en) * | 2017-03-14 | 2017-06-13 | 广东工业大学 | A kind of Merkle Hash trees cloud data integrity auditing method and system |
CN108322528A (en) * | 2018-01-26 | 2018-07-24 | 东莞理工学院 | Ad click recording method based on block chain and system |
CN108471510A (en) * | 2018-01-29 | 2018-08-31 | 东莞理工学院 | A kind of vision operation record protection method and system based on block chain |
CN109101338A (en) * | 2018-07-26 | 2018-12-28 | 杭州华澜微电子股份有限公司 | A kind of block chain processing framework and its method based on the extension of multichannel chip |
CN109165224A (en) * | 2018-08-24 | 2019-01-08 | 东北大学 | A kind of indexing means being directed to keyword key on block chain database |
CN109408461A (en) * | 2018-09-14 | 2019-03-01 | 中国农业大学 | A kind of distributed memory system and method for block chain |
CN109525403A (en) * | 2018-12-29 | 2019-03-26 | 陕西师范大学 | A kind of anti-leakage that supporting user's full dynamic parallel operation discloses cloud auditing method |
CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
CN110263584A (en) * | 2019-06-19 | 2019-09-20 | 华中科技大学 | A kind of data integrity auditing method and system based on block chain |
CN110460447A (en) * | 2019-08-16 | 2019-11-15 | 东北大学秦皇岛分校 | Edge calculations data accountability system and auditing method based on Hash binary tree |
CN110912706A (en) * | 2019-11-15 | 2020-03-24 | 东北大学 | Identity-based dynamic data integrity auditing method |
CN111355705A (en) * | 2020-02-08 | 2020-06-30 | 西安电子科技大学 | Data auditing and safety duplicate removal cloud storage system and method based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10903258B2 (en) * | 2017-10-11 | 2021-01-26 | Kla Corporation | Image sensors with grounded or otherwise biased channel-stop contacts |
-
2020
- 2020-07-02 CN CN202010632016.XA patent/CN111898164B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9497028B1 (en) * | 2007-05-03 | 2016-11-15 | Google Inc. | System and method for remote storage auditing |
CN104077625A (en) * | 2014-06-19 | 2014-10-01 | 中国科学院信息工程研究所 | Two-dimension code content verifying method based on electronic signature |
CN106304046A (en) * | 2015-06-01 | 2017-01-04 | 陈晓华 | To the encryption of iBeacon broadcast, the method for authentication |
CN104902027A (en) * | 2015-06-12 | 2015-09-09 | 电子科技大学 | Cloud storage service-oriented dynamic data integrity auditing program |
CN105138478A (en) * | 2015-07-28 | 2015-12-09 | 哈尔滨工程大学 | Memory integrity protection method employing unbalanced hash tree mode |
CN105787389A (en) * | 2016-03-02 | 2016-07-20 | 四川师范大学 | Cloud file integrity public audit evidence generating method and public auditing method |
CN106845280A (en) * | 2017-03-14 | 2017-06-13 | 广东工业大学 | A kind of Merkle Hash trees cloud data integrity auditing method and system |
CN108322528A (en) * | 2018-01-26 | 2018-07-24 | 东莞理工学院 | Ad click recording method based on block chain and system |
CN108471510A (en) * | 2018-01-29 | 2018-08-31 | 东莞理工学院 | A kind of vision operation record protection method and system based on block chain |
CN109101338A (en) * | 2018-07-26 | 2018-12-28 | 杭州华澜微电子股份有限公司 | A kind of block chain processing framework and its method based on the extension of multichannel chip |
CN109165224A (en) * | 2018-08-24 | 2019-01-08 | 东北大学 | A kind of indexing means being directed to keyword key on block chain database |
CN109408461A (en) * | 2018-09-14 | 2019-03-01 | 中国农业大学 | A kind of distributed memory system and method for block chain |
CN109525403A (en) * | 2018-12-29 | 2019-03-26 | 陕西师范大学 | A kind of anti-leakage that supporting user's full dynamic parallel operation discloses cloud auditing method |
CN110163007A (en) * | 2019-04-23 | 2019-08-23 | 西安邮电大学 | Data integrity verification method, equipment and storage medium based on block chain |
CN110263584A (en) * | 2019-06-19 | 2019-09-20 | 华中科技大学 | A kind of data integrity auditing method and system based on block chain |
CN110460447A (en) * | 2019-08-16 | 2019-11-15 | 东北大学秦皇岛分校 | Edge calculations data accountability system and auditing method based on Hash binary tree |
CN110912706A (en) * | 2019-11-15 | 2020-03-24 | 东北大学 | Identity-based dynamic data integrity auditing method |
CN111355705A (en) * | 2020-02-08 | 2020-06-30 | 西安电子科技大学 | Data auditing and safety duplicate removal cloud storage system and method based on block chain |
Non-Patent Citations (3)
Title |
---|
"云存储数据安全与共享方案研究";罗维;《中国优秀博硕士学位论文全文数据库 信息科技辑》;20200215;全文 * |
"Wireless Sensor Network Protocol Based on Hierarchical Merkle Tree".Signal and Information Processing, Networking and Computers. 4th International Conference on Signal and Information Processing, Networking and Computers.2019,全文. * |
"基于区块链的医疗隐私保护应用的研究";吴思桦;《中国优秀博硕士学位论文全文数据库 信息科技辑》;20200215;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111898164A (en) | 2020-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111898164B (en) | Data integrity auditing method supporting label block chain storage and query | |
Chen et al. | BL-MLE: Block-level message-locked encryption for secure large file deduplication | |
Li et al. | Integrity-verifiable conjunctive keyword searchable encryption in cloud storage | |
CN112732695B (en) | Cloud storage data security deduplication method based on block chain | |
CN115208628B (en) | Data integrity verification method based on block chain | |
Rashid et al. | Secure enterprise data deduplication in the cloud | |
CN112906056A (en) | Cloud storage key security management method based on block chain | |
CN112532650A (en) | Block chain-based multi-backup safe deletion method and system | |
CN109088719A (en) | Outsourced database multi-key word can verify that cipher text searching method, data processing system | |
Gudeme et al. | Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues | |
CN110851848B (en) | Privacy protection method for symmetric searchable encryption | |
Wen et al. | Big data storage security | |
Vasilopoulos et al. | Message-locked proofs of retrievability with secure deduplication | |
He et al. | Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T‐Merkle Hash Tree Based Blockchain | |
Li et al. | IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems | |
US20240015014A1 (en) | Dynamic and verifiable searchable encryption method and system based on updatable encryption and blockchain | |
Hong et al. | Query integrity verification based-on mac chain in cloud storage | |
Yoosuf et al. | FogDedupe: A Fog‐Centric Deduplication Approach Using Multi‐Key Homomorphic Encryption Technique | |
CN108494552B (en) | Cloud storage data deduplication method supporting efficient convergence key management | |
Sun et al. | Research of data security model in cloud computing platform for SMEs | |
Wang et al. | A blockchain-based multi-cloud storage data consistency verification scheme | |
Wang et al. | A lightweight data integrity verification with data dynamics for mobile edge computing | |
Zhang et al. | Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing | |
Hu | A data integrity verification scheme of deduplication for cloud ciphertexts | |
Chen et al. | Ensuring dynamic data integrity with public auditability for cloud storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |