CN115913572A - Data verification method, device, equipment, medium and system for mimicry storage system - Google Patents
Data verification method, device, equipment, medium and system for mimicry storage system Download PDFInfo
- Publication number
- CN115913572A CN115913572A CN202211487287.6A CN202211487287A CN115913572A CN 115913572 A CN115913572 A CN 115913572A CN 202211487287 A CN202211487287 A CN 202211487287A CN 115913572 A CN115913572 A CN 115913572A
- Authority
- CN
- China
- Prior art keywords
- data
- hash
- homomorphic
- value
- aggregation value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013524 data verification Methods 0.000 title claims abstract description 128
- 238000003860 storage Methods 0.000 title claims abstract description 94
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000002776 aggregation Effects 0.000 claims abstract description 188
- 238000004220 aggregation Methods 0.000 claims abstract description 188
- 230000007123 defense Effects 0.000 claims abstract description 50
- 238000012795 verification Methods 0.000 claims abstract description 32
- 230000015654 memory Effects 0.000 claims description 29
- 230000006870 function Effects 0.000 claims description 27
- 238000004422 calculation algorithm Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 4
- 230000002159 abnormal effect Effects 0.000 description 11
- 230000002829 reductive effect Effects 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000005553 drilling Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000036039 immunity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 230000035699 permeability Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a data verification method, a device, equipment, a medium and a system of a mimicry storage system, wherein the method receives a file and a hash key uploaded by a client; calling a mimicry defense system to calculate a homomorphic hash value of each data block according to the hash key, and receiving a data verification request sent by a client; the method comprises the steps of obtaining a data block to be subjected to data verification and a corresponding homomorphic hash value based on a data verification request, calling at least two homomorphic verification executors to respectively calculate a data aggregation value and a hash aggregation value, enabling a client to calculate the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash tag, and determining whether a file to which the data block corresponding to the data verification request belongs is correctly held according to the homomorphic hash tag and the hash aggregation value.
Description
Technical Field
The invention relates to the technical field of power information security, in particular to a data verification method, device, equipment, medium and system for a mimicry storage system.
Background
The electric power internet of things security access gateway is network security encryption equipment applied to a boundary security access area of a main station of an electric power system and is used for guaranteeing the security of communication data. However, under high-strength actual combat countermeasure environments such as national level network attack and defense drilling, new threats are continuously brought by 0DAY bugs and unknown attacks, and the existing safety protection measures of the power internet of things safety access gateway need to be strengthened.
In order to comprehensively improve the safety of electric power information and improve the safety performance of a storage system, the possession certification needs to be carried out on data stored in a server, the existing research work mainly focuses on a certifiable data holding scheme and a recoverable certification scheme, the existing scheme is adopted, the data are easy to attack when being verified, the output result is transmitted by adopting a plaintext, the risk of data leakage is faced, and the safety performance is insufficient.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, a device, a medium, and a system for checking data of a mimicry storage system, so as to solve the technical problem of insufficient security performance in the prior art.
The technical scheme provided by the invention is as follows:
the first aspect of the embodiments of the present invention provides a method for checking data of a mimicry storage system, which is applied to a storage server, and includes:
receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks; calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing the judgment and the corresponding data block; receiving a data verification request sent by a client; acquiring a data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request, calling at least two homomorphic verification executors to respectively calculate a data aggregation value of the data block to be subjected to data verification and a corresponding hash aggregation value of the homomorphic hash value, and judging the data aggregation value and the hash aggregation value; and returning the data aggregation value and the hash aggregation value which pass the judgment to the client so that the client calculates the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label, and determining whether the file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash label is the same as the hash aggregation value.
Optionally, invoking at least two homomorphic check executors in the mimicry defense system to calculate a homomorphic hash value of each data block according to the hash key, respectively, and includes: distributing the hash key and the data block to at least two homomorphic check executors in a mimicry defense system; and receiving homomorphic hash values of each data block, which are calculated by at least two homomorphic check executors according to the hash key, wherein the homomorphic check executors respectively realize homomorphic hash label algorithms by adopting different hardware systems and/or different languages.
Optionally, arbitrating the homomorphic hash value includes:
acquiring a target homomorphic hash value meeting a preset rule from the homomorphic hash values calculated by different homomorphic check executors; taking the target homomorphic hash value as the homomorphic hash value passing the arbitration; performing exception feedback on homomorphic check executors which are different from the homomorphic hash value passing the arbitration and the homomorphic hash value; and (4) performing off-line or replacement on the homomorphic check executive body fed back by the exception.
Optionally, invoking at least two homomorphic check executors to respectively calculate a data aggregation value of a data block to be subjected to data check and a hash aggregation value of the corresponding homomorphic hash value, including: the data block to be subjected to data verification and the corresponding homomorphic hash value are distributed to at least two homomorphic verification executors in the mimicry defense system; receiving the sum of data blocks to be subjected to data verification calculated by at least two homomorphic verification executors and the product of the corresponding homomorphic hash values, wherein the data aggregation value is the sum of the data blocks to be subjected to data verification, and the hash aggregation value is the product of the corresponding homomorphic hash values.
Optionally, arbitrating the data aggregation value and the hash aggregation value includes: acquiring a target data aggregation value and a target hash aggregation value which meet a preset rule from the data aggregation value and the hash aggregation value calculated by different homomorphic check executors; taking the target data aggregation value and the target hash aggregation value as the data aggregation value and the hash aggregation value which pass the arbitration; performing exception feedback on the calculated data aggregation value, the calculated hash aggregation value and the homomorphic check executive body which passes the arbitration and is different from the calculated hash aggregation value; and carrying out off-line or replacement on the homomorphic check executive body fed back by the exception.
Optionally, the data verification request includes a random key and the number of data blocks to be subjected to data verification; the obtaining of the data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request includes: calculating the position coordinates of each data block to be subjected to data verification and the corresponding homomorphic hash value according to the random key and the number of the data blocks to be subjected to data verification; and acquiring a data block to be subjected to data verification and the corresponding homomorphic hash value according to the position coordinate.
A second aspect of the embodiments of the present invention provides a data verification apparatus for a pseudo storage system, including:
the first receiving module is used for receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks; the storage module is used for calling at least two homomorphic check executors in the mimicry defense system to respectively calculate a homomorphic hash value of each data block according to the hash key, decide the homomorphic hash value and store the homomorphic hash value and the corresponding data block which pass the decision; the second receiving module is used for receiving a data verification request sent by the client; an evidence obtaining module, configured to obtain, based on the data verification request, a data block to be subjected to data verification and the corresponding homomorphic hash value, and invoke at least two homomorphic verification executors to calculate a data aggregation value of the data block to be subjected to data verification and a hash aggregation value of the corresponding homomorphic hash value, respectively, and decide the data aggregation value and the hash aggregation value; and the response module is used for returning the data aggregation value and the hash aggregation value which pass the judgment to the client so that the client calculates the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label, and determining whether a file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash label is the same as the hash aggregation value.
A third aspect of embodiments of the present invention provides an electronic device, including: the data verification method comprises a memory and a processor, wherein the memory and the processor are connected with each other in a communication mode, the memory stores computer instructions, and the processor executes the computer instructions so as to execute the data verification method of the mimicry storage system according to the first aspect and any one of the first aspect of the embodiments of the invention.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions for causing a computer to execute the method for checking data of a mimicry storage system according to any one of the first aspect and the first aspect of the embodiments of the present invention.
A fifth aspect of the embodiments of the present invention provides a data verification system for a mimicry storage system, including a client and a storage server, where the storage server includes a mimicry defense system and a data node;
the client is used for generating a hash key, uploading the hash key and a file to be stored to a storage server, and sending a data verification request to the storage server;
the storage server is used for calling at least two homomorphic check executors in a mimicry defense system to respectively calculate a homomorphic hash value of each data block according to the hash key after receiving the file and the hash key uploaded by the client, arbitrating the homomorphic hash value, and storing the homomorphic hash value and the corresponding data block which are arbitrated to pass in an associated manner to the data node;
and the client is further used for calculating the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash tag after receiving the data aggregation value and the hash aggregation value returned by the server, and determining whether the homomorphic hash tag and the hash aggregation value are the same so as to judge whether a file to which the data block subjected to data verification belongs is correctly held.
According to the technical scheme, the embodiment of the invention has the following advantages:
according to the data verification method, the device, the equipment medium and the system for the mimicry storage system, provided by the embodiment of the invention, a file and a hash key uploaded by a client are received, wherein the file comprises a plurality of data blocks; calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing the judgment and the corresponding data block; receiving a data verification request sent by a client; acquiring a data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request, calling at least two homomorphic verification executors to respectively calculate a data aggregation value of the data block to be subjected to data verification and a corresponding hash aggregation value of the homomorphic hash value, and judging the data aggregation value and the hash aggregation value; and returning the data aggregation value and the hash aggregation value which pass the judgment to the client so that the client calculates the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label, and determining whether the file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash label is the same as the hash aggregation value. In the embodiment of the invention, when data verification is carried out, at least two homomorphic verification executors in the mimicry defense system are called to respectively calculate the data aggregation value of a data block to be subjected to data verification and the corresponding Hash aggregation value of the homomorphic Hash value, the data aggregation value and the Hash aggregation value are judged, the judged data aggregation value and the Hash aggregation value are returned to the client, the mimicry defense system can be used for defending external attack, the safety performance of the system is improved, and a homomorphic Hash algorithm is introduced for encryption, so that the risk of data leakage is reduced.
Drawings
In order to express the technical scheme of the embodiment of the invention more clearly, the drawings used for describing the embodiment will be briefly introduced below, and obviously, the drawings in the following description are only some embodiments of the invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a data verification method for a pseudo memory system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data checking apparatus of a pseudo memory system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a data checking system of a pseudo memory system according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the invention;
fig. 5 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The electric power internet of things security access gateway is used as a boundary security protection measure of a company core, and the security protection of the electric power internet of things security access gateway is also very important. In order to comprehensively improve the comprehensive defense capability of the electric power internet of things security access gateway and solve the problems of unknown vulnerability protection, unknown attack defense and integrated security protection of the conventional electric power internet of things security access gateway, an endogenous security concept is introduced, and the electric power internet of things security access gateway is transformed by using technical theories such as mimicry and the like, so that the endogenous security immunity capability of a power network security boundary is improved.
The mimicry defense is a revolutionary defense technical system which is used for trying to change the existing game rules and has the advantages of compatibility, openness and initiative. The mimicry defense no longer pursues to establish a loopless, backdoor-free, defect-free and perfect defense system to resist the network space security threat, but adopts various and constantly-changing evaluation and deployment mechanisms and strategies to construct a dynamic, heterogeneous, redundant and uncertain system architecture, forms the dilemmas of 'difficult detection, difficult penetration, difficult attack excitation, difficult attack achievement utilization' and the like, breaks through the static property, the certainty and the similarity of the network architecture formed by the attack chain, and greatly increases the attack cost of an attacker. The mimicry defense is expected to reduce the detectability of the system by increasing the dynamic property of the system, reduce the permeability of the system by increasing the randomness of the system, force an attacker to collaborate with the attack in a straight-sided manner by applying the dynamic heterogeneous redundancy architecture of the system, and comprehensively utilize the dynamic property, the randomness and the diversity of the system to break the stability or the effective utilization rate of an attack chain. When the network and the system are deployed and operated, the attack difficulty including the attack based on unknown vulnerabilities and backdoors and the available difficulty of attack achievements are remarkably improved by reducing the determinacy, the similarity and the staticity of the network and the system, and the strategic pattern of 'easy attack and difficult guard' is completely turned.
Most of the arbitration schemes of the mimicry defense system are the most common strategies. This solution has the advantage of being simple to implement and capable of handling most exceptional output situations, but has the disadvantage that no further judgment can be given when most inconsistencies are not reached. This problem can be solved by using a weight-based arbitration strategy, and when most of the consistent conditions cannot be met, the system will give the output result of the executor with the highest weight. The competitive arbitration model can improve the arbitration efficiency, but does not improve the correctness of the arbitration result. The abnormal value-based mimicry arbitration optimization scheme quantifies the abnormal value of the output data of the executive body by constructing a mimicry system heterogeneous executive body output data set and training a deep learning abnormal detection model, then optimizes weighting distribution by using a weight optimization algorithm, and selects an optimal weighting result as a voting output result, but the situation of vulnerability distribution of a cloud server is not considered in the scheme.
The existing scheme generally optimizes heterogeneous executive weight values based on high-order heterogeneity, historical confidence, executive heterogeneity and the like so as to improve the safety of the system. After a system based on the historical confidence arbitration method is attacked by a malicious attacker continuously and identically, an executive body of the system continuously generates approximate output, and a scheduling strategy is influenced. If the arbitration module selects the execution body with higher historical confidence to output the result for arbitration, the problem that the execution body with lower isomerism can provide a consistent result is ignored, and the common-mode escape probability is increased under the condition. The execution body isomerism degree-based arbitration method introduces the isomerism degree into the arbitration scheme, so that the execution bodies are ranked according to the isomerism degree, and the dynamic property of the mimicry defense system is weakened.
In summary, optimizing the weights of the executors can delay the time of attack, but cannot fundamentally solve the security problem, and even brings new security risks. In addition, the above scheme adopts a plaintext mode during data transmission, and does not pay attention to the safety of data. The server is not trusted, and the data leakage risk is caused by the problems that the authority of the server provider is not transparent and the like. Aiming at the problem of data security, researchers provide a design method of a software and hardware cooperative mimicry scheduling resolver, the method gives a high authority to a decision module, the data security is protected at a hardware level, and the accuracy and the reliability in decision are completely guaranteed by a secondary module. However, the implementation result of the scheme is still in clear text, and risks of data leakage are faced. Based on the analysis, the safety of the existing arbitration scheme is insufficient, and it is necessary to design a mimicry defense arbitration scheme with higher strength to be applied to data retention verification.
Based on this, an embodiment of the present invention provides a data verification method for a mimicry storage system, which is applied to a storage server, and as shown in fig. 1, includes:
and S100, receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks. The client-side and the storage server interact through a network, the storage server comprises a mimicry defense system and a plurality of data nodes, the mimicry defense system specifically adopts a Dynamic Heterogeneous Redundancy architecture (DHR) and comprises an input agent, an arbitration module, a homomorphic check execution body and a strategy/scheduling module, and the data nodes are used for storing data transmitted in the interaction process. The user decomposes the file to be stored into n data blocks through the client, namely, the file to be stored F = (b) 1 ,b 2 ,…,b n ) Each data block b i Again comprising m sub-blocks, and then uploading file F to the storage server.
Meanwhile, the client generates a hash key according to the initial value, and the hash key is generated through Keygeneration (lambda) p ,λ q M, s) generates a hash key K = (p, q, g). Lambda p And λ q Are discrete logarithm security parameters, which are length digits of a random large prime number p and a random large prime number q, respectively, m is the number of subblocks of each data block, and the value is m = [ beta/(lambda) = q -1)]And β represents the size of the data block. The process of generating the hash key is as follows: firstly according to a discrete logarithm safety parameter lambda q And generating a function qGeneration (λ) q ) A random large prime number q is generated. Then according to random large prime number q and discrete logarithm safety parameter lambda p Calling pGeneration (q, lambda) p ) Generating random large prime number p, and ensuring p (q-1). After obtaining the random big prime number p and the random big prime number q, g is utilized i The Generation (p, q) function generates a block tag g for each data block i And g is the all subblock label g i The row vector of (c), i.e. g → (g) 1 ,g 2 ,...,g m ). The functions applied in the process of generating the hash key are as follows:
1)Function qGeneration(λ q ):
do
while q is not prime done
return q
2)Function pGeneration(q,λ p ):
do
for i=1 to 4λ p do
c←X(mod 2q)
p←X-c+1//p≡1(mod2q)
if p is prime then return p
done
return 0
3)Function g i Generation(p,q)
do
for i=1 to m do
x←f(p-1)+1
g i ←x (p-1)/q (modp)
whileg i =1 done
done
g←(g 1 ,g 2 ,...,g m )
return(p,q,g)
and step S200, calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing the judgment and the corresponding data block. Specifically, after receiving a file and a hash key uploaded by a client, a storage server calls at least two homomorphic check executors in a plurality of homomorphic check execution systems to respectively execute a homomorphic hash algorithm by using a mimicry defense idea for each data block of the uploaded file, and the obtained result enters an arbitration module to perform arbitration and exception feedback. The homomorphic hash value passing the arbitration can be used as a data tag to be attached to the data block and stored in association with the corresponding data block. The homomorphic check executive body executes homomorphic hash algorithm to obtain the homomorphic hash value as follows:
4)Function F'Gen(K,F)
K=(p,q,g),F=(b 1 ,b 2 ,...,b n )
for i=1 to n do
x←f(p-1)+1
Done
F'=(b 1 ,b 2 ,...,b n ;T 1 ,T 2 ,...,T n )
Return F'
and step S300, receiving a data verification request sent by the client. After the data is stored on the storage server, the client may initiate a challenge to verify data integrity at any time. The client randomly extracts some data blocks to initiate verification, and the data verification request contains information of the extracted data blocks, such as storage positions of the data blocks. In particular. The extracted data blocks are partial data blocks of the file to be verified, and all files do not need to be verified, so that the calculation amount is reduced.
Step S400, acquiring a data block to be subjected to data verification and a corresponding homomorphic hash value based on the data verification request, calling at least two homomorphic verification executors to respectively calculate a data aggregation value of the data block to be subjected to data verification and a hash aggregation value of the corresponding homomorphic hash value, and judging the data aggregation value and the hash aggregation value. Specifically, the data verification request includes a random key and the number of data blocks to be subjected to data verification.
Acquiring a data block to be subjected to data verification and a corresponding homomorphic hash value based on the data verification request, wherein the method comprises the following steps: calculating the position coordinates of each data block to be subjected to data verification and the corresponding homomorphic hash value according to the random key and the number of the data blocks to be subjected to data verification; and acquiring the data block to be subjected to data verification and the corresponding homomorphic hash value according to the position coordinate. For example, the client first needs to generate a random key e according to a random number generator, determine the number c of data blocks to be subjected to data verification, and send a data verification request containing the random key e and the number c<e, c > is sent to the storage server, and the storage server receives the data verification request<e, c > then entering into evidence generation phase, the storage server calls function r i =σ e (i) And (i is more than or equal to 1 and less than or equal to c) calculating to obtain the position coordinates of the data blocks of which the client initiates challenges, then utilizing a strategy/scheduling module in the mimicry defense system to invoke a homomorphic check executive body, simultaneously taking out each data block and homomorphic hash value in the corresponding data node according to the coordinates by the input agent, respectively sending the data blocks and the homomorphic hash value to the homomorphic check executive body, calculating the data aggregation value B of the data blocks and the hash aggregation value T of the corresponding homomorphic hash value which are the same evidences by the homomorphic check executive body, and sending the evidences to the arbitration module. And the arbitration module executes the arbitration scheme after receiving the data aggregation value B and the hash aggregation value T, and outputs the result as a response to return to the client. The data aggregation value B is a data block to be subjected to data verificationAnd the hash aggregate value T is the product of the corresponding homomorphic hash values, and the calculation function of the data aggregate value B and the hash aggregate value T is as follows:
5)Function ProofGen(e,c,F')→(B,T)
B=0,T=1
for i=1to c do
r i =σ e (i)
done
return(B,T)
and step S500, returning the data aggregation value and the Hash aggregation value which pass the judgment to the client so that the client calculates the data aggregation value by adopting a homomorphic Hash function to obtain a homomorphic Hash label, and determining whether a file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic Hash label is the same as the Hash aggregation value. In the evidence verification stage, the client receives the data possession evidence (T) returned by the storage server, namely the data aggregation value B and the hash aggregation value T of the corresponding homomorphic hash value, and calculates a homomorphic hash label (h) by using a homomorphic hash function according to the data aggregation value B K () And = T ', determining whether the homomorphic hash label T' is equal to the hash aggregation value T returned by the storage server, if so, completing the file to which the data block subjected to data verification belongs, otherwise, destroying the data. When the client side initiates verification each time, whether the file is complete or not can be judged only by calculating the data aggregation value B, the calculation amount is small, only a small amount of data needs to be transmitted in the verification process, and the network resource occupation is reduced.
The data verification method of the mimicry storage system comprises the steps of receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks; calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing through judgment and the corresponding data block; receiving a data verification request sent by a client; acquiring a data block to be subjected to data verification and a corresponding homomorphic hash value based on the data verification request; calling at least two homomorphic check executors to respectively calculate a data aggregation value of a data block to be subjected to data check and a hash aggregation value of a corresponding homomorphic hash value, and judging the data aggregation value and the hash aggregation value; the data aggregation value and the Hash aggregation value which are judged to pass are returned to the client, so that the client calculates the data aggregation value by adopting a homomorphic Hash function to obtain a homomorphic Hash label, whether a file to which the data block corresponding to the data verification request belongs is correctly held is determined according to the homomorphic Hash label and the Hash aggregation value, when data are verified, at least two homomorphic verification executing bodies in the mimicry defense system are called to respectively calculate the data aggregation value of the data block to be subjected to data verification and the Hash aggregation value of the corresponding homomorphic Hash value, the data aggregation value and the Hash aggregation value are judged, and the judged data aggregation value and the judged Hash aggregation value are returned to the client.
In an embodiment, invoking at least two homomorphic check executors in the mimicry defense system to calculate a homomorphic hash value of each data block according to the hash key respectively includes: distributing the hash key and the data block to at least two homomorphic check executors in the mimicry defense system; and receiving the homomorphic hash value of each data block which is calculated by at least two homomorphic check executors by adopting different hardware systems and/or different languages respectively to realize the homomorphic hash label algorithm and according to the hash key.
Specifically, after the storage server receives the data blocks and the hash key, the data blocks are distributed to each homomorphic check executive body in the mimicry defense system through an input agent of the mimicry defense system, each homomorphic check executive body completes a homomorphic hash label algorithm based on different hardware systems and different languages, and the homomorphic hash value of each data block is calculated according to the hash key. A homomorphic check executive body for completing homomorphic Hash label algorithm based on different hardware systems and different languages realizes a dynamic, heterogeneous, redundant and uncertain system architecture, and the system safety is improved.
In one embodiment, arbitrating homomorphic hash values comprises: acquiring a target homomorphic hash value meeting a preset rule from the homomorphic hash values calculated by different homomorphic check executors; taking the target homomorphic hash value as the homomorphic hash value passing the arbitration; performing exception feedback on homomorphic check executors which are different from the homomorphic hash value passing the arbitration and the homomorphic hash value; and (4) performing off-line or replacement on the homomorphic check executive body fed back by the exception.
Specifically, the preset rule is a majority rule, that is, the most consistent homomorphic hash value is the homomorphic hash value passed by the arbitration. The arbitration module arbitrates homomorphic hash values calculated by homomorphic check executors, and obtains most of consistent homomorphic hash values based on an arbitration strategy, wherein the most of consistent homomorphic hash values are the same homomorphic hash values calculated by most of homomorphic check executors, for example, the number of homomorphic hash values calculated by each homomorphic check executer is counted, and if more than 80% of homomorphic hash values calculated by the homomorphic check executors are the same, the homomorphic hash value is a target homomorphic hash value. And finding out abnormal homomorphic check executives with different calculation results and values calculated by most other homomorphic check executives, feeding back the abnormal homomorphic check executives to a strategy/scheduling module, operating a scheduling algorithm by the strategy/scheduling module to perform scheduling on a time domain, and processing the homomorphic check executives according to the abnormal feedback results, for example, performing offline processing on the abnormal homomorphic check executives and adding other homomorphic check executives for replacement. The probability of the system being attacked is reduced by continuously detecting and updating the homomorphic check executive, and the safety performance of the system is improved.
In an embodiment, invoking at least two homomorphic check executors to respectively calculate a data aggregation value of a data block to be subjected to data check and a hash aggregation value of a corresponding homomorphic hash value includes: the data block to be subjected to data verification and the corresponding homomorphic hash value are distributed to at least two homomorphic verification executors in the mimicry defense system; and receiving the sum of the data blocks to be subjected to data verification calculated by at least two homomorphic verification executors and the product of the corresponding homomorphic hash values, wherein the data aggregation value is the sum of the data blocks to be subjected to data verification, and the hash aggregation value is the product of the corresponding homomorphic hash values.
The data aggregation value and the hash aggregation value are obtained through the product of the sum of the data blocks to be subjected to data verification calculated by the homomorphic verification executive and the corresponding homomorphic hash value, namely, each data block and the homomorphic hash value do not need to be returned, and the client only needs to calculate the hash value of the data aggregation value to verify whether the data is complete or not, so that the calculation amount of the client is reduced.
In one embodiment, arbitrating the data aggregation value and the hash aggregation value comprises:
acquiring a target data aggregation value and a target hash aggregation value which meet a preset rule from the data aggregation value and the hash aggregation value calculated by different homomorphic check executors; taking the target data aggregation value and the target hash aggregation value as the data aggregation value and the hash aggregation value which are decided to pass; performing exception feedback on the calculated data aggregation value, the calculated hash aggregation value and the homomorphic check executive body which passes the arbitration and is different from the calculated hash aggregation value; and (4) performing off-line or replacement on the homomorphic check executive body fed back by the exception.
Specifically, the preset rule is a majority rule, that is, the majority of the consistent data aggregation values and hash aggregation values are the data aggregation values and hash aggregation values that are arbitrated to pass. The arbitration module arbitrates the data aggregation value and the hash aggregation value calculated by the homomorphic check executive body, and obtains most of consistent data aggregation values and hash aggregation values based on the arbitration policy, wherein the most of consistent data aggregation values and hash aggregation values are the same data aggregation values and hash aggregation values calculated by most of homomorphic check executive bodies. And finding out abnormal homomorphic check executives with different calculation results and values calculated by most other homomorphic check executives, feeding back the abnormal homomorphic check executives to a strategy/scheduling module, operating a scheduling algorithm by the strategy/scheduling module to perform scheduling on a time domain, and processing the homomorphic check executives according to the abnormal feedback results, for example, performing offline processing on the abnormal homomorphic check executives and adding other homomorphic check executives for replacement. The probability of the system being attacked is reduced by continuously detecting and updating the homomorphic check executive, and the safety performance of the system is improved.
To sum up, the data verification method for the mimicry storage system according to the embodiment of the present invention has the advantages of: firstly, protecting the system security of a storage server, and defending external attacks by utilizing a DHR framework of a mimicry defense system; then, enriching system functions, introducing a homomorphic hash algorithm, reserving the functions of the algorithm, and supporting dynamic update, infinite verification and integrity verification of data; and finally, the high efficiency of the system is guaranteed, the running speed block of the system is guaranteed after a plurality of executors are called, and the storage redundancy is low.
An embodiment of the present invention further provides a data verification apparatus for a pseudo storage system, as shown in fig. 2, including:
the first receiving module 201 is configured to receive a file and a hash key uploaded by a client, where the file includes a plurality of data blocks. For details, reference is made to the corresponding parts of the above method embodiments, which are not described herein again.
The storage module 202 is configured to invoke at least two homomorphic check executors in the mimicry defense system to calculate a homomorphic hash value of each data block according to the hash key, decide the homomorphic hash value, and store the decided homomorphic hash value and the corresponding data block. For details, reference is made to the corresponding parts of the above method embodiments, which are not described herein again.
The second receiving module 203 is configured to receive a data verification request sent by the client. For details, reference is made to the corresponding parts of the above method embodiments, and details are not repeated herein.
The evidence obtaining module 204 is configured to obtain a data block to be subjected to data verification and a corresponding homomorphic hash value based on the data verification request, and call at least two homomorphic verification executors to calculate a data aggregation value of the data block to be subjected to data verification and a hash aggregation value of the corresponding homomorphic hash value, respectively, so as to decide the data aggregation value and the hash aggregation value. For details, reference is made to the corresponding parts of the above method embodiments, which are not described herein again.
The response module 205 is configured to return the data aggregation value and the hash aggregation value that pass through the arbitration to the client, so that the client calculates the data aggregation value by using a homomorphic hash function to obtain a homomorphic hash tag, and determine whether the file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash tag is the same as the hash aggregation value. For details, reference is made to the corresponding parts of the above method embodiments, which are not described herein again.
The data verification device of the mimicry storage system comprises a receiving client, a verification module and a verification module, wherein the receiving client is used for receiving a file and a hash key uploaded by the receiving client, and the file comprises a plurality of data blocks; calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing the judgment and the corresponding data block; receiving a data verification request sent by a client; acquiring a data block to be subjected to data verification and a corresponding homomorphic hash value based on the data verification request; calling at least two homomorphic check executors to respectively calculate a data aggregation value of a data block to be subjected to data check and a hash aggregation value of a corresponding homomorphic hash value, and judging the data aggregation value and the hash aggregation value; and returning the judged data aggregation value and the judged Hash aggregation value to the client so that the client calculates the data aggregation value by adopting a homomorphic Hash function to obtain a homomorphic Hash label, and determining whether a file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic Hash label is the same as the Hash aggregation value.
The embodiment of the invention also provides a data checking system of the mimicry storage system, as shown in fig. 3, the system comprises a client and a storage server, the storage server comprises a mimicry defense system and data nodes, the mimicry defense system specifically adopts a dynamic heterogeneous redundant architecture and comprises an input proxy, an arbitration module, a homomorphic check execution body and a strategy/scheduling module, and the input proxy and the arbitration module form a meta-service node to interact with the client.
The client is used for generating a hash key, uploading the hash key and a file to be stored to the storage server, and sending a data verification request to the storage server;
the storage server is used for calling at least two homomorphic check executors in the mimicry defense system to respectively calculate a homomorphic hash value of each data block according to the hash key after receiving the file and the hash key uploaded by the client, judging the homomorphic hash value, and storing the homomorphic hash value and the corresponding data block which are judged to pass in association to the data node;
and the client is also used for calculating the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label after receiving the data aggregation value and the hash aggregation value returned by the server, and determining whether the homomorphic hash label and the hash aggregation value are the same so as to judge whether the file to which the data block subjected to data verification belongs is correctly held.
The operation principle of the data verification system of the mimicry storage system provided by the embodiment of the invention is as follows: the client generates an initial key during initialization, and uploads the hash key and a file to be stored to the storage server. In the data label stage, the client interacts with the storage server through the network, homomorphic hash operation is carried out on all data blocks through a mimicry defense system of the storage server, homomorphic hash values are generated and are used as data labels and data blocks to be stored in the storage nodes together, and the homomorphic hash values are used as a holding certification basis and provide integrity guarantee. After the preparation stage is finished, the client can initiate a challenge to the storage server at any time, send a data verification request for integrity verification, after the storage server receives the data verification request, the meta-service node establishes a connection with the on-line homomorphic verification executive bodies, distribute and decide the data blocks, send the data blocks to be subjected to data verification and the corresponding homomorphic hash values to each homomorphic verification executive body, the homomorphic verification executive bodies calculate the data aggregation values of the data blocks to be subjected to data verification and the hash aggregation values of the corresponding homomorphic hash values, then output the results to the deciding module for deciding, after the deciding module decides, send the deciding results to the strategy/scheduling module, the strategy/scheduling module receives the deciding results, runs a scheduling algorithm according to the deciding results to perform scheduling in a time domain, and simultaneously send homomorphic verification executive body information to the meta-service node.
In the data verification system of the mimicry storage system, a client is used for generating a hash key, uploading the hash key and a file to be stored to a storage server, and sending a data verification request to the storage server; the storage server is used for calling at least two homomorphic check executors in the mimicry defense system to calculate homomorphic hash values of each data block according to the hash key after receiving the file and the hash key uploaded by the client, judging the homomorphic hash values, storing the judged homomorphic hash values and the corresponding data blocks to the data nodes in an associated manner, acquiring the data blocks to be subjected to data check and the corresponding homomorphic hash values based on the data check request after receiving the data check request, calling the at least two homomorphic check executors to calculate data aggregation values of the data blocks to be subjected to data check and hash aggregation values of the corresponding homomorphic hash values respectively, judging the data aggregation values and the hash aggregation values, and returning the judged data aggregation values and the hash aggregation values to the client; the client is further used for calculating the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label after receiving the data aggregation value and the hash aggregation value returned by the server, and determining whether the homomorphic hash label is the same as the hash aggregation value so as to judge whether the file to which the data block for data verification belongs is correctly held. According to the embodiment of the invention, during data verification, the mimicry defense system is used for defending external attacks, the system security performance is improved, and the homomorphic hash algorithm is introduced for encryption, so that the data leakage risk is reduced.
An embodiment of the present invention further provides an electronic device, as shown in fig. 4, including: the memory 501 and the processor 502 are communicatively connected to each other, the memory 501 and the processor 502 are connected to each other, the memory 501 stores computer instructions, and the processor 502 executes the computer instructions, so as to execute the data verification method of the pseudo memory system according to the above-described embodiment of the present invention. Wherein the processor 502 and the memory 501 may be connected by a bus or other means. Processor 502 may be a Central Processing Unit (CPU). The processor 502 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. The memory 501, which is a non-transitory computer storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as the corresponding program instructions/modules in embodiments of the present invention. The processor 502 executes various functional applications and data processing of the processor 502 by executing non-transitory software programs, instructions and modules stored in the memory 501, that is, implementing the data verification method of the pseudo storage system in the above method embodiments. The memory 501 may include a storage program area and a storage data area, wherein the storage program area may store an application program required for operating the device, at least one function; the storage data area may store data created by the processor 502, and the like. Further, the memory 501 may include a high speed random access memory 501, and may also include a non-transitory memory 501, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 501 may optionally include memory 501 located remotely from processor 502, and such remote memory 501 may be connected to processor 502 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. One or more modules are stored in memory 501 and, when executed by processor 502, perform a mimicry storage system data verification method as in the above-described method embodiments. The specific details of the electronic device may be understood according to the related descriptions and effects corresponding to the method embodiments, and are not described herein again.
An embodiment of the present invention further provides a computer-readable storage medium, as shown in fig. 5, on which a computer program 13 is stored, and when the instruction is executed by a processor, the step of the data verification method of the mimicry storage system in the foregoing embodiments is implemented. The storage medium is also stored with audio and video stream data, characteristic frame data, an interactive request signaling, encrypted data, preset data size and the like. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above. It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct relevant hardware, and the computer program 13 may be stored in a computer readable storage medium, and when executed, may include the processes of the embodiments of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
The above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A data verification method of a mimicry storage system is applied to a storage server and comprises the following steps:
receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks;
calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash value, and storing the homomorphic hash value passing the judgment and the corresponding data block;
receiving a data verification request sent by a client;
acquiring a data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request, calling at least two homomorphic verification executors to respectively calculate a data aggregation value of the data block to be subjected to data verification and a corresponding hash aggregation value of the homomorphic hash value, and judging the data aggregation value and the hash aggregation value;
and returning the data aggregation value and the hash aggregation value which pass the judgment to the client so that the client calculates the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label, and determining whether the file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash label is the same as the hash aggregation value.
2. The data verification method for the mimicry storage system according to claim 1, wherein the step of calling at least two homomorphic verification executors in the mimicry defense system to calculate the homomorphic hash value of each data block according to the hash key comprises the following steps:
distributing the hash key and the data block to at least two homomorphic check executors in a mimicry defense system;
and receiving homomorphic hash values of each data block, which are calculated by at least two homomorphic check executors according to the hash key, wherein the homomorphic check executors respectively realize homomorphic hash label algorithms by adopting different hardware systems and/or different languages.
3. The data verification method of the mimicry storage system of claim 1, wherein arbitrating the homomorphic hash values comprises:
acquiring a target homomorphic hash value meeting a preset rule from the homomorphic hash values calculated by different homomorphic check executors;
taking the target homomorphic hash value as the homomorphic hash value passing the arbitration;
performing exception feedback on homomorphic check executors which are different from the homomorphic hash value passing the arbitration and the homomorphic hash value;
and (4) performing off-line or replacement on the homomorphic check executive body fed back by the exception.
4. The data verification method of the mimicry storage system according to claim 1, wherein invoking at least two homomorphic verification executors to respectively calculate a data aggregation value of a data block to be subjected to data verification and a hash aggregation value of the corresponding homomorphic hash value, includes:
the data block to be subjected to data verification and the corresponding homomorphic hash value are distributed to at least two homomorphic verification executors in the mimicry defense system;
receiving the sum of data blocks to be subjected to data verification calculated by at least two homomorphic verification executors and the product of the corresponding homomorphic hash values, wherein the data aggregation value is the sum of the data blocks to be subjected to data verification, and the hash aggregation value is the product of the corresponding homomorphic hash values.
5. The data verification method of the mimicry storage system of claim 1, wherein arbitrating the data aggregation value and the hash aggregation value comprises:
acquiring a target data aggregation value and a target hash aggregation value which meet a preset rule from the data aggregation value and the hash aggregation value calculated by different homomorphic check executors;
taking the target data aggregation value and the target hash aggregation value as the data aggregation value and the hash aggregation value which are decided to pass;
performing exception feedback on the calculated data aggregation value, the hash aggregation value and the homomorphic check executive body which passes the arbitration and is different from the hash aggregation value;
and carrying out off-line or replacement on the homomorphic check executive body fed back by the exception.
6. The mimicry storage system data checking method according to claim 1, wherein the data checking request includes a random key and a number of data blocks to be checked for data;
the obtaining of the data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request includes:
calculating the position coordinates of each data block to be subjected to data verification and the corresponding homomorphic hash value according to the random key and the number of the data blocks to be subjected to data verification;
and acquiring a data block to be subjected to data verification and the corresponding homomorphic hash value according to the position coordinates.
7. A data verification device for a mimicry storage system, comprising:
the first receiving module is used for receiving a file and a hash key uploaded by a client, wherein the file comprises a plurality of data blocks;
the storage module is used for calling at least two homomorphic check executors in the mimicry defense system to respectively calculate the homomorphic hash value of each data block according to the hash key, judging the homomorphic hash values and storing the homomorphic hash values and the corresponding data blocks which pass the judgment;
the second receiving module is used for receiving a data verification request sent by the client;
an evidence obtaining module, configured to obtain a data block to be subjected to data verification and the corresponding homomorphic hash value based on the data verification request, and call at least two homomorphic verification executors to calculate a data aggregation value of the data block to be subjected to data verification and a hash aggregation value of the corresponding homomorphic hash value, respectively, and decide the data aggregation value and the hash aggregation value;
and the response module is used for returning the data aggregation value and the hash aggregation value which pass the judgment to the client so as to enable the client to calculate the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash label, and determining whether the file to which the data block corresponding to the data verification request belongs is correctly held according to whether the homomorphic hash label is the same as the hash aggregation value.
8. An electronic device, comprising: a memory and a processor, the memory and the processor being communicatively connected to each other, the memory storing computer instructions, and the processor executing the computer instructions to perform the data verification method of the mimicry storage system according to any one of claims 1 to 5.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium stores computer instructions for causing the computer to execute the mimicry storage system data checking method according to any one of claims 1 to 5.
10. The data verification system of the mimicry storage system is characterized by comprising a client and a storage server, wherein the storage server comprises a mimicry defense system and data nodes;
the client is used for generating a hash key, uploading the hash key and a file to be stored to a storage server, and sending a data verification request to the storage server;
the storage server is used for calling at least two homomorphic check executors in a mimicry defense system to respectively calculate a homomorphic hash value of each data block according to the hash key after receiving the file and the hash key uploaded by the client, arbitrating the homomorphic hash value, and storing the homomorphic hash value and the corresponding data block which are arbitrated to pass in an associated manner to the data node;
and the client is further used for calculating the data aggregation value by adopting a homomorphic hash function to obtain a homomorphic hash tag after receiving the data aggregation value and the hash aggregation value returned by the server, and determining whether the homomorphic hash tag and the hash aggregation value are the same so as to judge whether a file to which the data block subjected to data verification belongs is correctly held.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211487287.6A CN115913572A (en) | 2022-11-17 | 2022-11-17 | Data verification method, device, equipment, medium and system for mimicry storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211487287.6A CN115913572A (en) | 2022-11-17 | 2022-11-17 | Data verification method, device, equipment, medium and system for mimicry storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115913572A true CN115913572A (en) | 2023-04-04 |
Family
ID=86489151
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211487287.6A Pending CN115913572A (en) | 2022-11-17 | 2022-11-17 | Data verification method, device, equipment, medium and system for mimicry storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115913572A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117134981A (en) * | 2023-09-07 | 2023-11-28 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070140479A1 (en) * | 2005-12-19 | 2007-06-21 | Microsoft Corporation | Privacy-preserving data aggregation using homomorphic encryption |
CN110086599A (en) * | 2019-04-24 | 2019-08-02 | 电子科技大学 | Hash calculation method and label decryption method based on homomorphism chameleon hash function |
CN111597590A (en) * | 2020-05-12 | 2020-08-28 | 重庆邮电大学 | Block chain-based data integrity rapid inspection method |
CN114650128A (en) * | 2022-03-31 | 2022-06-21 | 启明星辰信息技术集团股份有限公司 | Aggregation verification method for federated learning |
-
2022
- 2022-11-17 CN CN202211487287.6A patent/CN115913572A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070140479A1 (en) * | 2005-12-19 | 2007-06-21 | Microsoft Corporation | Privacy-preserving data aggregation using homomorphic encryption |
CN110086599A (en) * | 2019-04-24 | 2019-08-02 | 电子科技大学 | Hash calculation method and label decryption method based on homomorphism chameleon hash function |
CN111597590A (en) * | 2020-05-12 | 2020-08-28 | 重庆邮电大学 | Block chain-based data integrity rapid inspection method |
CN114650128A (en) * | 2022-03-31 | 2022-06-21 | 启明星辰信息技术集团股份有限公司 | Aggregation verification method for federated learning |
Non-Patent Citations (1)
Title |
---|
赵海宁: "拟态防御系统中的同态技术应用研究", 中国优秀硕士论文电子期刊网, no. 2022, 15 July 2022 (2022-07-15), pages 19 - 49 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117134981A (en) * | 2023-09-07 | 2023-11-28 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
CN117134981B (en) * | 2023-09-07 | 2024-05-14 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11977962B2 (en) | Immutable watermarking for authenticating and verifying AI-generated output | |
KR101985421B1 (en) | Method and apparatus for security investment based on evaluating security risks | |
CN110768791A (en) | Zero-knowledge proof data interaction method, node and equipment | |
EP3320475A1 (en) | A method and a system for reliable computation of a program | |
CN115913572A (en) | Data verification method, device, equipment, medium and system for mimicry storage system | |
CN111741008B (en) | Two-way anonymous authentication system and method based on mimicry defense principle | |
Huang et al. | Blocksense: Towards trustworthy mobile crowdsensing via proof-of-data blockchain | |
CN116628705A (en) | Data security processing method, system, electronic equipment and storage medium | |
CN113569278A (en) | Data sharing method and related equipment of multi-bidding platform based on block chain | |
CN114500347B (en) | Method and system for formalized verification of security interconnection protocol | |
Kumar et al. | PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment | |
CN108683654A (en) | A kind of network vulnerability evaluation method based on zero-day attacks figure | |
CN112132576B (en) | Payment information processing method based on block chain communication and block chain information platform | |
Nhlabatsi et al. | Quantifying satisfaction of security requirements of cloud software systems | |
CN103384249A (en) | Network access authentication method, device and system and authentication server | |
EP4280543A1 (en) | Systems and methods for provable provenance for artificial intelligence model assessments | |
CN115001748B (en) | Model processing method and device and computer readable storage medium | |
CN110311917A (en) | Host measure and device | |
Shi | Security risk assessment about enterprise networks on the base of simulated attacks | |
Dong et al. | Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture | |
CN114499818A (en) | Cloud data auditing method and device, electronic equipment and computer readable storage medium | |
CN111555857A (en) | Edge network and network transmission method | |
Badih et al. | Crypto-jacking threat detection based on blockchain framework and deception techniques | |
CN117439737B (en) | Collaborative signature method and collaborative signature system | |
CN117034356B (en) | Privacy protection method and device for multi-operation flow based on hybrid chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |