[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105138478B - A kind of memory integrity protection method of non-equilibrium Hash tree - Google Patents

A kind of memory integrity protection method of non-equilibrium Hash tree Download PDF

Info

Publication number
CN105138478B
CN105138478B CN201510451102.XA CN201510451102A CN105138478B CN 105138478 B CN105138478 B CN 105138478B CN 201510451102 A CN201510451102 A CN 201510451102A CN 105138478 B CN105138478 B CN 105138478B
Authority
CN
China
Prior art keywords
data
block
tree
data block
counter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510451102.XA
Other languages
Chinese (zh)
Other versions
CN105138478A (en
Inventor
张国印
郭振华
姚念民
石翠华
吴艳霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201510451102.XA priority Critical patent/CN105138478B/en
Publication of CN105138478A publication Critical patent/CN105138478A/en
Application granted granted Critical
Publication of CN105138478B publication Critical patent/CN105138478B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to memory completeness check field, specially a kind of memory integrity protection method of non-equilibrium Hash tree.The present invention includes:(1) it initializes;(2) non-equilibrium binary tree is built;(3) write operation;(4) read operation.Under normal circumstances, verification cost will be less than the verification cost of common balanced binary tree to this method, even if in the worst cases, the performance of this method will not be higher than the verification cost of common balanced binary tree, but identical as its verification cost.The present invention shortens path length when data authentication on the whole.

Description

A kind of memory integrity protection method of non-equilibrium Hash tree
Technical field
The present invention relates to memory completeness check field, specially a kind of memory integrity of non-equilibrium Hash tree Guard method.
Technical background
With the development of science and technology, computer application is more and more universal, since the data of computer disposal can be related to very much Secret, thus it is guaranteed that computer handle these data safety at current research hot spot.The safety of data includes Confidentiality and integrity.The present invention pertains only to how to ensure the integrality of data herein.Attacker can be to flowing in bus Data cheated, recombinated, Replay Attack.Integrity protection seeks to guarantee to detect that attacker implements data Malice tampering, such as hardware piggyback attack.Focus on protection information to be allowed to from Replay Attack.Replay Attack refers to attacking The person of hitting replaces the data being previously stored in some address location present data.Replay Attack is taken precautions against at present mainly by making With tree-like verification scheme.According to authentication unit use method with structure tree process difference, and can be divided into Merkle Tree, Parallel check tree PAT tri- kinds of schemes of tree and TEC-Tree.
Merkle Tree are also known as Hash Tree, are a kind of tree mechanism being used for completeness check earliest.Existed by Merkle It is proposed the effective computational problem being mainly used in public key cryptosyst within 1980.Memory content is used it for after Blum et al. modifications In completeness check.It establishes one tree by being iterated Hash calculation to internal storage data block, on CPU preserve root node from And may insure the integrality of data, it can especially resist Replay Attack.The disadvantage is that data block is unable to parallel computation when updating, Therefore postpone bigger.Parallel check tree PAT is proposed for this disadvantage, when carrying out Hash calculation every time due to this method all A corresponding random number, the calculating of higher node are not directly dependent on level node, and upper layer node is by by the random of child node MAC is calculated after number connection, therefore parallel computation when it realizes data update.But Merkle Tree and PAT trees are merely able to Ensure the integrality of data, i.e. their integrity protection and Confidentiality protection scheme is separated, is proposed for this disadvantage TEC-Tree, it also ensures the machine of data by adding redundant data into data while guaranteeing data integrity Close property.
A common feature for these three trees is that the tree that they are established all is balanced tree, the verification path of all data blocks Length is all identical.Although caching Hash tree CHTree has been proposed, the section top node of Merkle Tree is stored in slow In depositing, although this method can effectively shorten check length, the high data block low with access frequency of access frequency It is still identical to verify path length, therefore delay is still very big when average apparently data block progress Hash calculation.
Invention content
The purpose of the present invention is to provide a kind of non-equilibrium Kazakhstan for shortening the average verification path length of leaf node in tree The memory integrity protection method of uncommon tree.
The object of the present invention is achieved like this:
(1) it initializes
(1.1) memory is divided into the data block data_block&#91 of same size;i], there are one counters for each data block counter[i]To record the read/write number to the data block;When initial, counter[i]=0, when processor reads and writes data block data_block[i]When, Counter Value counter[i]=counter[i]+1;Block data structure uses 3 linked list types:
(1.2) a timer Time is set;After timer reaches the time of setting, a non-equilibrium y-bend is built Tree, while the counter counter of all data block data_block is all reset, it counts again;
(2) non-equilibrium binary tree is built
(2.1) using the read/write number of n data block in memory as weights, then n weights { w is obtained1,w2,w3,w4, w5,……wn, each weights constitute a tree T for there was only root nodei, then the set F={ T of n tree are obtained1,T2,T3,T4, T5,……Tn};
(2.2) two minimum tree T of weights are chosen from set FiAnd Tj, a new tree T is built as left and right child, The weights of new tree T nodes are two child nodes weights sums;T is deleted from set FiAnd Tj, and tree T is added in set F;
(2.3) step (2.2) is repeated, until only remaining one tree in set F;
(3) write operation
(3.1) when CPU is to memory writing data blocks data_block[i]When, refresh counter counter[i]= counter[i]+1;
(3.2) data block data_block&#91 is found;i]Corresponding leaf node pointer;
(3.3) data block corresponding to data block and sibling is connected, the Hash after data block connection is recalculated Value hash updates the cryptographic Hash of father node, repeats (3.1)-(3.3) until root node;
(3.4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non- Hash tree is balanced, otherwise, write operation terminates;
(4) read operation
(4.1) as CPU rdma read data blocks data_block[i]When, update its counter counter[i]= counter[i]+1;
(4.2) data block data_block&#91 is found;i]Corresponding leaf node pointer;
(4.3) data block corresponding to data block and sibling is connected, the Hash after data block connection is then calculated Value hash is compared Hash result with the cryptographic Hash of father node, repeats this process until root node, if last calculate Root node cryptographic Hash it is identical as the cryptographic Hash of the root node stored in CPU, then illustrate that data are correct, do not usurped Change, CPU can use data;Conversely, then illustrating that data are tampered, and send out alarm;
(4.4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non- Hash tree is balanced, otherwise, read operation terminates.
The beneficial effects of the present invention are:
The present invention shortens path length when data authentication on the whole.
During building non-equilibrium binary tree, it may appear that 3 kinds of situations, the first is the general feelings enumerated in attached drawing 1 Condition, in this case, it has proved that, methods herein is smaller than the common balanced binary tree check length that is averaged.Except general feelings Outside condition, two kinds of extreme cases are there is also during building non-equilibrium binary tree, are respectively:
(1) tree of structure is identical with original balanced binary tree.In this case their verification cost is identical.
(2) the non-equilibrium binary tree built is single branch binary tree.The verification cost of non-equilibrium binary tree in this case It is less than the verification cost of common balanced binary tree.
In conclusion this method is under normal circumstances, verification cost will be less than the verification cost of common balanced binary tree, Even if in the worst cases, the performance of this method will not be higher than common balanced binary tree verification cost, but with it It is identical to verify cost.
Description of the drawings
Fig. 1 is balanced binary tree and non-equilibrium binary tree.
Fig. 2 is to build non-equilibrium binary tree step.
Fig. 3 is that data step is written into memory.
Fig. 4 is that data step is read from memory.
Specific implementation mode
The present invention is described further below in conjunction with the accompanying drawings.
The present invention relates to memory completeness check fields, are a kind of non-equilibrium Hash trees based on principle of locality Memory integrity protection method.Replay Attack in order to prevent mostly uses greatly the integrality of tree construction protection data at present.At present The tree used is all balance N-ary tree, and level of all leaf nodes in tree is all identical, i.e., the verification path of all data blocks Length is identical.According to the principle of locality of program, certain data access frequencies are high whithin a period of time, certain some data is visited Ask that frequency is low.Therefore the present invention is improved Hash tree, establishes a non-equilibrium binary tree, the section for keeping those access frequencys high Point is close from root node, and the node for keeping those access frequencys low is remote from root node.The high Data block check path of access frequency in this way It is short, the low Data block check path length of access frequency.Path is verified to shorten on the whole, reduces delay.
In order to shorten the average verification path length of leaf node in tree, the present invention proposes a kind of depositing for non-equilibrium Hash tree Reservoir completeness protection method.According to the principle of locality of program, the access frequency of data whithin a period of time in memory is Different, the access frequency of some data wants high, and the access frequency of some data wants low.Therefore, method proposed by the present invention It is to establish a non-equilibrium binary tree, the very high data block of those nearest access frequencys is placed on the place close from root node, phase Instead, those data blocks being not frequently used are placed on the place remote from root node.Shorten the average verification path length of data block. (number wherein on leaf node is access times) as shown in Fig. 1.
The present invention is divided into memory the data block data_block&#91 of same size;i], and set for each data block Set a counter counter[i], for recording the read/write number to data block.It is deposited while storing data block in memory The pointer of corresponding leaf node is stored up, leaf node is the cryptographic Hash of data block.One timer Time is set, timer is worked as After Time reaches setting time, non-equilibrium Hash tree is built using the cryptographic Hash of internal storage data block as leaf node, it is mobile every time When leaf node, to change the pointer of corresponding leaf node, and retain the root node of the Hash tree in CPU, for complete Property verification.
The concrete operations for building non-equilibrium Hash tree are as follows:
(1) using the read/write number of n data block in memory as weights, then n weights { w is obtained1,w2,w3,w4, w5,……wn, each weights constitute a tree T for there was only root nodei, then the set F={ T of n tree are obtained1,T2,T3,T4, T5,……Tn}。
(2) two minimum tree T of weights are chosen from set FiAnd Tj, built using them as left and right child one it is new T is set, the new weights for setting T nodes are two child nodes weights sums.T is deleted from set FiAnd Tj, and set F is added in tree T In.
(3) step (2) is repeated, until only remaining one tree in set F.
When processor into memory writing data blocks data_block[i]When, update the data the access times counter of block [i]With entire Hash tree.Specific operation is as follows:
(1) when CPU is to memory writing data blocks data_block[i]When, update its counter counter[i]= counter[i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to data block and sibling is connected, the cryptographic Hash after data block connection is recalculated Hash updates the cryptographic Hash of father node, repeats this process until root node.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, write operation terminates.
When processor reads data block data_block&#91 from memory;i]When, update its counter counter[i], simultaneously Integrity check is carried out to data.Specific operation is as follows:
(1) as CPU rdma read data blocks data_block[i]When, update its counter counter[i]=counter [i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to data block and sibling is connected, the cryptographic Hash after data block connection is then calculated Hash is compared Hash result with the cryptographic Hash of father node, repeats this process until root node, if finally calculate The cryptographic Hash of root node is identical as the cryptographic Hash of the root node stored in CPU, then illustrates that data are correct, be not tampered with, CPU can use data;Conversely, then illustrating that data are tampered, and send out alarm.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, read operation terminates.
Cum rights check length (the sum of the cum rights check lengths of all leaf nodes in tree) using tree compares as performance Standard, indicated with WPL, i.e.,Wherein weight wiFor the read/write number of each leaf node, liFor The check length of leaf node, i.e. path top set number.N is the number of node.
According to the read-write frequency of data block, rather than number is read and write to rebuild Hash tree.
It is first provided before introducing present disclosure defined below:
Weights:The read/write number of data block, is indicated with w.
The cum rights check length of node:The product weighed on check length and node between node to root vertex is used WPL expressions, i.e. WPLi=wi*Ii
The cum rights check length of tree:The sum of the cum rights check length of all leaf nodes, is indicated, i.e., with WPL in tree
Memory is divided into the data block data_block&#91 of same size;i], and it is arranged one for each data block Counter counter[i], for recording the read/write number to data block.Storage is corresponding while storing data block in memory Leaf node pointer, leaf node be data block cryptographic Hash.One timer Time is set, when timer Time is reached After setting time, non-equilibrium Hash tree is built using the cryptographic Hash of internal storage data block as leaf node, moves leaf node every time When, to change the pointer of corresponding leaf node, and retain the root node of the Hash tree in CPU, be used for completeness check.
When building non-equilibrium Hash tree, according to n given weights { w1,w2,w3,w4,w5,……wn, every time from centre The data block for selecting two weights minimums, using them as the left and right subtree of binary tree, the weights of father node are weighed for child nodes The sum of value, while the knot removal for the two weights minimum selected, this newly-generated binary tree is added as new tree Enter into above-mentioned set.It repeats the above process, until there was only one tree.
Memory integrity checking method is realized by following procedure:
1) it initializes
(1) memory is divided into the data block data_block&#91 of same size;i], there are one counters for each data block counter[i]To record the read/write number to the data block.When initial, counter[i]=0, when processor reads and writes data block data_block[i]When, its Counter Value counter[i]=counter[i]+1.
(2) data structure uses 3 linked list types, as follows:
Node
{
long int counter;// read/write number, the weights as data block
long int hash;// cryptographic Hash
Struct node*lchild;// left child
Struct node*rchild;// right child
Struct node*parent;// father node
}node;
(3) a timer Time is set.After timer reaches the time of setting, a non-equilibrium binary tree is built, The counter counter of all data block data_block is all reset simultaneously, them is made to count again.
2) non-equilibrium binary tree is built
The flow that processor builds non-equilibrium binary tree is as shown in Fig. 2, and concrete operations are as follows:
(1) using the read/write number of n data block in memory as weights, then n weights { w is obtained1,w2,w3,w4, w5,……wn, each weights constitute a tree T for there was only root nodei, then the set F={ T of n tree are obtained1,T2,T3,T4, T5,……Tn}。
(2) two minimum tree T of weights are chosen from set FiAnd Tj, built using them as left and right child one it is new T is set, the new weights for setting T nodes are two child nodes weights sums.T is deleted from set FiAnd Tj, and set F is added in tree T In.
(3) step (2) is repeated, until only remaining one tree in set F.
3) write operation
When processor into memory writing data blocks data_block[i]When, update the data the access times counter of block [i]With entire Hash tree.The flow that processor carries out memory write operation is as shown in Fig. 3, and specific operation is as follows:
(1) when CPU is to memory writing data blocks data_block[i]When, update its counter counter[i]= counter[i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to data block and sibling is connected, the cryptographic Hash after data block connection is recalculated Hash updates the cryptographic Hash of father node, repeats this process until root node.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, write operation terminates.
4) read operation
When processor reads data block data_block&#91 from memory;i]When, update its counter counter[i], simultaneously Integrity check is carried out to data.The flow that processor carries out memory read operation is as shown in Fig. 4, and specific operation is such as Under:
(1) as CPU rdma read data blocks data_block[i]When, update its counter counter[i]=counter [i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to data block and sibling is connected, the cryptographic Hash after data block connection is then calculated Hash is compared Hash result with the cryptographic Hash of father node, repeats this process until root node, if finally calculate The cryptographic Hash of root node is identical as the cryptographic Hash of the root node stored in CPU, then illustrates that data are correct, be not tampered with, CPU can use data;Conversely, then illustrating that data are tampered, and send out alarm.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, read operation terminates.
Here is the specific implementation content of the present invention:
The content of present invention realizes algorithm content proposed by the invention using simulator SimpleScalar tool, below The specific implementation pseudocode of each step algorithm is introduced respectively.
1, non-equilibrium binary tree is built
The flow that processor builds non-equilibrium binary tree is as shown in Fig. 2, and concrete operations are as follows:
(1) using the read/write number of n data block in memory as weights, then n weights { w is obtained1,w2,w3,w4, w5,……wn, each weights constitute a tree T for there was only root nodei, then the set F={ T of n tree are obtained1,T2,T3,T4, T5,……Tn}。
(2) two minimum tree T of weights are chosen from set FiAnd Tj, built using them as left and right child one it is new T is set, the new weights for setting T nodes are two child nodes weights sums.T is deleted from set FiAnd Tj, set T and be added in set F.
(3) step (2) is repeated, until only remaining one tree in set F.
The specific implementation code of non-equilibrium binary tree is built as shown in algorithm 1.
2, data are written into memory
When processor into memory writing data blocks data_block[i]When, update the data the access times counter of block [i]With entire Hash tree.The flow that processor carries out memory write operation is as shown in Fig. 3, and specific operation is as follows:
(1) when CPU is to memory writing data blocks data_block[i]When, update its counter counter[i]= counter[i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to this data block and sibling is attached, recalculates data block and connects it Cryptographic Hash hash afterwards updates the cryptographic Hash of father node, repeats this process until root node.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, write operation terminates.
Specific implementation process into memory when one data block of write-in is as shown in algorithm 2.
3, data are read from memory
When processor reads data block data_block&#91 from memory;i]When, update its counter counter[i], simultaneously Integrity check is carried out to data.The flow that processor carries out memory read operation is as shown in Fig. 4, and specific operation is such as Under:
(1) data block data_block&#91 is read from memory as CPU;i]When, update its counter counter[i]= counter[i]+1。
(2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer.
(3) data block corresponding to this data block and sibling is attached, then calculates data block and connects it Cryptographic Hash hash afterwards is compared Hash result with the cryptographic Hash of father node, repeats this process until root node, such as The cryptographic Hash of root node after fruit finally calculating is identical as the Hash result of the root node stored on CPU, then illustrates that data are just True, it is not tampered with, CPU can use data;Conversely, then illustrating that data are tampered, and send out alarm.
(4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-flat Weigh Hash tree, and otherwise, read operation terminates.
Specific implementation process from memory when one data block of reading is as shown in algorithm 3.

Claims (1)

1. a kind of memory integrity protection method of non-equilibrium Hash tree, which is characterized in that include the following steps:
1) it initializes
(1.1) memory is divided into the data block data_block&#91 of same size;i], there are one counters for each data block counter[i]To record the read/write number to the data block;When initial, counter[i]=0, when processor reads and writes data block data_block[i]When, its Counter Value counter[i]=counter[i]+1;
(1.2) data structure uses 3 linked list types, as follows:
Node
{
long int counter;// read/write number, the weights as data block
long int hash;// cryptographic Hash
Struct node*lchild;// left child
Struct node*rchild;// right child
Struct node*parent;// father node
}node;
(1.3) a timer Time is set;After timer reaches the time of setting, a non-equilibrium binary tree is built, together When the counter counter of all data block data_block is all reset, so that them is counted again;
The present invention realizes proposed algorithm content using simulator SimpleScalar tool, introduces each separately below The specific implementation pseudocode of step algorithm;
2) non-equilibrium binary tree is built
Processor builds the flow of non-equilibrium binary tree, and concrete operations are as follows:
(2.1) using the read/write number of n data block in memory as weights, then n weights { w is obtained1,w2,w3,w4,w5,…… wn, each weights constitute a tree T for there was only root nodei, then the set F={ T of n tree are obtained1,T2,T3,T4,T5,…… Tn};
(2.2) two minimum tree T of weights are chosen from set FiAnd Tj, a new tree is built using them as left and right child T, the new weights for setting T nodes are two child nodes weights sums;T is deleted from set FiAnd Tj, set T and be added in set F;
(2.3) step (2.2) is repeated, until only remaining one tree in set F;
The specific implementation code of non-equilibrium binary tree is built as shown in algorithm 1;
Algorithm 1:Build non-equilibrium binary tree algorithm
Input:Data block node data_block[n]
Output:Non-equilibrium binary tree T
Algorithm description:
3) data are written into memory
When processor into memory writing data blocks data_block[i]When, update the data the access times counter&#91 of block;i] With entire Hash tree;Processor carries out memory the flow of write operation, and specific operation is as follows:
(3.1) when CPU is to memory writing data blocks data_block[i]When, update its counter counter[i]= counter[i]+1;
(3.2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer;
(3.3) data block corresponding to this data block and sibling is attached, recalculate data block connection after Cryptographic Hash hash, update the cryptographic Hash of father node, repeat this process until root node;
(3.4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-equilibrium Hash tree, otherwise, write operation terminate;
Specific implementation process into memory when one data block of write-in is as shown in algorithm 2;
Algorithm 2:Data block algorithm is write into memory
Input:Data block node data_block[n], leaf node array of pointers node[n], set F
Output:Binary tree T in F
Algorithm description:
4) data are read from memory
When processor reads data block data_block&#91 from memory;i]When, update its counter counter[i], while logarithm According to progress integrity check;The detailed process that processor carries out memory read operation is as follows:
(4.1) data block data_block&#91 is read from memory as CPU;i]When, update its counter counter[i]= counter[i]+1;
(4.2) and then data block data_block&#91 is found;i]Corresponding leaf node pointer;
(4.3) data block corresponding to this data block and sibling is attached, then after the connection of calculating data block Cryptographic Hash hash, Hash result is compared with the cryptographic Hash of father node, repeat this process until root node, if The cryptographic Hash of root node after finally calculating is identical as the Hash result of the root node stored on CPU, then illustrates that data are correct , it is not tampered with, CPU can use data;Conversely, then illustrating that data are tampered, and send out alarm;
(4.4) it checks whether timer Time reaches setting time, if having arrived at setting time, re-establishes non-equilibrium Hash tree, otherwise, read operation terminate;
Specific implementation process from memory when one data block of reading is as shown in algorithm 3;
Algorithm 3:Data block algorithm is read from memory
Input:Data block node data_block[n], leaf node array of pointers node[n], set F
Output:Binary tree T in F
Algorithm description:
CN201510451102.XA 2015-07-28 2015-07-28 A kind of memory integrity protection method of non-equilibrium Hash tree Active CN105138478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510451102.XA CN105138478B (en) 2015-07-28 2015-07-28 A kind of memory integrity protection method of non-equilibrium Hash tree

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510451102.XA CN105138478B (en) 2015-07-28 2015-07-28 A kind of memory integrity protection method of non-equilibrium Hash tree

Publications (2)

Publication Number Publication Date
CN105138478A CN105138478A (en) 2015-12-09
CN105138478B true CN105138478B (en) 2018-10-26

Family

ID=54723831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510451102.XA Active CN105138478B (en) 2015-07-28 2015-07-28 A kind of memory integrity protection method of non-equilibrium Hash tree

Country Status (1)

Country Link
CN (1) CN105138478B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3442160A1 (en) * 2017-08-07 2019-02-13 Siemens Aktiengesellschaft Pruning of authentication trees
CN109428822B (en) * 2017-09-01 2020-10-09 华为技术有限公司 Name searching method and network equipment
US10866963B2 (en) * 2017-12-28 2020-12-15 Dropbox, Inc. File system authentication
CN108595980B (en) * 2018-05-02 2023-01-24 广州品唯软件有限公司 Method and device for protecting commodity traceability information
CN109495446B (en) * 2018-10-02 2020-12-22 复旦大学 Order-preserving encryption algorithm based on balanced ordering tree storage structure
CN109445763B (en) * 2018-10-25 2022-02-01 长沙新弘软件有限公司 Unbalanced binary tree construction method based on binary boundary value calculation
CN111898164B (en) * 2020-07-02 2024-03-29 武汉纺织大学 Data integrity auditing method supporting label block chain storage and query
CN112651054B (en) * 2020-12-30 2022-10-14 海光信息技术股份有限公司 Memory data integrity protection method and device and electronic equipment
CN113111391B (en) * 2021-04-09 2022-07-08 支付宝(杭州)信息技术有限公司 Method for memory integrity protection and memory controller

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853190A (en) * 2010-06-04 2010-10-06 华中科技大学 Data integrity verification method suitable for embedded processor
CN101976322A (en) * 2010-11-11 2011-02-16 清华大学 Safety metadata management method based on integrality checking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578116B2 (en) * 2006-03-28 2013-11-05 Broadcom Corporation System and method for memory data protection with secure pad memory

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853190A (en) * 2010-06-04 2010-10-06 华中科技大学 Data integrity verification method suitable for embedded processor
CN101976322A (en) * 2010-11-11 2011-02-16 清华大学 Safety metadata management method based on integrality checking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《非对称hash树存储器完整性保护方法》;马海峰等;《小型微型计算机系统》;20141031;第35卷(第10期);第2341-2346页 *

Also Published As

Publication number Publication date
CN105138478A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN105138478B (en) A kind of memory integrity protection method of non-equilibrium Hash tree
JP6804668B2 (en) Block data validation method and equipment
Stefanov et al. Iris: A scalable cloud file system with efficient integrity checks
Goodrich et al. Invertible bloom lookup tables
ES2837476T3 (en) Methods and apparatus for a distributed database within a network
Goodrich et al. Oblivious RAM simulation with efficient worst-case access overhead
JP2022110150A (en) Blockchain implemented counting system and method for use in secure voting and distribution
CN103136243B (en) File system duplicate removal method based on cloud storage and device
TW202037108A (en) System and method for parallel-processing blockchain transactions
CN105022968B (en) A kind of integrity checking method of internal storage data
JP2020513176A5 (en)
US10733061B2 (en) Hybrid data storage system with private storage cloud and public storage cloud
US20210049715A1 (en) Blockchain-based data procesing method, apparatus, and electronic device
TW202101248A (en) Hierarchical storage method and device based on block chain and electronic equipment
US9749418B2 (en) Efficient dynamic proofs of retrievability
JP2018018348A (en) System for creating block chain, and program
Huang et al. Outsourced private information retrieval
CN104778123A (en) Method and device for detecting system performance
CN106991148A (en) It is a kind of to support the full database authentication system and method for updating operation
Qiao et al. Lightweight integrity auditing of edge data for distributed edge computing scenarios
CN110419029A (en) The method of data content is partially updated in distributed storage network
CN106612274A (en) Homogeneity-based shared data verification algorithm in cloud computing
US9876638B2 (en) System and method for compressed level-ordered edge sequence encoding
CN112181790A (en) Capacity statistical method and system of storage equipment and related components
CN117111854A (en) Data storage method, device and medium based on distributed encryption storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant