CN105787389B - Cloud file integrality public audit evidence generation method and public audit method - Google Patents
Cloud file integrality public audit evidence generation method and public audit method Download PDFInfo
- Publication number
- CN105787389B CN105787389B CN201610118988.0A CN201610118988A CN105787389B CN 105787389 B CN105787389 B CN 105787389B CN 201610118988 A CN201610118988 A CN 201610118988A CN 105787389 B CN105787389 B CN 105787389B
- Authority
- CN
- China
- Prior art keywords
- evidence
- file
- files
- blocks
- audit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1737—Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of cloud file integrality public audit evidence generation method and public audit method, cloud file integrality public audit evidence generation method includes:It is blocks of files by cloud file division;Generate public audit label;Scramble file block sequence generates the signature evidence of each blocks of files in out of order file to obtain blocks of files signature evidence set to form out of order file;Binary tree structure is used sequentially to store the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file to obtain public audit Hash binary tree;Generate public audit order-preserving evidence;Public audit label, blocks of files signature evidence set, public audit order-preserving evidence and out of order file are uploaded to Cloud Server;When the parameter of upload is effective, cloud file is generated according to public audit label and stores outsourcing evidence.Cloud file integrality public audit evidence generation method and public audit method provided by the invention, audit number is unlimited, can ensure that data privacy, and prevents to inscribe for interrogation.
Description
Technical field
The present invention relates to cloud storage technical fields, and in particular to a kind of cloud file integrality public audit evidence generation method
And public audit method.
Background technology
For most of entity and individual, data are continuously all being generated daily, the storage of data becomes necessary
In face of the problem of.The appearance of cloud computing provides a feasible solution to this problem:It utilizes " storage services "
By file with outsourcing form storage to Cloud Server, such file being stored in Cloud Server is referred to as cloud service delivery mode
For cloud file.When needing to analyze and handle outer bag data, the file download of needs can be carried out to local, it can also be direct
The evaluation work of analyzing processing file is contracted out to Cloud Server.Resource in the form of resource pool concentrate and with method of service
Resource is supplied to the cloud computing mode of user, eliminates many troubles of user management data so that user only needs to pay close attention to
The business of oneself brings huge convenience and benefit to user.
While data storage is contracted out to cloud service provider and brings many benefits to entity and individual, many peaces are also brought
Full problem, one of safety problem, which is exactly cloud service provider, may distort the data of outsourcing storage beyond the clouds.It prevents from counting
It is that integrality audit is carried out to cloud file according to the main method being tampered, auditor can be data owner, can also
It is third party.Done if integrality audit work is mainly come in person by data owner, it is desirable that data owner it is often online and
And its terminal has stronger computing capability, is brought compared with burden to the owner.Better way is that integrality is audited
Be contracted out to third party, the special third-party server general moment for providing integrality auditing service is online and computing capability compared with
By force.But integrality audit is contracted out to third party and also brings along some problems, main problem includes computationally intensive, memory space
It is required that more, bandwidth consumption is serious and privacy compromise.
For Completeness Design outsourcing problems faced, some solutions are proposed in the prior art.But these schemes
Existing main problem includes:Number of auditing is limited, once number is finished, can not just audit;Need auditing party's storage unit score
According to;Dynamic is not supported to update;It is inscribed in the presence of for interrogation, i.e., substitutes target Audit data with other data.
Invention content
It is to be solved by this invention be cloud file integrality audit audit number it is limited, need auditing party's storage unit score
According to, do not support dynamic update, there is a problem of generation examine.
The present invention is achieved through the following technical solutions:
A kind of cloud file integrality public audit evidence generation method, including:It is blocks of files by cloud file division;It generates public
Meter label is sat at session, the public audit label includes the identification identifier of cloud file owners, the filename of cloud file, blocks of files
Quantity and random number;Scramble file block sequence generates the signature of each blocks of files in out of order file to form out of order file
Evidence is to obtain blocks of files signature evidence set;The group that each blocks of files in out of order file is sequentially stored using binary tree structure is breathed out
The cryptographic Hash of uncommon value is to obtain public audit Hash binary tree;Generate public audit order-preserving evidence, the public audit order-preserving card
According to including integrality signature evidence and the public audit Hash binary tree;By the public audit label, the blocks of files label
Name evidence set, the public audit order-preserving evidence and out of order file are uploaded to Cloud Server and are stored;Cloud Server is tested
Demonstrate,proving the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order file is
It is no effective;In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and unrest
When preface part is effective, Cloud Server generates cloud file according to the public audit label and stores outsourcing evidence, and by the cloud
File storage outsourcing evidence returns to cloud file owners and preserves.
Based on the public audit evidence that above-mentioned cloud file integrality public audit evidence generation method is generated, the present invention is also
A kind of cloud file integrality public audit method is provided, including:
The public audit label of audit document is asked to Cloud Server;
Whether the public audit label for verifying audit document is effective;
When the public audit label of audit document is effective, r sequence is randomly choosed from the blocks of files serial number of audit document
Number configuration file block serial number set { k1,…,kr, and it is random for each element corresponding selection one in blocks of files serial number set
Number is to form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, n are the file block number of audit document
Amount, kiFor i-th of element in blocks of files serial number set,For the corresponding random number of i-th of element in blocks of files serial number set, i
For positive integer;
After receiving challenge request, Cloud Server according toGenerate data integrity evidence, wherein
ProofchalFor the data integrity evidence,H()
For the hash function by character string maps to multiplicative cyclic group G, G is the multiplicative cyclic group that rank is Big prime p,For audit text
Serial number k in the out of order file of partiBlocks of files,Adjoint manifold, Sigα(H (R)) is the complete of audit document
Whole property signature evidence, NPATF'Cryptographic Hash for all node storages in the public audit Hash binary tree by audit document is all set
For empty null value Hash binary tree, h'() it is by character string maps to addition cyclic group ZpHash function,For audit document
Out of order file in serial number kiBlocks of files signature evidence;
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited
Public audit Hash binary tree the corresponding cryptographic Hash of root node, wherein it is fixed that h (), which is by random length character string maps,
The hash function of long character string;
Judge e (H (R'), v)=e (Sigα(H (R)), g) it is whether true, wherein and e is bilinear map, and R' is audit text
The corresponding cryptographic Hash of root node of the public audit Hash binary tree of part, the generation member that g is multiplicative cyclic group G, v is cloud file institute
The bilinearity public signature key for the person of having;
In e (H (R'), v)=e (Sigα(H (R)), g) set up when, judgeIt is
No establishment, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking, otherwise
Judge that audit document does not pass through integrity checking.
Compared with prior art, the present invention having the following advantages and advantages:
1, the evidence due to real data and for auditing is stored in cloud, thus auditing party is any without preserving
Data;
2, existing auditing method is to preset limited several evidences at random in cloud file, and evidence is once used will
Exposure, can not reuse, therefore each evidence is used only once, and has several evidences to be just able to validate only several times.And the present invention carries out
Auditing party can't be directly returned to by examining calender file block evidence, and there is no the problems of evidence exposure, it is only necessary to know blocks of files
Quantity can carry out the file that outsourcing is stored in the cloud the audit of unlimited number;
3, since the evidence of audit is generated based on blocks of files, after being operated to blocks of files, the evidence of audit carries out phase
It should change, thus support the dynamic update of file data;
What 4, blocks of files stored in cloud is out of order so that cloud service provider can not restore file so that also can not public audit side
Know the practical serial number of institute's Audit data block and the blocks of files actual order of configuration file, it is thus possible to ensure the privacy of data
Property;
5, public audit order-preserving evidence so that each blocks of files must sit in the right seat when audit, if cloud service provider
It plays tricks, substitutes audit aim blocks of files with other blocks of files, can not be verified by order-preserving, i.e. e (H (R'), v)=e (Sigα(H
(R)), g) it can not possibly set up, it is thus possible to prevent " generation examines " problem.
Description of the drawings
Attached drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes one of the application
Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of the cloud file integrality public audit evidence generation method of the embodiment of the present invention.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiment and attached drawing, to this
Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make
For limitation of the invention.
Embodiment 1
Before public audit being carried out to some the cloud file integrality being stored in Cloud Server, it is necessary first at the beginning of carrying out system
Beginningization, and during the cloud file is stored in Cloud Server generate for integrality public audit integrality disclose it is careful
Count evidence.System initialization includes:
Cloud service provider generates the parameter and function for public audit.Specifically, bilinear map e is defined:G×G
→GT, G and GTAll it is the multiplicative cyclic group that rank is Big prime p, the generation member that g is multiplicative cyclic group G is defined character string maps
To the hash function H () of multiplicative cyclic group G:{0,1}*→ G (hereinafter referred to as group's hash function) is defined character string maps
To addition cyclic group ZpHash function h'():{0,1}*→Zp(hereinafter referred to as remaining hash function), ZpBe mould it is big element
The addition cyclic group of number p, h () are by hash function that random length character string maps are fixed-length string.Cloud service provider
To a pair of public and private key (pk of certification authority agent applicationcsp,skcsp), and by public key pkcspTogether with parameter defined above and function
It is open.
Cloud file owners generate the public and private key for public audit.Specifically, cloud file owners are to certificate granting machine
A pair of public and private key (spk, ssk) of structure application, one random number α ∈ Z of reselectionp, calculate v ← gα, (α, gα) it is that bilinearity signature is close
Key pair, to obtain private key sk=(α, ssk) and public key pk=(v, spk).Public key pk is uploaded into Cloud Server and openly, is
System initialization is completed.
Fig. 1 is the flow diagram of the cloud file integrality public audit evidence generation method of the present embodiment, the cloud text
Part integrality public audit evidence generation method includes:
Cloud file division is blocks of files by step S11.
Specifically, cloud file F secrets are divided into several blocks of files by cloud file owners by client.It needs to illustrate
, cloud file F can be divided into several equal-sized blocks of files, it is big that cloud file F can also be divided into several
Small not equal blocks of files.The file number of blocks of segmentation is more, and the safety that cloud file F is stored in Cloud Server is higher.At this
In embodiment, illustrated for cloud file F is divided into several equal-sized blocks of files.Those skilled in the art know
How one cloud file division is several equal-sized blocks of files by dawn, and details are not described herein.Cloud file F to be divided into
For n blocks of files, this n blocks of files is expressed as blocks of files m according to data order1..., blocks of files mi..., file
Block mn, then cloud file F be expressed as F=(m1,…,mi,…,mn), miIndicate i-th of blocks of files in cloud file F, i is file
The serial number of block, 1≤i≤n and i are positive integer.
Step S12 generates public audit label.
The public audit label includes the identification identifier of the cloud file F owners, the filename of cloud file F, blocks of files
Quantity n and random number.Specifically, random number u and u ∈ G are selected, the public audit label is according to PALF=oid | |
filename||n||u||SSigssk(h (oid | | filename | | n | | u)) generate, wherein PALFFor the public audit mark
Label, oid are the identification identifier of the cloud file F owners, and filename is the filename of cloud file F, and SSig () is digital signature
Function, | | for concatenation operator.
Step S13, scramble file block sequence generate the signature of each blocks of files in out of order file to form out of order file
Evidence is to obtain blocks of files signature evidence set.
The file block sequence scramble of cloud file F is formed into out of order file F'=(m1',…,mi',…,mn'), mi' it is out of order
I-th of blocks of files in file F'.The blocks of files signs evidence set according to PABPF={ σi}1≤i≤nIt obtains, wherein PABPF
For blocks of files signature evidence set, σiFor i-th of blocks of files in out of order file F' signature evidence andSig () is bilinearity signature function.
Step S14 sequentially stores the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file using binary tree structure
To obtain public audit Hash binary tree.
Specifically, the group's cryptographic Hash for calculating each blocks of files forms group's sequence of hash values GH of out of order file F'F'=(H
(m'1),…,H(mi'),…,H(mn′)).Group's sequence of hash values GH based on out of order file F'F' sequentially generate public audit Kazakhstan
The leaf node data sequence LF'=(h (H (m of uncommon binary tree1')),…,h(H(mi')),…,h(H(mn'))), then it is based on
Leaf node data sequence LF'Sequentially structure public audit Hash binary tree PATF'.In the present embodiment, the public audit is breathed out
Uncommon binary tree PATF'In each non-leaf nodes there are two subtrees, each leaf node to correspond to the group of one blocks of files of storage
The file block sequence of the cryptographic Hash of cryptographic Hash, out of order file F' is public audit Hash binary tree PAT described in preorder traversalF'It obtains
Leaf node sequence.Certainly, the file block sequence of out of order file F' may be set to be public audit described in postorder traversal and breathe out
Uncommon binary tree PATF'The leaf node sequence of acquisition, or it is set as public audit Hash binary tree PAT described in inorder traversalF'
The leaf node sequence of acquisition, this is not limited by the present invention.
Step S15 generates public audit order-preserving evidence.
Specifically, the public audit order-preserving evidence includes integrality signature evidence and the public audit Hash binary tree
PATF', i.e. PASPF={ Sigα(H(R)),PATF', wherein PASPF is the public audit order-preserving evidence, Sigα(H(R))←
(H(R))αFor integrality signature evidence, R is the public audit Hash binary tree PATF'The corresponding cryptographic Hash of root node.
Step S16 demonstrate,proves the public audit label, blocks of files signature evidence set, the public audit order-preserving
According to this and out of order file is uploaded to Cloud Server and is stored.
Step S17, Cloud Server verify the public audit label, blocks of files signature evidence set, the disclosure
Effectively whether audit order-preserving evidence and out of order file.
Specifically, Cloud Server receives { F', PALF,PASPF,PABPFAfter, verify its validity using public key pk.Its
In, the data of digital signature function SSig () are verified with general signature verification method, bilinearity signature function Sig ()
Data then by judging e (H (mi'), v) and e (Sigα(mi'), g) whether it is equal verified, the two it is equal be effectively label
Name data.
In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and unrest
When preface part is effective, step S18 is executed, Cloud Server generates the storage outsourcing of cloud file according to the public audit label and demonstrate,proves
According to, and cloud file storage outsourcing evidence is returned into cloud file owners and is preserved.
Specifically, cloud file storage outsourcing evidence according toIt generates, wherein OSPFIt is deposited for the cloud file
Store up outsourcing evidence.By cloud file storage outsourcing evidence OSPFIt returns to cloud file owners to preserve, cloud file is all
Person receives the cloud file storage outsourcing evidence OSPFAnd verify its it is effective after, delete local data { F', PALF,PASPF,
PABPF, so far completion generates the institute needed for cloud file integrality public audit on evidence.
Embodiment 2
After cloud file owners rewrite blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates
According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1
Compared to further include rewrite blocks of files when evidence update operation, it is described rewrite blocks of files when evidence update operation include:
Cloud file owners send evidence update request (M, filename, j) to Cloud Server, wherein M indicates to rewrite behaviour
Make, j is serial number of the blocks of files in out of order file before rewriting.Specifically, cloud file owners are in Cloud Server by cloud
The blocks of files m of file FiIt is modified, blocks of files miCorresponding in out of order file F' is blocks of files m'j, i.e. blocks of files m'j
For the blocks of files before rewriting, describe for convenience, with blocks of files m''jIndicate revised blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF'
Generate H (m'j) adjoint manifold Δ j, and by undated parameter { H (mj′),Δj,Sigα(H(R)),NPATF'Return to cloud file
The owner, wherein NPATF'For by the public audit Hash binary tree PATF'In the cryptographic Hash of all nodes storage be all set to
Empty null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find serial number j's
Leaf node, to obtain H (mj') adjoint manifold Δ j.
Cloud file owners are by h (H (mj')) and the Δ j substitutions null value Hash binary tree NPATF′In corresponding node with
Obtain the public audit Hash binary tree PATF'The corresponding cryptographic Hash of root node and update certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree
PATF'The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, the leaf node of serial number j in the update certification tree is deposited
The cryptographic Hash of storage is by h (H (mj')) replace with h (H(m″j)) to form updated update certification tree, and obtain the update and recognize
Demonstrate,prove the corresponding cryptographic Hash of root node of tree.
Updated integrality signature evidence Sig α are calculated according to the corresponding cryptographic Hash of root node of the update certification tree
(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According toCalculate revised blocks of files mj" signature evidence, wherein σ "j
For revised blocks of files mj" signature evidence.
By the signature card of updated integrality signature evidence, updated update certification tree and revised blocks of files
According to being uploaded to Cloud Server and carry out corresponding data replacement.Specifically, Sig is usedα(H (R ")) replaces Sigα(H (R)), with σ "jIt replaces
Change σj。
Embodiment 3
After cloud file owners delete blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates
According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1
Compared to further include delete blocks of files when evidence update operation, it is described delete blocks of files when evidence update operation include:
Cloud file owners send evidence update request (D, filename, j) to Cloud Server, wherein D indicates to delete behaviour
Make, j is serial number of the deleted file block in out of order file.Specifically, cloud file owners are by the blocks of files of cloud file F
miIt is deleted from Cloud Server, blocks of files miCorresponding in out of order file F' is blocks of files m'j, i.e. blocks of files m'jIt is deleted
Blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF'
Generate H (m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud
File owners, wherein NPATF'For the cryptographic Hash of all node storages in the public audit Hash binary tree is all set to sky
Null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find the leaf of serial number j
Child node, to obtain H (mj') adjoint manifold Δ j.
Public audit label PAL described in cloud file owners' certificationFWhether effectively.
In the public audit label PALFWhen effective, cloud file owners are by h (H (mj')) and the Δ j substitutions null value
Hash binary tree NPATF'In corresponding node to obtain the public audit Hash binary tree PATF'The corresponding Kazakhstan of root node
Uncommon value and update certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree
The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, make the leaf section that serial number j is directed toward in the update certification tree
The pointer of the father node of point is directed toward the brotgher of node of the leaf node of the serial number j and deletes serial number in the update certification tree
It is the leaf node of j to form updated update certification tree, calculates the corresponding cryptographic Hash of root node of the update certification tree.
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα
(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According to PALF'=oid | | filename | | n-1 | | u | | SSigssk(h (oid | | filename | | n-1 | | u)) meter
Calculate updated public audit label, wherein PAL'FFor updated public audit label.
According toCalculate the All Files block after deleted file block
Updated signature evidence, wherein σ 'q-1For the updated signature evidence of the q-1 blocks of files, j+1≤q≤n in out of order file
And q is positive integer.
By the institute after updated public audit label, updated integrality signature evidence, deleted file block
There are the updated signature evidence of blocks of files and updated update certification tree to be uploaded to Cloud Server.
Cloud Server verifies updated public audit label, updated integrality signature evidence, quilt using public key pk
Effectively whether the updated signature evidence of All Files block and updated update certification tree after the blocks of files of deletion.
Institute after public audit label in the updated, updated integrality signature evidence, deleted file block
When having the updated signature evidence of blocks of files and effective updated update certification tree, carries out corresponding data and replace simultaneously basisUpdated cloud file is obtained to deposit
Outsourcing evidence is stored up, and updated cloud file storage outsourcing evidence is returned into cloud file owners and is preserved, wherein
OSPF' it is that updated cloud file stores outsourcing evidence.
Embodiment 4
After cloud file owners are inserted into blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates
According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1
Compared to further include be inserted into blocks of files when evidence update operation, it is described be inserted into blocks of files when evidence update operation include:
Cloud file owners send evidence update request (I, filename, j, m to Cloud Serverc), wherein I indicates to insert
Enter operation, j is serial number of the blocks of files of insertion position in out of order file, mcFor the blocks of files being inserted into.Specifically, cloud file
The blocks of files m that the owner will be inserted on Cloud ServercIt is inserted into the blocks of files m of cloud file FiBehind, blocks of files mi
Corresponding in out of order file F' is blocks of files mj', i.e. blocks of files mj' be insertion position blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF'
Generate H (mj') adjoint manifold Δ j, and by undated parameter { H (mj′),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud
File owners, wherein NPATF'For the cryptographic Hash of all node storages in the public audit Hash binary tree is all set to sky
Null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find the leaf of serial number j
Child node, to obtain H (mj') adjoint manifold Δ j.
Public audit label PAL described in cloud file owners' certificationFWhether effectively.
When the public audit label PALF is effective, cloud file owners are by h (H (mj')) and the Δ j substitutions null value
Corresponding node in Hash binary tree is to obtain the corresponding cryptographic Hash of root node and the update of the public audit Hash binary tree
Certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree
The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, operation is updated to be updated to the update certification tree
Update certification tree afterwards:First node and second node are generated in the update certification tree, the second node storage is to be inserted
The cryptographic Hash of group's cryptographic Hash of the blocks of files entered and the left and right child pointers of the second node are all sky, make the first node
Left pointer be directed toward it is described update certification tree in serial number j leaf node, make the first node right pointer direction described in
Second node makes the pointer for being directed toward the leaf node of serial number j in the update certification tree originally transfer to be directed toward the first segment
Point obtains the corresponding cryptographic Hash of root node of the update certification tree.
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα
(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According to PALF'=oid | | filename | | n+1 | | u | | SSigssk(h (oid | | filename | | n+1 | | u)) obtain
Obtain updated public audit label, wherein PAL'FFor updated public audit label.
According toCalculate the All Files after the blocks of files of insertion position
The updated signature evidence of block, wherein σ "qFor the updated signature evidence of q-th of blocks of files in out of order file, j+1≤q≤n+
1 and q is positive integer, m "j+1=mc, m "p+1=mp', j+1≤p≤n.
By updated public audit label, updated integrality signature evidence, insertion position blocks of files after
The updated signature evidence of All Files block and updated update certification tree are uploaded to Cloud Server.
Cloud Server is verified updated public audit label using public key pk, updated integrality signature evidence, is inserted
Enter whether the updated signature evidence of All Files block and updated update certification tree after the blocks of files of position have
Effect.
Public audit label in the updated, updated integrality signature evidence, insertion position blocks of files after
When the updated signature evidence of All Files block and effective updated update certification tree, carries out corresponding data and replace simultaneously root
According toObtain updated cloud file
Outsourcing evidence is stored, and updated cloud file storage outsourcing evidence is returned into cloud file owners and is preserved, wherein
OSPF' it is that updated cloud file stores outsourcing evidence.
Embodiment 5
The present embodiment provides a kind of cloud file integrality public audit method, this method is used by public audit third party,
The evidence of public audit can be used any embodiment in 1~embodiment of embodiment 4 and obtain, and the public audit method includes:
The public audit label of audit document is asked to Cloud Server.Specifically, public audit third party obtains cloud file
After the owner authorizes, the file of the identification identifier oid names in public audit file directory with cloud file owners is opened,
The filename filename of the cloud file (hereinafter referred to as audit document) to be audited, corresponding cloud text are selected from this document folder again
Part F.Public audit third party's transmission data oid | | filename to Cloud Server is to ask the public audit label of cloud file F
PALF, cloud service server retrieves and returns public audit label PALF。
Whether the public audit label for verifying audit document is effective.Specifically, public audit third party is all with cloud file
The public audit label PAL of the public key spk verification cloud files F of personF.If the file number of blocks n and random number u of cloud file F are to have
Data are imitated, then verify the public audit label PAL of cloud file FFEffectively.
In the public audit label PAL of audit documentFWhen effective, r is randomly choosed from the blocks of files serial number of audit document
A serial number configuration file block serial number set { k1,…,kr, and be each element corresponding selection one in blocks of files serial number set
Random number is to form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, kiFor blocks of files serial number collection
I-th of element in conjunction,For the corresponding random number of i-th of element in blocks of files serial number set, i is positive integer.
After receiving challenge request, Cloud Server according toGenerate data integrity evidence, wherein
ProofchalFor the data integrity evidence,
For serial number k in the out of order file of audit documentiBlocks of files,ΔkiForAdjoint manifold, NPATF'For the text that will audit
The cryptographic Hash of all node storages is all set to empty null value Hash binary tree in the public audit Hash binary tree of part,It is careful
Count serial number k in the out of order file of fileiBlocks of files signature evidence.
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited
Public audit Hash binary tree the corresponding cryptographic Hash of root node, wherein it is fixed that h (), which is by random length character string maps,
The hash function of long character string;
Judge e (H (R'), v)=e (Sigα(H(R)),g) whether true, wherein e is bilinearity signature mapping, and R' is careful
Count the corresponding cryptographic Hash of root node of the public audit Hash binary tree of file.
In e (H (R'),v)=e (Sigα(H (R)), g) set up when, judgeIt is
No establishment, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking,
Data are not tampered with, and otherwise judge that audit document does not pass through integrity checking.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect
It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention
Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of cloud file integrality public audit evidence generation method, which is characterized in that including:
It is blocks of files by cloud file division;
Public audit label is generated, the public audit label includes the text of the identification identifier of cloud file owners, cloud file
Part name, file number of blocks and random number;
Scramble file block sequence generates the signature evidence of each blocks of files in out of order file to obtain text to form out of order file
Part block signature evidence set;
Binary tree structure is used sequentially to store the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file to obtain open examine
Count Hash binary tree;
Public audit order-preserving evidence is generated, the public audit order-preserving evidence includes the integrality signature evidence and described of cloud file
Public audit Hash binary tree;
By the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order text
Part is uploaded to Cloud Server and is stored;
Cloud Server verifies the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence
And effectively whether out of order file;
In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order text
When part is effective, Cloud Server generates cloud file according to the public audit label and stores outsourcing evidence, and by the cloud file
Storage outsourcing evidence returns to cloud file owners and preserves.
2. cloud file integrality public audit evidence generation method according to claim 1, which is characterized in that in the public affairs
It sits at session in meter Hash binary tree, there are each non-leaf nodes two subtrees, each leaf node to correspond to one blocks of files of storage
Group's cryptographic Hash cryptographic Hash, the file block sequence of out of order file is that public audit Hash binary tree described in preorder traversal obtains
Leaf node sequence.
3. cloud file integrality public audit evidence generation method according to claim 1, which is characterized in that the disclosure
Label audit according to PALF=oid | | filename | | n | | u | | SSigssk(h (oid | | filename | | n | | u)) generate,
In, PALFFor the public audit label, oid is the identification identifier of cloud file owners, and filename is the text of cloud file
Part name, n are file number of blocks, and u be random number and u ∈ G, G are multiplicative cyclic groups that rank be Big prime p, and SSig () is digital label
Name function, ssk are the private key of cloud file owners, and h () is by Hash letter that random length character string maps are fixed-length string
Number, | | for concatenation operator.
4. cloud file integrality public audit evidence generation method according to claim 3, which is characterized in that the file
Block signs evidence set according to PABPF={ σi}1≤i≤nIt obtains, wherein PABPFFor blocks of files signature evidence set, σiFor
In out of order file the signature evidence of i-th of blocks of files andSig () is bilinearity label
Name function, α are random number and α ∈ Zp, ZpIt is the addition cyclic group that mould is Big prime p, H () is to follow character string maps to multiplication
The hash function of ring group G, m 'iFor i-th of blocks of files in out of order file, h'() it is by character string maps to addition cyclic group Zp's
Hash function, i are positive integer.
5. cloud file integrality public audit evidence generation method according to claim 4, which is characterized in that the disclosure
Order-preserving evidence audit according to PASPF={ Sigα(H(R)),PATF'Generate, wherein PASPFFor the public audit order-preserving evidence,
Sigα(H (R)) is integrality signature evidence, PATF'For the public audit Hash binary tree, R is the public audit Hash two
Pitch the corresponding cryptographic Hash of root node of tree.
6. cloud file integrality public audit evidence generation method according to claim 5, which is characterized in that the cloud text
Part store outsourcing evidence according to
It generates, wherein OSPFOutsourcing evidence, sk are stored for the cloud fileCSPFor the private key of cloud service provider.
7. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include changing
When written document block evidence update operation, it is described rewrite blocks of files when evidence update operation include:
Evidence update request (M, filename, j) is sent to Cloud Server, wherein M indicates that rewriting operation, j are the text before rewriting
Serial number of the part block in out of order file;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree
(m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF'To return to cloud file all
Person, wherein m 'jFor the blocks of files before rewriting, NPATF'For by the Kazakhstan of all nodes storage in the public audit Hash binary tree
Uncommon value is all set to empty null value Hash binary tree;
Cloud file owners are by h (H (m'j)) and the corresponding nodes that substitute into the null value Hash binary tree of Δ j to obtain the public affairs
Sit at session the corresponding cryptographic Hash of root node and the update certification tree of meter Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree
The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, by the leaf node storage of serial number j in the update certification tree
Cryptographic Hash is by h (H (m'j)) replace with h (H (m "j)) to form updated update certification tree, and obtain the update certification tree
The corresponding cryptographic Hash of root node, wherein m "jFor revised blocks of files;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H
(R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According toCalculate the signature evidence of revised blocks of files;
Updated integrality is signed on the signature evidence of evidence, updated update certification tree and revised blocks of files
It reaches Cloud Server and carries out corresponding data replacement.
8. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include deleting
When except blocks of files evidence update operation, it is described delete blocks of files when evidence update operation include:
Evidence update request (D, filename, j) is sent to Cloud Server, wherein D indicates that delete operation, j are the text being deleted
Serial number of the part block in out of order file;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree
(m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud file
The owner, wherein m 'jFor deleted file block, NPATF'For all nodes in the public audit Hash binary tree are stored
Cryptographic Hash be all set to empty null value Hash binary tree;
Whether public audit label is effective described in cloud file owners' certification;
When the public audit label is effective, cloud file owners are by h (H (m'j)) and the Δ j substitutions null value Hash y-bend
Corresponding node in tree is to obtain the corresponding cryptographic Hash of root node and the update certification tree of the public audit Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree
The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, make the leaf node that serial number j is directed toward in the update certification tree
The pointer of father node is directed toward the brotgher of node of the leaf node of the serial number j and deletes serial number j in the update certification tree
Leaf node to form updated update certification tree, calculate the corresponding cryptographic Hash of root node of the update certification tree;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H
(R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According to PAL'F=oid | | filename | | n-1 | | u | | SSigssk(h (oid | | filename | | n-1 | | u)) calculate update
Public audit label afterwards, wherein PAL 'FFor updated public audit label;
According toCalculate the All Files block update after deleted file block
Signature evidence afterwards, wherein σ 'q-1For the updated signature evidence of the q-1 blocks of files, j+1≤q≤n and q in out of order file
For positive integer;
By all texts after updated public audit label, updated integrality signature evidence, deleted file block
The updated signature evidence of part block and updated update certification tree are uploaded to Cloud Server;
Cloud Server verify updated public audit label, updated integrality signature evidence, deleted file block it
Whether the updated signature evidence of All Files block and updated update certification tree afterwards be effective;
All texts after public audit label in the updated, updated integrality signature evidence, deleted file block
When the updated signature evidence of part block and effective updated update certification tree, carries out corresponding data and replace simultaneously basisIt obtains more
Cloud file after new stores outsourcing evidence, and updated cloud file storage outsourcing evidence is returned to cloud file owners and is carried out
It preserves, wherein OSP 'FOutsourcing evidence is stored for updated cloud file.
9. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include inserting
Evidence update operation when entering blocks of files, evidence update operation when being inserted into blocks of files include:
Evidence update request (I, filename, j, m are sent to Cloud Serverc), wherein I indicates insertion operation, and j is insertion position
Serial number of the blocks of files in out of order file, mcFor the blocks of files being inserted into;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree
(m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud file
The owner, wherein m'jFor the blocks of files of insertion position, NPATF'For all nodes in the public audit Hash binary tree are deposited
The cryptographic Hash of storage is all set to empty null value Hash binary tree;
Whether public audit label is effective described in cloud file owners' certification;
When the public audit label is effective, cloud file owners are by h (H (m'j)) and the Δ j substitutions null value Hash y-bend
Corresponding node in tree is to obtain the corresponding cryptographic Hash of root node and the update certification tree of the public audit Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree
The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, it is updated to obtain that operation is updated to the update certification tree
Update certification tree:First node and second node are generated in the update certification tree, what the second node storage was inserted into
The cryptographic Hash of group's cryptographic Hash of blocks of files and the left and right child pointers of the second node are all sky, make a left side for the first node
Pointer is directed toward the leaf node of serial number j in the update certification tree, and the right pointer of the first node is made to be directed toward described second
Node makes the pointer for being directed toward the leaf node of serial number j in the update certification tree originally transfer to be directed toward the first node, obtains
Obtain the corresponding cryptographic Hash of root node of the update certification tree;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H
(R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According to PAL'F=oid | | filename | | n+1 | | u | | SSigssk(h (oid | | filename | | n+1 | | u)) updated
Public audit label afterwards, wherein PAL'FFor updated public audit label;
According toAll Files block after the blocks of files of calculating insertion position is more
Signature evidence after new, wherein σ "qFor the updated signature evidence of q-th of blocks of files in out of order file, j+1≤q≤n+1 and q
For positive integer, m "j+1=mc, m "p+1=m 'p, j+1≤p≤n;
By updated public audit label, updated integrality signature evidence, insertion position blocks of files after it is all
The updated signature evidence of blocks of files and updated update certification tree are uploaded to Cloud Server;
Cloud Server verify updated public audit label, updated integrality signature evidence, insertion position blocks of files
Whether the updated signature evidence of All Files block and updated update certification tree later be effective;
Public audit label in the updated, updated integrality signature evidence, insertion position blocks of files after it is all
When the updated signature evidence of blocks of files and effective updated update certification tree, carries out corresponding data and replace simultaneously basisIt is updated
Cloud file afterwards stores outsourcing evidence, and updated cloud file storage outsourcing evidence is returned to cloud file owners and is protected
It deposits, wherein OSP 'FOutsourcing evidence is stored for updated cloud file.
10. a kind of cloud file integrality public audit method, which is characterized in that using according to described in any one of claim 1 to 9
The public audit evidence that is generated of cloud file integrality public audit evidence generation method, the public audit method includes:
The public audit label of audit document is asked to Cloud Server;
Whether the public audit label for verifying audit document is effective;
When the public audit label of audit document is effective, r serial number structure is randomly choosed from the blocks of files serial number of audit document
At blocks of files serial number set { k1,…,kr, and for one random number of each element corresponding selection in blocks of files serial number set with
Form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, n are the file number of blocks of audit document,
kiFor i-th of element in blocks of files serial number set,For the corresponding random number of i-th of element in blocks of files serial number set, i is just
Integer;
After receiving challenge request, Cloud Server according to
Generate data integrity evidence, whereinFor the data integrity evidence, H () is by character string maps to multiplicative cyclic group G
Hash function, G be rank be Big prime p multiplicative cyclic group,For serial number k in the out of order file of audit documentiText
Part block, Δ kiForAdjoint manifold, Sigα(H (R)) is the integrality signature evidence of audit document, NPATF'For that will examine
The cryptographic Hash for counting all node storages in the public audit Hash binary tree of file is all set to empty null value Hash binary tree, h'
() is by character string maps to addition cyclic group ZpHash function,For serial number k in the out of order file of audit documenti's
The signature evidence of blocks of files;
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited
The corresponding cryptographic Hash of root node of public audit Hash binary tree, wherein it is fixed length that h (), which is by random length character string maps,
The hash function of character string;
Judge e (H (R'), v)=e (Sigα(H (R)), g) it is whether true, wherein and e is bilinear map, and R' is audit document
The corresponding cryptographic Hash of root node of public audit Hash binary tree, the generation member that g is multiplicative cyclic group G, v is cloud file owners
Bilinearity public signature key;
In e (H (R'), v)=e (Sigα(H (R)), g) set up when, judgeWhether
It sets up, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking, otherwise judges to examine
Meter file does not pass through integrity checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610118988.0A CN105787389B (en) | 2016-03-02 | 2016-03-02 | Cloud file integrality public audit evidence generation method and public audit method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610118988.0A CN105787389B (en) | 2016-03-02 | 2016-03-02 | Cloud file integrality public audit evidence generation method and public audit method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105787389A CN105787389A (en) | 2016-07-20 |
CN105787389B true CN105787389B (en) | 2018-07-27 |
Family
ID=56386846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610118988.0A Active CN105787389B (en) | 2016-03-02 | 2016-03-02 | Cloud file integrality public audit evidence generation method and public audit method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105787389B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231370A (en) * | 2017-06-23 | 2017-10-03 | 成都鼎智汇科技有限公司 | A kind of data monitoring method based on cloud computing |
CN107343008A (en) * | 2017-07-17 | 2017-11-10 | 山东超越数控电子有限公司 | A kind of data safety isolation of anti-access module leakage is with sharing implementation method |
CN107612969B (en) * | 2017-08-16 | 2020-01-14 | 中国民航大学 | B-Tree bloom filter-based cloud storage data integrity auditing method |
CN108229208B (en) * | 2018-01-08 | 2021-03-23 | 华侨大学 | Public auditing method for multi-copy data in cloud storage service |
CN108418796B (en) * | 2018-01-30 | 2020-12-18 | 西安电子科技大学 | Cloud data multi-copy integrity verification and association deletion method and cloud storage system |
CN109583229B (en) * | 2018-10-30 | 2021-05-11 | 中国科学院信息工程研究所 | Privacy information tracing and evidence obtaining method, device and system |
CN109688103B (en) * | 2018-11-09 | 2021-07-16 | 杭州安恒信息技术股份有限公司 | Auditable encryption storage method |
CN109586896B (en) * | 2018-11-14 | 2021-09-03 | 陕西师范大学 | Data integrity verification method based on Hash prefix tree |
CN110912706B (en) * | 2019-11-15 | 2021-08-03 | 东北大学 | Identity-based dynamic data integrity auditing method |
CN110958116B (en) * | 2019-12-06 | 2021-02-26 | 中山大学 | Multi-copy cloud data integrity auditing method based on lattice signature |
CN111898164B (en) * | 2020-07-02 | 2024-03-29 | 武汉纺织大学 | Data integrity auditing method supporting label block chain storage and query |
CN115037507B (en) * | 2022-04-22 | 2024-04-05 | 京东科技控股股份有限公司 | User access management method, device and system |
CN118467506A (en) * | 2024-05-29 | 2024-08-09 | 成都虚谷伟业科技有限公司 | Method and system for auditing out-of-order data in time sequence database |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067363A (en) * | 2012-12-20 | 2013-04-24 | 华中科技大学 | Index conversion method for public data integrity checking |
CN103218574A (en) * | 2013-04-09 | 2013-07-24 | 电子科技大学 | Hash tree-based data dynamic operation verifiability method |
CN105072086A (en) * | 2015-07-06 | 2015-11-18 | 武汉科技大学 | Cloud-storage batch auditing method based on MapReduce |
CN105095794A (en) * | 2015-07-20 | 2015-11-25 | 武汉科技大学 | Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree |
-
2016
- 2016-03-02 CN CN201610118988.0A patent/CN105787389B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067363A (en) * | 2012-12-20 | 2013-04-24 | 华中科技大学 | Index conversion method for public data integrity checking |
CN103218574A (en) * | 2013-04-09 | 2013-07-24 | 电子科技大学 | Hash tree-based data dynamic operation verifiability method |
CN105072086A (en) * | 2015-07-06 | 2015-11-18 | 武汉科技大学 | Cloud-storage batch auditing method based on MapReduce |
CN105095794A (en) * | 2015-07-20 | 2015-11-25 | 武汉科技大学 | Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree |
Also Published As
Publication number | Publication date |
---|---|
CN105787389A (en) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105787389B (en) | Cloud file integrality public audit evidence generation method and public audit method | |
US20230410215A1 (en) | Cryptographic method and system for secure extraction of data from a blockchain | |
US11888992B2 (en) | System and method for generating digital marks | |
CN101004805B (en) | Digital document management system, digital document management method | |
CN106301789A (en) | Apply the dynamic verification method of the cloud storage data that linear homomorphism based on lattice signs | |
CN103560882B (en) | A kind of elliptic curve cipher system based on mark | |
CN105760781B (en) | The storage method, restoration methods and operating method of large data files can be deduced in order | |
JP2020511017A (en) | System and method for implementing blockchain-based digital certificates | |
CN104978239B (en) | A kind of method, apparatus and system realizing more Backup Data dynamics and updating | |
CN108737374A (en) | The method for secret protection that data store in a kind of block chain | |
CN109586896A (en) | A kind of data integrity verification method based on Hash prefix trees | |
CN110263584A (en) | A kind of data integrity auditing method and system based on block chain | |
CN108123934A (en) | A kind of data integrity verifying method towards mobile terminal | |
CN111783148A (en) | Justice-supporting lightweight multi-copy data cloud auditing method and device | |
CN110225012B (en) | Method for checking and updating ownership of outsourced data based on alliance chain | |
CN112613601A (en) | Neural network model updating method, device and computer storage medium | |
CN109117672A (en) | Carry out the hiding cloud storage Data Audit method of sensitive information | |
CN106790311A (en) | Cloud Server stores integrality detection method and system | |
CN106611136A (en) | Data tampering verification method in cloud storage | |
Mo et al. | Enabling non-repudiable data possession verification in cloud storage systems | |
CN107612969A (en) | Cloud storage data integrity auditing method based on B Tree Bloom filters | |
Lashkami et al. | A blockchain based framework for complete secure data outsourcing with malicious behavior prevention | |
CN105338004B (en) | The applicable public audit method with secret protection of low-performance equipment under cloud environment | |
CN111259454B (en) | Non-interactive data integrity auditing method, fair payment method and system | |
CN113992389A (en) | SGX data integrity auditing method based on dynamic frequency table |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |