WO2024088082A1 - 一种数据完整性审计方法、设备及存储介质 - Google Patents

一种数据完整性审计方法、设备及存储介质 Download PDF

Info

Publication number
WO2024088082A1
WO2024088082A1 PCT/CN2023/124443 CN2023124443W WO2024088082A1 WO 2024088082 A1 WO2024088082 A1 WO 2024088082A1 CN 2023124443 W CN2023124443 W CN 2023124443W WO 2024088082 A1 WO2024088082 A1 WO 2024088082A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
data
cloud
integrity
information
Prior art date
Application number
PCT/CN2023/124443
Other languages
English (en)
French (fr)
Inventor
王利朋
任文琦
李勇
晋争
孙新芳
杨艳艳
胡明生
Original Assignee
郑州师范学院
中山大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 郑州师范学院, 中山大学 filed Critical 郑州师范学院
Publication of WO2024088082A1 publication Critical patent/WO2024088082A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Definitions

  • the present invention relates to the field of data auditing, and in particular to a data integrity auditing method, device and storage medium.
  • Cloud storage operators provide a decentralized infrastructure that allows users to store data online. Users pay these cloud storage operators to obtain a certain amount of storage space and enjoy security services such as data backup and anti-network attack. Once users store data in the cloud, the user data will be completely managed by the cloud storage operator. During this period, the cloud storage operator maintains the integrity of the data by selecting reliable storage servers and delivers the corresponding data in a timely manner when receiving legitimate data requests. However, the operator's data management process is a black box for users. If the cloud data is damaged, users cannot discover it in time, and the cloud storage operator can also deny it. Based on this, implementing a transparent data integrity audit solution is an important technical means to build trust between cloud storage operators and users.
  • the more common data integrity audit strategy is implemented based on hash algorithms, such as MD5 and SHA256.
  • the system uses the above hash algorithm to calculate the hash value of the data, and then stores it in a trusted system. Later, data integrity verification operations can be performed based on the hash value.
  • the design method of implementing data integrity auditing based on hash algorithms generally has the following problems. First, the auditor needs to obtain the audited data object, and then calculate the hash value for matching. The data transmission process consumes a lot of bandwidth resources. Secondly, when using this method to perform audit operations, the system cannot flexibly customize the amount of data to be verified according to its own idle state or needs.
  • the existing remote data possession (Provable Data Possession, PDP) algorithm can effectively solve the above problems.
  • the auditor can audit the data integrity without holding the audited data object.
  • the existing remote data possession algorithms all rely on centralized trusted nodes to generate and manage user public and private key information. Once the node acts maliciously, data privacy information will be leaked.
  • the centralized key management method will affect the scalability of the audit method and cause data loss or destruction in the event of natural disasters or equipment damage.
  • the embodiments of the present invention provide a data integrity audit method, device and storage medium, which can audit the integrity of cloud data without holding the private key of the data owner.
  • a data integrity audit method comprising:
  • the integrity of the cloud storage data is verified based on the file tags and metadata information in the blockchain.
  • verifying the integrity of the cloud storage data based on the file tag and metadata information in the blockchain includes:
  • the proof information is combined with the file tag and metadata information from the blockchain to verify the integrity of the cloud storage data.
  • the step of cutting the file to be uploaded into different file blocks includes:
  • the sending the file authentication token and the file to the cloud for storage includes:
  • the file authenticator and the encrypted file are sent to the cloud for storage.
  • FT is the file tag
  • n is the number of the file blocks
  • s is the number of sectors of each file block
  • Fs is the size of the file F.
  • the file authenticator corresponding to each file block is calculated using the following formula:
  • ⁇ i is the file authentication code corresponding to the ith file block
  • H 1 () is the hash function
  • k prf is the key
  • a 1 ,...,a j ,...,as are the cyclic groups modulo the prime number p
  • c ij is the encrypted file block.
  • proof is the proof information
  • Q is the challenge information
  • (i, vi ) is the different random elements in the challenge information Q
  • vi is a random number
  • l is the random number in the challenge information Q
  • the challenge information before the challenge information is sent to the cloud, it also includes:
  • the number of random elements in the challenge information to be issued is obtained according to the determined data volume percentage and the size of the file.
  • the combining of the certification information with the file tag and metadata information from the blockchain to verify the integrity of the cloud storage data includes:
  • g is the generator
  • K is the public key
  • Aj is the metadata information used to perform data integrity verification
  • An embodiment of the present invention further provides a data processing device, comprising a processor and a memory, wherein the processor implements the above-mentioned data integrity audit method provided by the embodiment of the present invention when executing a computer program stored in the memory.
  • An embodiment of the present invention further provides a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the above-mentioned data integrity audit method provided by the embodiment of the present invention.
  • a data integrity audit method includes: cutting the file to be uploaded into different file blocks; calculating the file tag and file authenticator corresponding to each file block; sending the file authenticator and the file to the cloud for storage, and sending the file tag and metadata information to the blockchain; based on the file tag and metadata information in the blockchain, Verify the integrity of data stored in the cloud.
  • the above-mentioned data integrity audit method provided by the present invention has a key management function, and can audit the integrity of cloud data without holding the private key of the data owner. It does not need to store and maintain any key information, and eliminates the single point failure and single point trust problems introduced by the traditional implementation scheme due to the need to maintain a centralized key management center. It is better adapted to decentralized business scenarios and has low key maintenance costs.
  • the present invention can effectively improve the transparency of the audit process and has high execution efficiency.
  • the corresponding audit results can provide data security services for storage logs, responsibility tracing, etc.
  • the present invention also provides corresponding equipment and computer-readable storage medium for the data integrity audit method, which further makes the above method more practical.
  • the equipment and computer-readable storage medium have corresponding advantages.
  • FIG1 shows a flow chart of a data integrity audit method provided by an embodiment of the present invention
  • FIG. 2 shows a schematic diagram of the architecture of a data integrity audit method provided by an embodiment of the present invention.
  • the present invention provides a data integrity audit method that eliminates the key management process and supports public auditability.
  • the data integrity audit method provided by the present invention comprises the following steps:
  • users need to send their own files to the cloud for storage. Users can directly upload the files to be uploaded (i.e. plain text information) to the cloud, or they can encrypt the uploaded files for data privacy considerations, and the corresponding keys should be retained by the users themselves. For this method, even if the user loses the above keys, it will not affect the normal execution of the new solution.
  • the above step S101 cuts the file to be uploaded into different file blocks, which may specifically include: encrypting the file to be uploaded using a symmetric encryption algorithm, and cutting the encrypted file into different file blocks; each file block has a sector of a set size.
  • users before uploading their data to the cloud, users can choose to use a symmetric encryption algorithm to encrypt the uploaded files and secretly save the corresponding keys. Then, users need to cut the encrypted files into different file blocks, each of which has a fixed-size sector.
  • FT n
  • FT is the file tag
  • n is the number of file blocks
  • s is the number of sectors of each file block
  • Fs is the size of file F.
  • the file authentication code corresponding to each file block can be calculated using the following formula:
  • ⁇ i is the file authenticator corresponding to the ith file block
  • H 1 () is the hash function
  • k prf is the key
  • c ij is the encrypted file block.
  • S103 Send the file authenticator and the file to the cloud for storage, and send the file tag and metadata information to the blockchain.
  • the cloud can theoretically have unlimited storage space and computing resources.
  • Traditional data storage systems such as Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage Area Network (SAN), can all be used as cloud storage.
  • DAS Direct Attached Storage
  • NAS Network Attached Storage
  • SAN Storage Area Network
  • SPDK Storage Performance Development Kit
  • the present invention can audit the integrity of cloud data.
  • a timing strategy can be adopted or it can be automatically executed when the system is idle.
  • Blockchain is a distributed system composed of a group of network nodes that can verify and store transaction data sent by users.
  • Blockchain has the characteristics of tamper-proof and trusted traceability, which can ensure the credibility of data on the chain.
  • 51% computing power attacks and DAO attacks on public chain platforms relying on the excellent open source characteristics of public chains, relevant developers can update system security patches in a timely manner to ensure the security of blockchain platforms. It is assumed here that the blockchain platform used is secure and can ensure that the data stored on the chain cannot be tampered with.
  • the above step S103 sends the file authenticator and the file to the cloud for storage, and sends the file tag and metadata information to the blockchain.
  • it can include: sending the file authenticator and the encrypted file to the cloud for storage, and sending the file tag and other metadata information to the blockchain.
  • the third-party auditor is responsible for verifying the integrity of cloud storage data, and its role can be assumed by the user or a trusted third-party entity.
  • the present invention supports public auditability, and theoretically allows any entity that does not hold the private key information of the data owner to perform data integrity audit operations, without relying on the key generation center to manage the user's public and private key information.
  • the above step S104 is based on the file tags and metadata information in the blockchain. Specifically, it can include: assuming the role of TPA to issue a challenge message to the cloud, so that the cloud can calculate and feedback the proof information based on the challenge message and the local storage data; combining the proof information with the file tag and metadata information from the blockchain to verify the integrity of the cloud storage data.
  • proof is the proof information
  • Q is the challenge information
  • (i, vi ) are different random elements in the challenge information Q
  • vi is a random number
  • l is the number of random elements in the challenge information Q
  • set U and set ⁇ constitute the proof message proof
  • uj are different random elements in set U.
  • the integrity of cloud data can be audited without holding the private key of the data owner, and there is no need to store and maintain any key information.
  • the single point failure and single point trust problems introduced by the traditional implementation scheme due to the need to maintain a centralized key management center are eliminated. It is better adapted to decentralized business scenarios and has low key maintenance costs.
  • the present invention can effectively improve the transparency of the audit process and has high execution efficiency.
  • the corresponding audit results can provide data security services for storage logs, responsibility tracing, etc.
  • FIG 2 shows an architectural diagram of the above-mentioned data integrity audit method provided by an embodiment of the present invention.
  • users there may be four different entities in the present invention: users, blockchain, TPA and cloud.
  • users need to upload their own data to the cloud, and need to ensure the integrity of the cloud's own data.
  • users can use a symmetric encryption algorithm to encrypt the uploaded files and secretly save the corresponding keys.
  • the user needs to cut the encrypted files into different file blocks, each file block has a fixed-size sector.
  • the user needs to calculate the corresponding file tags and file authenticators for these file blocks, and then send the file authenticators and encrypted files to the cloud for storage, and send the file tags and other metadata information to the blockchain.
  • TPA is responsible for verifying the integrity of cloud user data, and its role can be performed by the user or a third-party entity.
  • TPA first issues a challenge message to the cloud data. Then, after receiving the challenge message, the cloud calculates the proof information based on the locally stored data and sends it to TPA. After receiving the proof information, TPA verifies the integrity of the cloud data based on the file tags and other metadata information obtained from the blockchain.
  • the above-mentioned data integrity audit method before issuing a challenge message to the cloud, it may also include: determining the percentage of data to be audited based on its own computing power or preset conditions; and obtaining the number of random elements in the challenge message to be issued based on the determined percentage of data and the size of the file.
  • the proof information is combined with the file tag and metadata information from the blockchain to verify the integrity of the cloud storage data, which may specifically include: parsing the proof information; retrieving the corresponding file tag and metadata information from the blockchain; and verifying whether the following equation holds:
  • g is the generator
  • K is the public key
  • Aj is the metadata information used to perform data integrity verification
  • Step 1 Execute the Setup step to output system common parameters.
  • Enc() is a standard symmetric encryption function, such as AES algorithm, and the key of Enc() is sk.
  • Step 2 Execute the DataProg step.
  • the user For the file F to be uploaded, the user needs to encrypt F, divide it into n file blocks, and then calculate the file label.
  • the user first randomly selects a secret key for the symmetric encryption function Enc() Then encrypt F to get File Divide into n file blocks, each file block has s sectors.
  • the labels are ⁇ c ij ⁇ 1 ⁇ i ⁇ n,1 ⁇ j ⁇ s .
  • the file label FT n
  • Step 3 Execute the GenAuth step, given FT and The user calculates the set of authenticators corresponding to the file block.
  • the present invention defines the authentication symbol set ⁇ as ⁇ i ⁇ 1 ⁇ i ⁇ n .
  • Step 4 Execute the Challenge step.
  • TPA can determine the percentage of data to be audited based on its own computing power or system preset conditions. For example, when the system is idle, TPA can increase the percentage of data to be audited r, 0 ⁇ r ⁇ 1, otherwise, reduce the percentage r.
  • TPA retrieves the FT from the blockchain and then selects a challenge set containing l different random elements (i, vi ), where i ⁇ [1,n],
  • Step 5 Execute the Response step. Given the challenge set Q, the cloud computes the corresponding proof message to indicate that the data it holds is complete, and then sends the proof message to TPA for verification.
  • Step 6 Execute the Verification step.
  • TPA uses the proof sent from the cloud to verify whether the cloud data is complete.
  • an embodiment of the present invention further discloses a data processing device, including a processor and a memory; wherein the processor implements the data integrity audit method disclosed in the above embodiment when executing a computer program stored in the memory.
  • a data processing device including a processor and a memory; wherein the processor implements the data integrity audit method disclosed in the above embodiment when executing a computer program stored in the memory.
  • the present invention also discloses a computer-readable storage medium for storing a computer program; when the computer program is executed by a processor, the aforementioned disclosed data integrity audit method is implemented.
  • a computer-readable storage medium for storing a computer program; when the computer program is executed by a processor, the aforementioned disclosed data integrity audit method is implemented.
  • each embodiment is described in a progressive manner, and each embodiment focuses on the differences from other embodiments.
  • the same or similar parts between the embodiments can be referred to each other.
  • the description is relatively simple, and the relevant parts can be referred to the method part.
  • the methods or steps of the methods described in conjunction with the embodiments disclosed herein may be implemented directly using hardware, software modules executed by a processor, or a combination of the two.
  • the software modules may be placed in a random access memory (RAM), a memory, a read-only memory (ROM), an electrically programmable ROM, an electrically erasable programmable ROM, a register, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • a data integrity audit method includes: cutting the file to be uploaded into different file blocks; calculating the file tag and file authenticator corresponding to each file block; sending the file authenticator and the file to the cloud for storage, and sending the file tag and metadata information to the blockchain; verifying the integrity of the cloud storage data based on the file tag and metadata information in the blockchain.
  • the above-mentioned data integrity audit method has a de-key management function, which can audit the integrity of cloud data without holding the private key of the data owner, and does not need to store and maintain any key information, eliminating the single point of failure and single point of trust problems introduced by the traditional implementation scheme due to the need to maintain a centralized key management center, and is better adapted to decentralized business scenarios.
  • the present invention can effectively improve the transparency of the audit process, has a high execution efficiency, and the corresponding audit results can provide data security services for storage logs, responsibility tracing, etc.
  • the present invention also provides corresponding equipment and computer-readable storage media for the data integrity audit method, which further makes the above-mentioned method more practical, and the equipment and computer-readable storage medium have corresponding advantages.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

一种数据完整性审计方法、设备及存储介质,该方法将待上传的文件切割成不同的文件块;计算各文件块对应的文件标签和文件认证符;将文件认证符和文件发送至云端进行存储,同时将文件标签和元数据信息发送至区块链;依据区块链中的文件标签和元数据信息,验证云端存储数据的完整性。该方法具有去密钥管理功能,可以在不持有数据拥有者私钥的前提下对云端数据完整性进行审计,不需要存储和维护任何密钥信息,消除了传统实现方案因需要维护中心化密钥管理中心而引入的单点故障和单点信任问题,更好地适配于去中心化的业务场景中,密钥维护成本低,此外本发明可以有效提升审计过程的透明性,具有较高的执行效率。

Description

一种数据完整性审计方法、设备及存储介质
本申请要求于2022年10月24日提交中国专利局、申请号为202211302402.8、发明名称为“一种数据完整性审计方法、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据审计领域,具体涉及一种数据完整性审计方法、设备及存储介质。
背景技术
云存储运营商提供了一个去中心化的基础设施,允许用户能够在线存储数据。用户通过向这些云存储运营商付费,进而获得一定存储空间,并可以享受诸如数据备份、抗网络攻击等安全服务。一旦用户将数据存储到云端,其后用户数据将完全由云存储运营商管理。期间云存储运营商通过选择可靠的存储服务器,维护数据的完整性,在收到合法数据请求时,及时交付相应的数据。然而,运营商管理数据的过程对于用户而言是一个黑盒,如果云端数据被破坏,用户并不能及时发现,而且云存储运营商也可以对此进行抵赖。基于此,实现一种透明的数据完整性审计方案,是构建云存储运营商和用户之间信任的重要技术手段。
目前较为常见的数据完整性审计策略就是基于哈希算法进行实现,例如MD5和SHA256。系统利用上述哈希算法计算出数据的哈希值,然后将其存储到可信系统中,后续就可以基于该哈希值执行数据完整性校验操作。但是,基于哈希算法实现数据完整性审计的设计方法,一般存在下面一些问题。首先审计方需要获取被审计数据对象,然后再计算得到哈希值进行匹配,数据传递过程需要消耗大量的带宽资源。其次,当利用该方法执行审计操作时,系统不能根据其自身空闲状态或需求灵活定制被校验的数据量。更为重要的是,一旦某个文件被修改,即使是一个字节,系统也需要重新计算这个文件对应的哈希值,修改的成本较高。最后负责执行数据一 致性审计的节点,有可能自己作恶或被黑客攻击并控制,进而篡改审计结果。
现有的远程数据持有(Provable Data Possession,PDP)算法能够有效解决上述问题,审计方能够在不持有被审计数据对象的前提下,对数据完整性进行审计。然而现有的远程数据持有算法均需要依赖中心化可信节点来生成并管理用户公私钥信息,一旦该节点作恶,就会导致数据隐私信息被泄露。此外,中心化密钥管理方式会影响审计方法的可扩展性,在发生自然灾害或设备损坏时会导致数据丢失或破坏。
因此,如何设计一种去密钥管理功能的远程数据持有算法来完成透明的数据完整性审计,是本领域技术人员亟待解决的技术问题。
发明内容
本发明实施例提供了一种数据完整性审计方法、设备及存储介质,可以在不持有数据拥有者私钥的前提下对云端数据完整性进行审计。
为了实现上述目的,本发明实施例提供如下技术方案:
一种数据完整性审计方法,包括:
将待上传的文件切割成不同的文件块;
计算各所述文件块对应的文件标签和文件认证符;
将所述文件认证符和所述文件发送至云端进行存储,同时将所述文件标签和元数据信息发送至区块链;
依据所述区块链中的所述文件标签和元数据信息,验证所述云端存储数据的完整性。
优选地,在本发明实施例提供的上述数据完整性审计方法中,所述依据所述区块链中的所述文件标签和元数据信息,验证所述云端存储数据的完整性,包括:
担任TPA角色对所述云端发出挑战信息,以使所述云端根据所述挑战信息和本地存储数据,计算并反馈证明信息;
将所述证明信息与从所述区块链中的所述文件标签和元数据信息进行结合,验证所述云端存储数据的完整性。
优选地,在本发明实施例提供的上述数据完整性审计方法中,所述将待上传的文件切割成不同的文件块,包括:
利用对称加密算法对待上传的文件进行加密,并将加密后的所述文件切割成不同的文件块;每个所述文件块具有设定大小的扇区;
所述将所述文件认证符和所述文件发送至云端进行存储,包括:
将所述文件认证符和加密后的所述文件发送至云端进行存储。
优选地,在本发明实施例提供的上述数据完整性审计方法中,采用下述公式计算各所述文件块对应的文件标签:
FT=n||s||Fs;
其中,FT为所述文件标签,n为所述文件块的数量,s为每个所述文件块的扇区数量,Fs为所述文件F的大小。
优选地,在本发明实施例提供的上述数据完整性审计方法中,采用下述公式计算各所述文件块对应的文件认证符:
其中,δi为第i个所述文件块对应的文件认证符,H1()为哈希函数,kprf为密钥,a1,...,aj,...,as为从模素数p的循环群随机选择的元素集,cij为加密后的所述文件块。
优选地,在本发明实施例提供的上述数据完整性审计方法中,采用下述公式计算所述证明信息:
proof={U,σ};

U={u1,u2,...,us};

其中,proof为所述证明信息,Q为所述挑战信息,(i,vi)为所述挑战信息Q中的不同随机元素,vi为随机数,||vi||<||p||,l为所述挑战信息Q中随 机元素的数量,集合U和集合σ组成了证明消息proof,uj为集合U中不同的随机元素。
优选地,在本发明实施例提供的上述数据完整性审计方法中,在所述对所述云端发出挑战信息之前,还包括:
根据自身计算能力或预设条件确定待审计的数据量百分比;
根据确定的所述数据量百分比和所述文件的大小,获取待发出的挑战信息中随机元素的数量。
优选地,在本发明实施例提供的上述数据完整性审计方法中,所述将所述证明信息与从所述区块链中的所述文件标签和元数据信息进行结合,验证所述云端存储数据的完整性,包括:
对所述证明信息进行解析;
从所述区块链检索出所述文件标签和元数据信息;
校验下述等式是否成立:
其中,g为生成元,K为公钥,Aj为用于执行数据完整性校验的元数据信息;
如果成立,则判定所述云端存储数据具有完整性;若不成立,则判定所述云端存储数据不具有完整性。
本发明实施例还提供了一种数据处理设备,包括处理器和存储器,其中,所述处理器执行所述存储器中存储的计算机程序时实现如本发明实施例提供的上述数据完整性审计方法。
本发明实施例还提供了一种计算机可读存储介质,用于存储计算机程序,其中,所述计算机程序被处理器执行时实现如本发明实施例提供的上述数据完整性审计方法。
从上述技术方案可以看出,本发明所提供的一种数据完整性审计方法,包括:将待上传的文件切割成不同的文件块;计算各文件块对应的文件标签和文件认证符;将文件认证符和文件发送至云端进行存储,同时将文件标签和元数据信息发送至区块链;依据区块链中的文件标签和元数据信息, 验证云端存储数据的完整性。
本发明提供的上述数据完整性审计方法,具有去密钥管理功能,可以在不持有数据拥有者私钥的前提下对云端数据完整性进行审计,不需要存储和维护任何密钥信息,消除了传统实现方案因需要维护中心化密钥管理中心而引入的单点故障和单点信任问题,更好地适配于去中心化的业务场景中,密钥维护成本低,此外本发明可以有效提升审计过程的透明性,具有较高的执行效率,相应的审计结果能够为存储日志、责任追溯等提供数据安全服务。
此外,本发明还针对数据完整性审计方法提供了相应的设备及计算机可读存储介质,进一步使得上述方法更具有实用性,该设备及计算机可读存储介质具有相应的优点。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了本发明实施例提供的数据完整性审计方法的流程图;
图2示出了本发明实施例提供的数据完整性审计方法的架构示意图。
具体实施方式
在设计适配于去中心化场景中的数据完整性审计方案时,需要解决的重要问题就是如何去除集中式的密钥分发中心,因为它可能会导致出现单点故障问题。另外一个需要解决的问题就是如何确保审计过程透明化,这样审计方无需持有数据所有者私钥信息,只需要利用公开信息就可以执行数据完整性审计。基于上述问题的考虑,本发明提供了一种数据完整性审计方法,剔除了密钥管理过程,而且支持公开可审计性。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进 行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明提供的数据完整性审计方法,如图1所示,包括以下步骤:
S101、将待上传的文件切割成不同的文件块。
需要说明的是,用户需要将自身文件发送至云端进行存储,用户可以直接将待上传的文件(即明文信息)上传至云端,也可以考虑到数据隐私,对待上传的文件进行加密,相应的密钥应由用户自己保留。对于该方式,即使用户丢失了上述密钥,也不会影响新方案的正常执行。
基于此,在具体实施时,上述步骤S101将待上传的文件切割成不同的文件块,具体可以包括:利用对称加密算法对待上传的文件进行加密,并将加密后的文件切割成不同的文件块;每个文件块具有设定大小的扇区。
具体地,用户在将自己的数据上传至云端之前,可以选择利用对称加密算法对待上传的文件进行加密,并秘密保存对应的密钥,然后,用户需要将加密后的文件切割成不同的文件块,每个文件块具有固定大小的扇区。
S102、计算各文件块对应的文件标签和文件认证符。
在具体实施时,可以采用下述公式计算各文件块对应的文件标签:
FT=n||s||Fs;
其中,FT为文件标签,n为文件块的数量,s为每个文件块的扇区数量,Fs为文件F的大小。
在具体实施时,可以采用下述公式计算各文件块对应的文件认证符:
其中,δi为第i个文件块对应的文件认证符,H1()为哈希函数,kprf为密钥,a1,...,aj,...,as为从模素数p的循环群随机选择的元素集,cij为加密后的文件块。
S103、将文件认证符和文件发送至云端进行存储,同时将文件标签和元数据信息发送至区块链。
需要说明的是,在本发明中,云端理论上可拥有无限的存储空间和计算资源。传统的数据存储系统,如直连方式存储(Direct Attached Storage,DAS)、网络附属存储(Network Attached Storage,NAS)和存储区域网络(Storage Area Network,SAN),均可用作云端存储。云端应及时响应用户存取数据的请求,并可以采用一些性能优化策略,例如SPDK(Storage Performance Development Kit)技术,来加速数据传输过程。为了及时发现云端数据被破坏,本发明能够审计云端数据的完整性。关于触发数据完整性审计动作,可以采用定时策略或者在系统空闲时自动执行。
区块链是由一组网络节点组成的分布式系统,能够验证和存储用户发送的交易数据。区块链具有防篡改和可信溯源等特性,能够确保链上数据可信。尽管当前存在一些威胁区块链系统安全的攻击手段,例如公有链平台上的51%算力攻击和DAO攻击,但依赖公有链优良的开源特性,相关开发人员能够及时更新系统安全补丁,确保区块链平台安全。这里假设采用的区块链平台是安全的,能够保证链上存储的数据不可篡改。
另外,需要说明的是,用户在上传文件时,需要生成数据完整性审计方法所需的一些密钥信息和元数据信息。这些元数据信息会上传至区块链端,而这些密钥信息随后会被用户删除,用户无需管理维护这些密钥信息。
在具体实施时,上述步骤S103将文件认证符和文件发送至云端进行存储,同时将文件标签和元数据信息发送至区块链,具体可以包括:将文件认证符和加密后的文件发送至云端进行存储,同时将文件标签以及其它元数据信息发送至区块链。
S104、依据区块链中的文件标签和元数据信息,验证云端存储数据的完整性。
需要指出的是,在本发明中,第三方审计(Third-party auditor,TPA)负责验证云端存储数据的完整性,其角色可由用户或可信第三方实体承担。本发明支持公开审计性,理论上允许任何不持有数据所有者私钥信息的实体均可以执行数据完整性审计操作,不需要依赖密钥生成中心来管理用户公私钥信息。
在具体实施时,上述步骤S104依据区块链中的文件标签和元数据信 息,验证云端存储数据的完整性,具体可以包括:担任TPA角色对云端发出挑战信息(challenge),以使云端根据挑战信息和本地存储数据,计算并反馈证明信息(proof);将证明信息与从区块链中的文件标签和元数据信息进行结合,验证云端存储数据的完整性。
在具体实施时,可以采用下述公式计算证明信息:
proof={U,σ};

U={u1,u2,...,us};

其中,proof为证明信息,Q为挑战信息,(i,vi)为挑战信息Q中的不同随机元素,vi为随机数,||vi||<||p||,l为挑战信息Q中随机元素的数量,集合U和集合σ组成了证明消息proof,uj为集合U中不同的随机元素。
在本发明实施例提供的上述数据完整性审计方法中,可以在不持有数据拥有者私钥的前提下对云端数据完整性进行审计,不需要存储和维护任何密钥信息,消除了传统实现方案因需要维护中心化密钥管理中心而引入的单点故障和单点信任问题,更好地适配于去中心化的业务场景中,密钥维护成本低,此外本发明可以有效提升审计过程的透明性,具有较高的执行效率,相应的审计结果能够为存储日志、责任追溯等提供数据安全服务。
图2给出了本发明实施例提供的上述数据完整性审计方法的架构示意图。如图2所示,本发明中可以有四个不同的实体:用户、区块链、TPA和云端。其中用户需要将自己数据上传到云端,而且需要确保云端自身数据的完整性。为保护数据隐私,用户可以利用对称加密算法对待上传的文件进行加密,并秘密保存对应的密钥。然后,用户需要将加密后的文件切割成不同的文件块,每个文件块具有固定大小的扇区。用户需要为这些文件块计算相应的文件标签和文件认证符,然后,再将文件认证符和加密后的文件发送至云端进行存储,将文件标签以及其它元数据信息发送至区块链。TPA负责验证云端用户数据的完整性,其角色可由用户或第三方实体 承担。在校验云端数据的完整性时,TPA首先对云端数据发出挑战信息。然后,云端收到挑战信息后,结合本地存储的数据计算证明信息,并将其发送至TPA。TPA收到证明信息后,结合从区块链端获取到的文件标签以及其它元数据信息,验证云端数据完整性。
进一步地,在具体实施时,在本发明实施例提供的上述数据完整性审计方法中,在对云端发出挑战信息之前,还可以包括:根据自身计算能力或预设条件确定待审计的数据量百分比;根据确定的数据量百分比和文件的大小,获取待发出的挑战信息中随机元素的数量。
进一步地,在具体实施时,在本发明实施例提供的上述数据完整性审计方法中,将证明信息与从区块链中的文件标签和元数据信息进行结合,验证云端存储数据的完整性,具体可以包括:对证明信息进行解析;从区块链检索出相应的文件标签和元数据信息;校验下述等式是否成立:
其中,g为生成元,K为公钥,Aj为用于执行数据完整性校验的元数据信息;
如果成立,则判定云端存储数据具有完整性;若不成立,则判定云端存储数据不具有完整性。
下面以一个实例对本发明实施例提供的上述数据完整性审计方法进行说明,具体主要分为六大步骤:
步骤一、执行Setup步骤,目的是输出系统公共参数。
具体地,随机选择一个大素数p,g为的生成元。Enc()是一个标准对称加密函数,例如可以为AES算法,Enc()的密钥为sk。另外,选择一个哈希函数
步骤二、执行DataProg步骤,对于待上传的文件F,用户需要对F进行加密,再将其分割成n个文件块,然后再计算得到文件标签。
具体地,用户首先为对称加密函数Enc()随机选择一个秘钥然后再对F进行加密进而得到将文件分割成n个文件块,每个文件块s个扇区。
为简化起见,本发明将标记为{cij}1≤i≤n,1≤j≤s。计算得到文件标签FT=n||s||Fs,其中,Fs代表文件F的大小。
步骤三、执行GenAuth步骤,给定FT和用户计算文件块对应的认证符集。
具体地,随机选择s个数值和一个密钥计算公钥
对于1≤j≤s,计算得到为简化起见,本发明定义A={Aj}1≤j≤s
对于1≤i≤n,计算本发明定义认证符集δ为{δi}1≤i≤n
将δ和上传至云端,而将{A,K}和FT上传至区块链上。用户从本地删除
步骤四、执行Challenge步骤,TPA可以根据自身计算能力或系统预设条件决定待审计的数据量百分比。例如,当系统空闲时,TPA可以增加待审计的数据量百分比r,0≤r≤1,否则,减少百分比r。TPA从区块链上检索出FT,然后选择一个包含l个不同随机元素(i,vi)的挑战集,其中i∈[1,n],||vi||<||p||,本发明将挑战集定义为然后TPA再将Q发送到云端。
步骤五、执行Response步骤,给定挑战集Q,云端计算得到相应的证明消息,以表明其持有数据是完整的,然后再将证明消息发送至TPA进行校验。
对于1≤j≤s,计算定义U={u1,u2,...,us}。
计算将proof={U,σ}发送至TPA进行完整性校验。
步骤六、执行Verification步骤,TPA利用云端发送过来的proof校验云端数据是否完整。
TPA首先需要对proof={U,σ}进行解析,然后从链上检索出对应的元素{A,K}和FT。
TPA校验等式是否成立。如果成立,输出校验结果true;否则输出false。
最后,将校验结果存储到区块链上,以便于后续进行审计。
相应地,本发明实施例还公开了一种数据处理设备,包括处理器和存储器;其中,处理器执行存储器中存储的计算机程序时实现前述实施例公开的数据完整性审计方法。关于上述方法更加具体的过程可以参考前述实施例中公开的相应内容,在此不再进行赘述。
进一步地,本发明还公开了一种计算机可读存储介质,用于存储计算机程序;计算机程序被处理器执行时实现前述公开的数据完整性审计方法。关于上述方法更加具体的过程可以参考前述实施例中公开的相应内容,在此不再进行赘述。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。对于实施例公开的装置、设备、存储介质而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及方法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现 不应认为超出本申请的范围。
结合本文中所公开的实施例描述的方法或方法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
综上,本发明实施例提供的一种数据完整性审计方法,包括:将待上传的文件切割成不同的文件块;计算各文件块对应的文件标签和文件认证符;将文件认证符和文件发送至云端进行存储,同时将文件标签和元数据信息发送至区块链;依据区块链中的文件标签和元数据信息,验证云端存储数据的完整性。上述数据完整性审计方法具有去密钥管理功能,可以在不持有数据拥有者私钥的前提下对云端数据完整性进行审计,不需要存储和维护任何密钥信息,消除了传统实现方案因需要维护中心化密钥管理中心而引入的单点故障和单点信任问题,更好地适配于去中心化的业务场景中,密钥维护成本低,此外本发明可以有效提升审计过程的透明性,具有较高的执行效率,相应的审计结果能够为存储日志、责任追溯等提供数据安全服务。此外,本发明还针对数据完整性审计方法提供了相应的设备及计算机可读存储介质,进一步使得上述方法更具有实用性,该设备及计算机可读存储介质具有相应的优点。
最后,还需要说明的是,在本文中,关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上对本发明所提供的数据完整性审计方法进行了详细介绍,本文中 应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims (10)

  1. 一种数据完整性审计方法,其特征在于,包括:
    将待上传的文件切割成不同的文件块;
    计算各所述文件块对应的文件标签和文件认证符;
    将所述文件认证符和所述文件发送至云端进行存储,同时将所述文件标签和元数据信息发送至区块链;
    依据所述区块链中的所述文件标签和元数据信息,验证所述云端存储数据的完整性。
  2. 根据权利要求1所述的数据完整性审计方法,其特征在于,所述依据所述区块链中的所述文件标签和元数据信息,验证所述云端存储数据的完整性,包括:
    担任TPA角色对所述云端发出挑战信息,以使所述云端根据所述挑战信息和本地存储数据,计算并反馈证明信息;
    将所述证明信息与从所述区块链中的所述文件标签和元数据信息进行结合,验证所述云端存储数据的完整性。
  3. 根据权利要求2所述的数据完整性审计方法,其特征在于,所述将待上传的文件切割成不同的文件块,包括:
    利用对称加密方法对待上传的文件进行加密,并将加密后的所述文件切割成不同的文件块;每个所述文件块具有设定大小的扇区;
    所述将所述文件认证符和所述文件发送至云端进行存储,包括:
    将所述文件认证符和加密后的所述文件发送至云端进行存储。
  4. 根据权利要求3所述的数据完整性审计方法,其特征在于,采用下述公式计算各所述文件块对应的文件标签:
    FT=n||s||Fs;
    其中,FT为所述文件标签,n为所述文件块的数量,s为每个所述文件块的扇区数量,Fs为所述文件F的大小。
  5. 根据权利要求4所述的数据完整性审计方法,其特征在于,采用下述公式计算各所述文件块对应的文件认证符:
    其中,δi为第i个所述文件块对应的文件认证符,H1()为哈希函数,kprf为密钥,a1,...,aj,...,as为从模素数p的循环群随机选择的元素集,cij为加密后的所述文件块。
  6. 根据权利要求5所述的数据完整性审计方法,其特征在于,采用下述公式计算所述证明信息:
    proof={U,σ};

    U={u1,u2,...,us};

    其中,proof为所述证明信息,Q为所述挑战信息,(i,vi)为所述挑战信息Q中的不同随机元素,vi为随机数,||vi||<||p||,l为所述挑战信息Q中随机元素的数量,集合U和集合σ组成了证明消息proof,uj为集合U中不同的随机元素。
  7. 根据权利要求6所述的数据完整性审计方法,其特征在于,在所述对所述云端发出挑战信息之前,还包括:
    根据自身计算能力或预设条件确定待审计的数据量百分比;
    根据确定的所述数据量百分比和所述文件的大小,获取待发出的挑战信息中随机元素的数量。
  8. 根据权利要求7所述的数据完整性审计方法,其特征在于,所述将所述证明信息与从所述区块链中的所述文件标签和元数据信息进行结合,验证所述云端存储数据的完整性,包括:
    对所述证明信息进行解析;
    从所述区块链检索出相应的所述文件标签和元数据信息;
    校验下述等式是否成立:
    其中,g为生成元,K为公钥,Aj为用于执行数据完整性校验的元数据信息;
    如果成立,则判定所述云端存储数据具有完整性;若不成立,则判定所述云端存储数据不具有完整性。
  9. 一种数据处理设备,其特征在于,包括处理器和存储器,其中,所述处理器执行所述存储器中存储的计算机程序时实现如权利要求1至8任一项所述的数据完整性审计方法。
  10. 一种计算机可读存储介质,其特征在于,用于存储计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至8任一项所述的数据完整性审计方法。
PCT/CN2023/124443 2022-10-24 2023-10-13 一种数据完整性审计方法、设备及存储介质 WO2024088082A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211302402.8A CN115604014A (zh) 2022-10-24 2022-10-24 一种数据完整性审计方法、设备及存储介质
CN202211302402.8 2022-10-24

Publications (1)

Publication Number Publication Date
WO2024088082A1 true WO2024088082A1 (zh) 2024-05-02

Family

ID=84849045

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/124443 WO2024088082A1 (zh) 2022-10-24 2023-10-13 一种数据完整性审计方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN115604014A (zh)
WO (1) WO2024088082A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604014A (zh) * 2022-10-24 2023-01-13 郑州师范学院(Cn) 一种数据完整性审计方法、设备及存储介质
CN117834303B (zh) * 2024-03-05 2024-05-28 南开大学 一种面向去中心化存储的数据审计方法

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111222176A (zh) * 2020-01-08 2020-06-02 中国人民解放军国防科技大学 基于区块链的云存储持有性证明方法、系统及介质
US20210124732A1 (en) * 2019-10-23 2021-04-29 Hewlett Packard Enterprise Development Lp Blockchain based distributed file systems
CN113158259A (zh) * 2021-04-29 2021-07-23 工银科技有限公司 区块链完整性验证方法及装置
US20210255993A1 (en) * 2020-02-19 2021-08-19 Tata Consultancy Services Limited System and method for blockchain based decentralized storage with dynamic data operations
CN113312574A (zh) * 2021-05-21 2021-08-27 太原科技大学 一种基于区块链的云数据完整性审计方法
CN113901528A (zh) * 2021-10-29 2022-01-07 博雅正链(北京)科技有限公司 基于区块链的云端数据完整性审计方法
CN114221976A (zh) * 2021-12-08 2022-03-22 中信银行股份有限公司 一种分布式云端数据完整性审计方法及系统
CN115604014A (zh) * 2022-10-24 2023-01-13 郑州师范学院(Cn) 一种数据完整性审计方法、设备及存储介质

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210124732A1 (en) * 2019-10-23 2021-04-29 Hewlett Packard Enterprise Development Lp Blockchain based distributed file systems
CN111222176A (zh) * 2020-01-08 2020-06-02 中国人民解放军国防科技大学 基于区块链的云存储持有性证明方法、系统及介质
US20210255993A1 (en) * 2020-02-19 2021-08-19 Tata Consultancy Services Limited System and method for blockchain based decentralized storage with dynamic data operations
CN113158259A (zh) * 2021-04-29 2021-07-23 工银科技有限公司 区块链完整性验证方法及装置
CN113312574A (zh) * 2021-05-21 2021-08-27 太原科技大学 一种基于区块链的云数据完整性审计方法
CN113901528A (zh) * 2021-10-29 2022-01-07 博雅正链(北京)科技有限公司 基于区块链的云端数据完整性审计方法
CN114221976A (zh) * 2021-12-08 2022-03-22 中信银行股份有限公司 一种分布式云端数据完整性审计方法及系统
CN115604014A (zh) * 2022-10-24 2023-01-13 郑州师范学院(Cn) 一种数据完整性审计方法、设备及存储介质

Also Published As

Publication number Publication date
CN115604014A (zh) 2023-01-13

Similar Documents

Publication Publication Date Title
Cui et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud
Yu et al. A view about cloud data security from data life cycle
WO2024088082A1 (zh) 一种数据完整性审计方法、设备及存储介质
JP2016509443A (ja) より低いエントロピーを有する入力レコードについて追加的セキュリティをもたらす検証システム及び方法
Lu et al. A Fine‐Grained IoT Data Access Control Scheme Combining Attribute‐Based Encryption and Blockchain
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
Luo et al. Enabling assured deletion in the cloud storage by overwriting
Tian et al. Enabling public auditability for operation behaviors in cloud storage
Mo et al. Two-party fine-grained assured deletion of outsourced data in cloud systems
CN109245894A (zh) 一种基于智能合约的分布式云存储系统
WO2020140626A1 (zh) 基于盐值的数据持有性验证方法及终端设备
CN114244508B (zh) 数据加密方法、装置、设备及存储介质
CN102340500B (zh) 可信计算平台安全管理系统及安全管理方法
CN105471901A (zh) 一种工业信息安全认证系统
Kumar et al. TPA auditing to enhance the privacy and security in cloud systems
US20230275759A1 (en) Method and system of encoding data over distributed networks and method of assuring integrity of data transmission between sender and receiver in a communication system
CN107919970A (zh) 一种安全运维服务云平台的日志管理实现方法及系统
CN115865320A (zh) 一种基于区块链的安全服务管理方法及系统
Liu et al. Data integrity audit scheme based on quad Merkle tree and blockchain
Xu et al. FileDES: A Secure Scalable and Succinct Decentralized Encrypted Storage Network
Ramprasath et al. Protected data sharing using attribute based encryption for remote data checking in cloud environment
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
CN113591103A (zh) 一种电力物联网智能终端间的身份认证方法和系统
Abo-Alian et al. Auditing-as-a-service for cloud storage
Li Secured cloud storage scheme based on blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23881661

Country of ref document: EP

Kind code of ref document: A1