[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105787389B - Cloud file integrality public audit evidence generation method and public audit method - Google Patents

Cloud file integrality public audit evidence generation method and public audit method Download PDF

Info

Publication number
CN105787389B
CN105787389B CN201610118988.0A CN201610118988A CN105787389B CN 105787389 B CN105787389 B CN 105787389B CN 201610118988 A CN201610118988 A CN 201610118988A CN 105787389 B CN105787389 B CN 105787389B
Authority
CN
China
Prior art keywords
evidence
file
files
blocks
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610118988.0A
Other languages
Chinese (zh)
Other versions
CN105787389A (en
Inventor
冯朝胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Normal University
Original Assignee
Sichuan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Normal University filed Critical Sichuan Normal University
Priority to CN201610118988.0A priority Critical patent/CN105787389B/en
Publication of CN105787389A publication Critical patent/CN105787389A/en
Application granted granted Critical
Publication of CN105787389B publication Critical patent/CN105787389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1737Details of further file system functions for reducing power consumption or coping with limited storage space, e.g. in mobile devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of cloud file integrality public audit evidence generation method and public audit method, cloud file integrality public audit evidence generation method includes:It is blocks of files by cloud file division;Generate public audit label;Scramble file block sequence generates the signature evidence of each blocks of files in out of order file to obtain blocks of files signature evidence set to form out of order file;Binary tree structure is used sequentially to store the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file to obtain public audit Hash binary tree;Generate public audit order-preserving evidence;Public audit label, blocks of files signature evidence set, public audit order-preserving evidence and out of order file are uploaded to Cloud Server;When the parameter of upload is effective, cloud file is generated according to public audit label and stores outsourcing evidence.Cloud file integrality public audit evidence generation method and public audit method provided by the invention, audit number is unlimited, can ensure that data privacy, and prevents to inscribe for interrogation.

Description

Cloud file integrality public audit evidence generation method and public audit method
Technical field
The present invention relates to cloud storage technical fields, and in particular to a kind of cloud file integrality public audit evidence generation method And public audit method.
Background technology
For most of entity and individual, data are continuously all being generated daily, the storage of data becomes necessary In face of the problem of.The appearance of cloud computing provides a feasible solution to this problem:It utilizes " storage services " By file with outsourcing form storage to Cloud Server, such file being stored in Cloud Server is referred to as cloud service delivery mode For cloud file.When needing to analyze and handle outer bag data, the file download of needs can be carried out to local, it can also be direct The evaluation work of analyzing processing file is contracted out to Cloud Server.Resource in the form of resource pool concentrate and with method of service Resource is supplied to the cloud computing mode of user, eliminates many troubles of user management data so that user only needs to pay close attention to The business of oneself brings huge convenience and benefit to user.
While data storage is contracted out to cloud service provider and brings many benefits to entity and individual, many peaces are also brought Full problem, one of safety problem, which is exactly cloud service provider, may distort the data of outsourcing storage beyond the clouds.It prevents from counting It is that integrality audit is carried out to cloud file according to the main method being tampered, auditor can be data owner, can also It is third party.Done if integrality audit work is mainly come in person by data owner, it is desirable that data owner it is often online and And its terminal has stronger computing capability, is brought compared with burden to the owner.Better way is that integrality is audited Be contracted out to third party, the special third-party server general moment for providing integrality auditing service is online and computing capability compared with By force.But integrality audit is contracted out to third party and also brings along some problems, main problem includes computationally intensive, memory space It is required that more, bandwidth consumption is serious and privacy compromise.
For Completeness Design outsourcing problems faced, some solutions are proposed in the prior art.But these schemes Existing main problem includes:Number of auditing is limited, once number is finished, can not just audit;Need auditing party's storage unit score According to;Dynamic is not supported to update;It is inscribed in the presence of for interrogation, i.e., substitutes target Audit data with other data.
Invention content
It is to be solved by this invention be cloud file integrality audit audit number it is limited, need auditing party's storage unit score According to, do not support dynamic update, there is a problem of generation examine.
The present invention is achieved through the following technical solutions:
A kind of cloud file integrality public audit evidence generation method, including:It is blocks of files by cloud file division;It generates public Meter label is sat at session, the public audit label includes the identification identifier of cloud file owners, the filename of cloud file, blocks of files Quantity and random number;Scramble file block sequence generates the signature of each blocks of files in out of order file to form out of order file Evidence is to obtain blocks of files signature evidence set;The group that each blocks of files in out of order file is sequentially stored using binary tree structure is breathed out The cryptographic Hash of uncommon value is to obtain public audit Hash binary tree;Generate public audit order-preserving evidence, the public audit order-preserving card According to including integrality signature evidence and the public audit Hash binary tree;By the public audit label, the blocks of files label Name evidence set, the public audit order-preserving evidence and out of order file are uploaded to Cloud Server and are stored;Cloud Server is tested Demonstrate,proving the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order file is It is no effective;In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and unrest When preface part is effective, Cloud Server generates cloud file according to the public audit label and stores outsourcing evidence, and by the cloud File storage outsourcing evidence returns to cloud file owners and preserves.
Based on the public audit evidence that above-mentioned cloud file integrality public audit evidence generation method is generated, the present invention is also A kind of cloud file integrality public audit method is provided, including:
The public audit label of audit document is asked to Cloud Server;
Whether the public audit label for verifying audit document is effective;
When the public audit label of audit document is effective, r sequence is randomly choosed from the blocks of files serial number of audit document Number configuration file block serial number set { k1,…,kr, and it is random for each element corresponding selection one in blocks of files serial number set Number is to form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, n are the file block number of audit document Amount, kiFor i-th of element in blocks of files serial number set,For the corresponding random number of i-th of element in blocks of files serial number set, i For positive integer;
After receiving challenge request, Cloud Server according toGenerate data integrity evidence, wherein ProofchalFor the data integrity evidence,H() For the hash function by character string maps to multiplicative cyclic group G, G is the multiplicative cyclic group that rank is Big prime p,For audit text Serial number k in the out of order file of partiBlocks of files,Adjoint manifold, Sigα(H (R)) is the complete of audit document Whole property signature evidence, NPATF'Cryptographic Hash for all node storages in the public audit Hash binary tree by audit document is all set For empty null value Hash binary tree, h'() it is by character string maps to addition cyclic group ZpHash function,For audit document Out of order file in serial number kiBlocks of files signature evidence;
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited Public audit Hash binary tree the corresponding cryptographic Hash of root node, wherein it is fixed that h (), which is by random length character string maps, The hash function of long character string;
Judge e (H (R'), v)=e (Sigα(H (R)), g) it is whether true, wherein and e is bilinear map, and R' is audit text The corresponding cryptographic Hash of root node of the public audit Hash binary tree of part, the generation member that g is multiplicative cyclic group G, v is cloud file institute The bilinearity public signature key for the person of having;
In e (H (R'), v)=e (Sigα(H (R)), g) set up when, judgeIt is No establishment, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking, otherwise Judge that audit document does not pass through integrity checking.
Compared with prior art, the present invention having the following advantages and advantages:
1, the evidence due to real data and for auditing is stored in cloud, thus auditing party is any without preserving Data;
2, existing auditing method is to preset limited several evidences at random in cloud file, and evidence is once used will Exposure, can not reuse, therefore each evidence is used only once, and has several evidences to be just able to validate only several times.And the present invention carries out Auditing party can't be directly returned to by examining calender file block evidence, and there is no the problems of evidence exposure, it is only necessary to know blocks of files Quantity can carry out the file that outsourcing is stored in the cloud the audit of unlimited number;
3, since the evidence of audit is generated based on blocks of files, after being operated to blocks of files, the evidence of audit carries out phase It should change, thus support the dynamic update of file data;
What 4, blocks of files stored in cloud is out of order so that cloud service provider can not restore file so that also can not public audit side Know the practical serial number of institute's Audit data block and the blocks of files actual order of configuration file, it is thus possible to ensure the privacy of data Property;
5, public audit order-preserving evidence so that each blocks of files must sit in the right seat when audit, if cloud service provider It plays tricks, substitutes audit aim blocks of files with other blocks of files, can not be verified by order-preserving, i.e. e (H (R'), v)=e (Sigα(H (R)), g) it can not possibly set up, it is thus possible to prevent " generation examines " problem.
Description of the drawings
Attached drawing described herein is used for providing further understanding the embodiment of the present invention, constitutes one of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of the cloud file integrality public audit evidence generation method of the embodiment of the present invention.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiment and attached drawing, to this Invention is described in further detail, and exemplary embodiment of the invention and its explanation are only used for explaining the present invention, do not make For limitation of the invention.
Embodiment 1
Before public audit being carried out to some the cloud file integrality being stored in Cloud Server, it is necessary first at the beginning of carrying out system Beginningization, and during the cloud file is stored in Cloud Server generate for integrality public audit integrality disclose it is careful Count evidence.System initialization includes:
Cloud service provider generates the parameter and function for public audit.Specifically, bilinear map e is defined:G×G →GT, G and GTAll it is the multiplicative cyclic group that rank is Big prime p, the generation member that g is multiplicative cyclic group G is defined character string maps To the hash function H () of multiplicative cyclic group G:{0,1}*→ G (hereinafter referred to as group's hash function) is defined character string maps To addition cyclic group ZpHash function h'():{0,1}*→Zp(hereinafter referred to as remaining hash function), ZpBe mould it is big element The addition cyclic group of number p, h () are by hash function that random length character string maps are fixed-length string.Cloud service provider To a pair of public and private key (pk of certification authority agent applicationcsp,skcsp), and by public key pkcspTogether with parameter defined above and function It is open.
Cloud file owners generate the public and private key for public audit.Specifically, cloud file owners are to certificate granting machine A pair of public and private key (spk, ssk) of structure application, one random number α ∈ Z of reselectionp, calculate v ← gα, (α, gα) it is that bilinearity signature is close Key pair, to obtain private key sk=(α, ssk) and public key pk=(v, spk).Public key pk is uploaded into Cloud Server and openly, is System initialization is completed.
Fig. 1 is the flow diagram of the cloud file integrality public audit evidence generation method of the present embodiment, the cloud text Part integrality public audit evidence generation method includes:
Cloud file division is blocks of files by step S11.
Specifically, cloud file F secrets are divided into several blocks of files by cloud file owners by client.It needs to illustrate , cloud file F can be divided into several equal-sized blocks of files, it is big that cloud file F can also be divided into several Small not equal blocks of files.The file number of blocks of segmentation is more, and the safety that cloud file F is stored in Cloud Server is higher.At this In embodiment, illustrated for cloud file F is divided into several equal-sized blocks of files.Those skilled in the art know How one cloud file division is several equal-sized blocks of files by dawn, and details are not described herein.Cloud file F to be divided into For n blocks of files, this n blocks of files is expressed as blocks of files m according to data order1..., blocks of files mi..., file Block mn, then cloud file F be expressed as F=(m1,…,mi,…,mn), miIndicate i-th of blocks of files in cloud file F, i is file The serial number of block, 1≤i≤n and i are positive integer.
Step S12 generates public audit label.
The public audit label includes the identification identifier of the cloud file F owners, the filename of cloud file F, blocks of files Quantity n and random number.Specifically, random number u and u ∈ G are selected, the public audit label is according to PALF=oid | | filename||n||u||SSigssk(h (oid | | filename | | n | | u)) generate, wherein PALFFor the public audit mark Label, oid are the identification identifier of the cloud file F owners, and filename is the filename of cloud file F, and SSig () is digital signature Function, | | for concatenation operator.
Step S13, scramble file block sequence generate the signature of each blocks of files in out of order file to form out of order file Evidence is to obtain blocks of files signature evidence set.
The file block sequence scramble of cloud file F is formed into out of order file F'=(m1',…,mi',…,mn'), mi' it is out of order I-th of blocks of files in file F'.The blocks of files signs evidence set according to PABPF={ σi}1≤i≤nIt obtains, wherein PABPF For blocks of files signature evidence set, σiFor i-th of blocks of files in out of order file F' signature evidence andSig () is bilinearity signature function.
Step S14 sequentially stores the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file using binary tree structure To obtain public audit Hash binary tree.
Specifically, the group's cryptographic Hash for calculating each blocks of files forms group's sequence of hash values GH of out of order file F'F'=(H (m'1),…,H(mi'),…,H(mn′)).Group's sequence of hash values GH based on out of order file F'F' sequentially generate public audit Kazakhstan The leaf node data sequence LF'=(h (H (m of uncommon binary tree1')),…,h(H(mi')),…,h(H(mn'))), then it is based on Leaf node data sequence LF'Sequentially structure public audit Hash binary tree PATF'.In the present embodiment, the public audit is breathed out Uncommon binary tree PATF'In each non-leaf nodes there are two subtrees, each leaf node to correspond to the group of one blocks of files of storage The file block sequence of the cryptographic Hash of cryptographic Hash, out of order file F' is public audit Hash binary tree PAT described in preorder traversalF'It obtains Leaf node sequence.Certainly, the file block sequence of out of order file F' may be set to be public audit described in postorder traversal and breathe out Uncommon binary tree PATF'The leaf node sequence of acquisition, or it is set as public audit Hash binary tree PAT described in inorder traversalF' The leaf node sequence of acquisition, this is not limited by the present invention.
Step S15 generates public audit order-preserving evidence.
Specifically, the public audit order-preserving evidence includes integrality signature evidence and the public audit Hash binary tree PATF', i.e. PASPF={ Sigα(H(R)),PATF', wherein PASPF is the public audit order-preserving evidence, Sigα(H(R))← (H(R))αFor integrality signature evidence, R is the public audit Hash binary tree PATF'The corresponding cryptographic Hash of root node.
Step S16 demonstrate,proves the public audit label, blocks of files signature evidence set, the public audit order-preserving According to this and out of order file is uploaded to Cloud Server and is stored.
Step S17, Cloud Server verify the public audit label, blocks of files signature evidence set, the disclosure Effectively whether audit order-preserving evidence and out of order file.
Specifically, Cloud Server receives { F', PALF,PASPF,PABPFAfter, verify its validity using public key pk.Its In, the data of digital signature function SSig () are verified with general signature verification method, bilinearity signature function Sig () Data then by judging e (H (mi'), v) and e (Sigα(mi'), g) whether it is equal verified, the two it is equal be effectively label Name data.
In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and unrest When preface part is effective, step S18 is executed, Cloud Server generates the storage outsourcing of cloud file according to the public audit label and demonstrate,proves According to, and cloud file storage outsourcing evidence is returned into cloud file owners and is preserved.
Specifically, cloud file storage outsourcing evidence according toIt generates, wherein OSPFIt is deposited for the cloud file Store up outsourcing evidence.By cloud file storage outsourcing evidence OSPFIt returns to cloud file owners to preserve, cloud file is all Person receives the cloud file storage outsourcing evidence OSPFAnd verify its it is effective after, delete local data { F', PALF,PASPF, PABPF, so far completion generates the institute needed for cloud file integrality public audit on evidence.
Embodiment 2
After cloud file owners rewrite blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1 Compared to further include rewrite blocks of files when evidence update operation, it is described rewrite blocks of files when evidence update operation include:
Cloud file owners send evidence update request (M, filename, j) to Cloud Server, wherein M indicates to rewrite behaviour Make, j is serial number of the blocks of files in out of order file before rewriting.Specifically, cloud file owners are in Cloud Server by cloud The blocks of files m of file FiIt is modified, blocks of files miCorresponding in out of order file F' is blocks of files m'j, i.e. blocks of files m'j For the blocks of files before rewriting, describe for convenience, with blocks of files m''jIndicate revised blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF' Generate H (m'j) adjoint manifold Δ j, and by undated parameter { H (mj′),Δj,Sigα(H(R)),NPATF'Return to cloud file The owner, wherein NPATF'For by the public audit Hash binary tree PATF'In the cryptographic Hash of all nodes storage be all set to Empty null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find serial number j's Leaf node, to obtain H (mj') adjoint manifold Δ j.
Cloud file owners are by h (H (mj')) and the Δ j substitutions null value Hash binary tree NPATF′In corresponding node with Obtain the public audit Hash binary tree PATF'The corresponding cryptographic Hash of root node and update certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree PATF'The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, the leaf node of serial number j in the update certification tree is deposited The cryptographic Hash of storage is by h (H (mj')) replace with h (H(m″j)) to form updated update certification tree, and obtain the update and recognize Demonstrate,prove the corresponding cryptographic Hash of root node of tree.
Updated integrality signature evidence Sig α are calculated according to the corresponding cryptographic Hash of root node of the update certification tree (H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According toCalculate revised blocks of files mj" signature evidence, wherein σ "j For revised blocks of files mj" signature evidence.
By the signature card of updated integrality signature evidence, updated update certification tree and revised blocks of files According to being uploaded to Cloud Server and carry out corresponding data replacement.Specifically, Sig is usedα(H (R ")) replaces Sigα(H (R)), with σ "jIt replaces Change σj
Embodiment 3
After cloud file owners delete blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1 Compared to further include delete blocks of files when evidence update operation, it is described delete blocks of files when evidence update operation include:
Cloud file owners send evidence update request (D, filename, j) to Cloud Server, wherein D indicates to delete behaviour Make, j is serial number of the deleted file block in out of order file.Specifically, cloud file owners are by the blocks of files of cloud file F miIt is deleted from Cloud Server, blocks of files miCorresponding in out of order file F' is blocks of files m'j, i.e. blocks of files m'jIt is deleted Blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF' Generate H (m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud File owners, wherein NPATF'For the cryptographic Hash of all node storages in the public audit Hash binary tree is all set to sky Null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find the leaf of serial number j Child node, to obtain H (mj') adjoint manifold Δ j.
Public audit label PAL described in cloud file owners' certificationFWhether effectively.
In the public audit label PALFWhen effective, cloud file owners are by h (H (mj')) and the Δ j substitutions null value Hash binary tree NPATF'In corresponding node to obtain the public audit Hash binary tree PATF'The corresponding Kazakhstan of root node Uncommon value and update certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, make the leaf section that serial number j is directed toward in the update certification tree The pointer of the father node of point is directed toward the brotgher of node of the leaf node of the serial number j and deletes serial number in the update certification tree It is the leaf node of j to form updated update certification tree, calculates the corresponding cryptographic Hash of root node of the update certification tree.
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα (H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According to PALF'=oid | | filename | | n-1 | | u | | SSigssk(h (oid | | filename | | n-1 | | u)) meter Calculate updated public audit label, wherein PAL'FFor updated public audit label.
According toCalculate the All Files block after deleted file block Updated signature evidence, wherein σ 'q-1For the updated signature evidence of the q-1 blocks of files, j+1≤q≤n in out of order file And q is positive integer.
By the institute after updated public audit label, updated integrality signature evidence, deleted file block There are the updated signature evidence of blocks of files and updated update certification tree to be uploaded to Cloud Server.
Cloud Server verifies updated public audit label, updated integrality signature evidence, quilt using public key pk Effectively whether the updated signature evidence of All Files block and updated update certification tree after the blocks of files of deletion.
Institute after public audit label in the updated, updated integrality signature evidence, deleted file block When having the updated signature evidence of blocks of files and effective updated update certification tree, carries out corresponding data and replace simultaneously basisUpdated cloud file is obtained to deposit Outsourcing evidence is stored up, and updated cloud file storage outsourcing evidence is returned into cloud file owners and is preserved, wherein OSPF' it is that updated cloud file stores outsourcing evidence.
Embodiment 4
After cloud file owners are inserted into blocks of files, demonstrate,proved according to the file integrality public audit that embodiment 1 generates According to also changing.Thus the present embodiment provides another cloud file integrality public audit evidence generation methods, with embodiment 1 Compared to further include be inserted into blocks of files when evidence update operation, it is described be inserted into blocks of files when evidence update operation include:
Cloud file owners send evidence update request (I, filename, j, m to Cloud Serverc), wherein I indicates to insert Enter operation, j is serial number of the blocks of files of insertion position in out of order file, mcFor the blocks of files being inserted into.Specifically, cloud file The blocks of files m that the owner will be inserted on Cloud ServercIt is inserted into the blocks of files m of cloud file FiBehind, blocks of files mi Corresponding in out of order file F' is blocks of files mj', i.e. blocks of files mj' be insertion position blocks of files.
After receiving the evidence update request, Cloud Server is by retrieving the public audit Hash binary tree PATF' Generate H (mj') adjoint manifold Δ j, and by undated parameter { H (mj′),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud File owners, wherein NPATF'For the cryptographic Hash of all node storages in the public audit Hash binary tree is all set to sky Null value Hash binary tree.Specifically, Cloud Server is in the public audit Hash binary tree PATF'In find the leaf of serial number j Child node, to obtain H (mj') adjoint manifold Δ j.
Public audit label PAL described in cloud file owners' certificationFWhether effectively.
When the public audit label PALF is effective, cloud file owners are by h (H (mj')) and the Δ j substitutions null value Corresponding node in Hash binary tree is to obtain the corresponding cryptographic Hash of root node and the update of the public audit Hash binary tree Certification tree.
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the public audit Hash binary tree The corresponding cryptographic Hash of root node.
In Sigα(H (R'))=SigαWhen (H (R)) is set up, operation is updated to be updated to the update certification tree Update certification tree afterwards:First node and second node are generated in the update certification tree, the second node storage is to be inserted The cryptographic Hash of group's cryptographic Hash of the blocks of files entered and the left and right child pointers of the second node are all sky, make the first node Left pointer be directed toward it is described update certification tree in serial number j leaf node, make the first node right pointer direction described in Second node makes the pointer for being directed toward the leaf node of serial number j in the update certification tree originally transfer to be directed toward the first segment Point obtains the corresponding cryptographic Hash of root node of the update certification tree.
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα (H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree.
According to PALF'=oid | | filename | | n+1 | | u | | SSigssk(h (oid | | filename | | n+1 | | u)) obtain Obtain updated public audit label, wherein PAL'FFor updated public audit label.
According toCalculate the All Files after the blocks of files of insertion position The updated signature evidence of block, wherein σ "qFor the updated signature evidence of q-th of blocks of files in out of order file, j+1≤q≤n+ 1 and q is positive integer, m "j+1=mc, m "p+1=mp', j+1≤p≤n.
By updated public audit label, updated integrality signature evidence, insertion position blocks of files after The updated signature evidence of All Files block and updated update certification tree are uploaded to Cloud Server.
Cloud Server is verified updated public audit label using public key pk, updated integrality signature evidence, is inserted Enter whether the updated signature evidence of All Files block and updated update certification tree after the blocks of files of position have Effect.
Public audit label in the updated, updated integrality signature evidence, insertion position blocks of files after When the updated signature evidence of All Files block and effective updated update certification tree, carries out corresponding data and replace simultaneously root According toObtain updated cloud file Outsourcing evidence is stored, and updated cloud file storage outsourcing evidence is returned into cloud file owners and is preserved, wherein OSPF' it is that updated cloud file stores outsourcing evidence.
Embodiment 5
The present embodiment provides a kind of cloud file integrality public audit method, this method is used by public audit third party, The evidence of public audit can be used any embodiment in 1~embodiment of embodiment 4 and obtain, and the public audit method includes:
The public audit label of audit document is asked to Cloud Server.Specifically, public audit third party obtains cloud file After the owner authorizes, the file of the identification identifier oid names in public audit file directory with cloud file owners is opened, The filename filename of the cloud file (hereinafter referred to as audit document) to be audited, corresponding cloud text are selected from this document folder again Part F.Public audit third party's transmission data oid | | filename to Cloud Server is to ask the public audit label of cloud file F PALF, cloud service server retrieves and returns public audit label PALF
Whether the public audit label for verifying audit document is effective.Specifically, public audit third party is all with cloud file The public audit label PAL of the public key spk verification cloud files F of personF.If the file number of blocks n and random number u of cloud file F are to have Data are imitated, then verify the public audit label PAL of cloud file FFEffectively.
In the public audit label PAL of audit documentFWhen effective, r is randomly choosed from the blocks of files serial number of audit document A serial number configuration file block serial number set { k1,…,kr, and be each element corresponding selection one in blocks of files serial number set Random number is to form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, kiFor blocks of files serial number collection I-th of element in conjunction,For the corresponding random number of i-th of element in blocks of files serial number set, i is positive integer.
After receiving challenge request, Cloud Server according toGenerate data integrity evidence, wherein ProofchalFor the data integrity evidence, For serial number k in the out of order file of audit documentiBlocks of files,ΔkiForAdjoint manifold, NPATF'For the text that will audit The cryptographic Hash of all node storages is all set to empty null value Hash binary tree in the public audit Hash binary tree of part,It is careful Count serial number k in the out of order file of fileiBlocks of files signature evidence.
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited Public audit Hash binary tree the corresponding cryptographic Hash of root node, wherein it is fixed that h (), which is by random length character string maps, The hash function of long character string;
Judge e (H (R'), v)=e (Sigα(H(R)),g) whether true, wherein e is bilinearity signature mapping, and R' is careful Count the corresponding cryptographic Hash of root node of the public audit Hash binary tree of file.
In e (H (R'),v)=e (Sigα(H (R)), g) set up when, judgeIt is No establishment, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking, Data are not tampered with, and otherwise judge that audit document does not pass through integrity checking.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (10)

1. a kind of cloud file integrality public audit evidence generation method, which is characterized in that including:
It is blocks of files by cloud file division;
Public audit label is generated, the public audit label includes the text of the identification identifier of cloud file owners, cloud file Part name, file number of blocks and random number;
Scramble file block sequence generates the signature evidence of each blocks of files in out of order file to obtain text to form out of order file Part block signature evidence set;
Binary tree structure is used sequentially to store the cryptographic Hash of group's cryptographic Hash of each blocks of files in out of order file to obtain open examine Count Hash binary tree;
Public audit order-preserving evidence is generated, the public audit order-preserving evidence includes the integrality signature evidence and described of cloud file Public audit Hash binary tree;
By the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order text Part is uploaded to Cloud Server and is stored;
Cloud Server verifies the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence And effectively whether out of order file;
In the public audit label, blocks of files signature evidence set, the public audit order-preserving evidence and out of order text When part is effective, Cloud Server generates cloud file according to the public audit label and stores outsourcing evidence, and by the cloud file Storage outsourcing evidence returns to cloud file owners and preserves.
2. cloud file integrality public audit evidence generation method according to claim 1, which is characterized in that in the public affairs It sits at session in meter Hash binary tree, there are each non-leaf nodes two subtrees, each leaf node to correspond to one blocks of files of storage Group's cryptographic Hash cryptographic Hash, the file block sequence of out of order file is that public audit Hash binary tree described in preorder traversal obtains Leaf node sequence.
3. cloud file integrality public audit evidence generation method according to claim 1, which is characterized in that the disclosure Label audit according to PALF=oid | | filename | | n | | u | | SSigssk(h (oid | | filename | | n | | u)) generate, In, PALFFor the public audit label, oid is the identification identifier of cloud file owners, and filename is the text of cloud file Part name, n are file number of blocks, and u be random number and u ∈ G, G are multiplicative cyclic groups that rank be Big prime p, and SSig () is digital label Name function, ssk are the private key of cloud file owners, and h () is by Hash letter that random length character string maps are fixed-length string Number, | | for concatenation operator.
4. cloud file integrality public audit evidence generation method according to claim 3, which is characterized in that the file Block signs evidence set according to PABPF={ σi}1≤i≤nIt obtains, wherein PABPFFor blocks of files signature evidence set, σiFor In out of order file the signature evidence of i-th of blocks of files andSig () is bilinearity label Name function, α are random number and α ∈ Zp, ZpIt is the addition cyclic group that mould is Big prime p, H () is to follow character string maps to multiplication The hash function of ring group G, m 'iFor i-th of blocks of files in out of order file, h'() it is by character string maps to addition cyclic group Zp's Hash function, i are positive integer.
5. cloud file integrality public audit evidence generation method according to claim 4, which is characterized in that the disclosure Order-preserving evidence audit according to PASPF={ Sigα(H(R)),PATF'Generate, wherein PASPFFor the public audit order-preserving evidence, Sigα(H (R)) is integrality signature evidence, PATF'For the public audit Hash binary tree, R is the public audit Hash two Pitch the corresponding cryptographic Hash of root node of tree.
6. cloud file integrality public audit evidence generation method according to claim 5, which is characterized in that the cloud text Part store outsourcing evidence according to It generates, wherein OSPFOutsourcing evidence, sk are stored for the cloud fileCSPFor the private key of cloud service provider.
7. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include changing When written document block evidence update operation, it is described rewrite blocks of files when evidence update operation include:
Evidence update request (M, filename, j) is sent to Cloud Server, wherein M indicates that rewriting operation, j are the text before rewriting Serial number of the part block in out of order file;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree (m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF'To return to cloud file all Person, wherein m 'jFor the blocks of files before rewriting, NPATF'For by the Kazakhstan of all nodes storage in the public audit Hash binary tree Uncommon value is all set to empty null value Hash binary tree;
Cloud file owners are by h (H (m'j)) and the corresponding nodes that substitute into the null value Hash binary tree of Δ j to obtain the public affairs Sit at session the corresponding cryptographic Hash of root node and the update certification tree of meter Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, by the leaf node storage of serial number j in the update certification tree Cryptographic Hash is by h (H (m'j)) replace with h (H (m "j)) to form updated update certification tree, and obtain the update certification tree The corresponding cryptographic Hash of root node, wherein m "jFor revised blocks of files;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According toCalculate the signature evidence of revised blocks of files;
Updated integrality is signed on the signature evidence of evidence, updated update certification tree and revised blocks of files It reaches Cloud Server and carries out corresponding data replacement.
8. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include deleting When except blocks of files evidence update operation, it is described delete blocks of files when evidence update operation include:
Evidence update request (D, filename, j) is sent to Cloud Server, wherein D indicates that delete operation, j are the text being deleted Serial number of the part block in out of order file;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree (m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud file The owner, wherein m 'jFor deleted file block, NPATF'For all nodes in the public audit Hash binary tree are stored Cryptographic Hash be all set to empty null value Hash binary tree;
Whether public audit label is effective described in cloud file owners' certification;
When the public audit label is effective, cloud file owners are by h (H (m'j)) and the Δ j substitutions null value Hash y-bend Corresponding node in tree is to obtain the corresponding cryptographic Hash of root node and the update certification tree of the public audit Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, make the leaf node that serial number j is directed toward in the update certification tree The pointer of father node is directed toward the brotgher of node of the leaf node of the serial number j and deletes serial number j in the update certification tree Leaf node to form updated update certification tree, calculate the corresponding cryptographic Hash of root node of the update certification tree;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According to PAL'F=oid | | filename | | n-1 | | u | | SSigssk(h (oid | | filename | | n-1 | | u)) calculate update Public audit label afterwards, wherein PAL 'FFor updated public audit label;
According toCalculate the All Files block update after deleted file block Signature evidence afterwards, wherein σ 'q-1For the updated signature evidence of the q-1 blocks of files, j+1≤q≤n and q in out of order file For positive integer;
By all texts after updated public audit label, updated integrality signature evidence, deleted file block The updated signature evidence of part block and updated update certification tree are uploaded to Cloud Server;
Cloud Server verify updated public audit label, updated integrality signature evidence, deleted file block it Whether the updated signature evidence of All Files block and updated update certification tree afterwards be effective;
All texts after public audit label in the updated, updated integrality signature evidence, deleted file block When the updated signature evidence of part block and effective updated update certification tree, carries out corresponding data and replace simultaneously basisIt obtains more Cloud file after new stores outsourcing evidence, and updated cloud file storage outsourcing evidence is returned to cloud file owners and is carried out It preserves, wherein OSP 'FOutsourcing evidence is stored for updated cloud file.
9. cloud file integrality public audit evidence generation method according to claim 6, which is characterized in that further include inserting Evidence update operation when entering blocks of files, evidence update operation when being inserted into blocks of files include:
Evidence update request (I, filename, j, m are sent to Cloud Serverc), wherein I indicates insertion operation, and j is insertion position Serial number of the blocks of files in out of order file, mcFor the blocks of files being inserted into;
After receiving the evidence update request, Cloud Server generates H by retrieving the public audit Hash binary tree (m'j) adjoint manifold Δ j, and by undated parameter { H (m'j),Δj,Sigα(H(R)),NPATF',PALFReturn to cloud file The owner, wherein m'jFor the blocks of files of insertion position, NPATF'For all nodes in the public audit Hash binary tree are deposited The cryptographic Hash of storage is all set to empty null value Hash binary tree;
Whether public audit label is effective described in cloud file owners' certification;
When the public audit label is effective, cloud file owners are by h (H (m'j)) and the Δ j substitutions null value Hash y-bend Corresponding node in tree is to obtain the corresponding cryptographic Hash of root node and the update certification tree of the public audit Hash binary tree;
Judge Sigα(H (R'))=SigαWhether (H (R)) be true, wherein R' is the root section of the public audit Hash binary tree The corresponding cryptographic Hash of point;
In Sigα(H (R'))=SigαWhen (H (R)) is set up, it is updated to obtain that operation is updated to the update certification tree Update certification tree:First node and second node are generated in the update certification tree, what the second node storage was inserted into The cryptographic Hash of group's cryptographic Hash of blocks of files and the left and right child pointers of the second node are all sky, make a left side for the first node Pointer is directed toward the leaf node of serial number j in the update certification tree, and the right pointer of the first node is made to be directed toward described second Node makes the pointer for being directed toward the leaf node of serial number j in the update certification tree originally transfer to be directed toward the first node, obtains Obtain the corresponding cryptographic Hash of root node of the update certification tree;
Updated integrality signature evidence Sig is calculated according to the corresponding cryptographic Hash of root node of the update certification treeα(H (R ")), wherein R " is the corresponding cryptographic Hash of root node of the update certification tree;
According to PAL'F=oid | | filename | | n+1 | | u | | SSigssk(h (oid | | filename | | n+1 | | u)) updated Public audit label afterwards, wherein PAL'FFor updated public audit label;
According toAll Files block after the blocks of files of calculating insertion position is more Signature evidence after new, wherein σ "qFor the updated signature evidence of q-th of blocks of files in out of order file, j+1≤q≤n+1 and q For positive integer, m "j+1=mc, m "p+1=m 'p, j+1≤p≤n;
By updated public audit label, updated integrality signature evidence, insertion position blocks of files after it is all The updated signature evidence of blocks of files and updated update certification tree are uploaded to Cloud Server;
Cloud Server verify updated public audit label, updated integrality signature evidence, insertion position blocks of files Whether the updated signature evidence of All Files block and updated update certification tree later be effective;
Public audit label in the updated, updated integrality signature evidence, insertion position blocks of files after it is all When the updated signature evidence of blocks of files and effective updated update certification tree, carries out corresponding data and replace simultaneously basisIt is updated Cloud file afterwards stores outsourcing evidence, and updated cloud file storage outsourcing evidence is returned to cloud file owners and is protected It deposits, wherein OSP 'FOutsourcing evidence is stored for updated cloud file.
10. a kind of cloud file integrality public audit method, which is characterized in that using according to described in any one of claim 1 to 9 The public audit evidence that is generated of cloud file integrality public audit evidence generation method, the public audit method includes:
The public audit label of audit document is asked to Cloud Server;
Whether the public audit label for verifying audit document is effective;
When the public audit label of audit document is effective, r serial number structure is randomly choosed from the blocks of files serial number of audit document At blocks of files serial number set { k1,…,kr, and for one random number of each element corresponding selection in blocks of files serial number set with Form challenge requestIt is sent to Cloud Server, wherein 1≤r≤n, n are the file number of blocks of audit document, kiFor i-th of element in blocks of files serial number set,For the corresponding random number of i-th of element in blocks of files serial number set, i is just Integer;
After receiving challenge request, Cloud Server according to Generate data integrity evidence, whereinFor the data integrity evidence, H () is by character string maps to multiplicative cyclic group G Hash function, G be rank be Big prime p multiplicative cyclic group,For serial number k in the out of order file of audit documentiText Part block, Δ kiForAdjoint manifold, Sigα(H (R)) is the integrality signature evidence of audit document, NPATF'For that will examine The cryptographic Hash for counting all node storages in the public audit Hash binary tree of file is all set to empty null value Hash binary tree, h' () is by character string maps to addition cyclic group ZpHash function,For serial number k in the out of order file of audit documenti's The signature evidence of blocks of files;
It willThe corresponding node in the null value Hash binary tree is substituted into the file that is audited The corresponding cryptographic Hash of root node of public audit Hash binary tree, wherein it is fixed length that h (), which is by random length character string maps, The hash function of character string;
Judge e (H (R'), v)=e (Sigα(H (R)), g) it is whether true, wherein and e is bilinear map, and R' is audit document The corresponding cryptographic Hash of root node of public audit Hash binary tree, the generation member that g is multiplicative cyclic group G, v is cloud file owners Bilinearity public signature key;
In e (H (R'), v)=e (Sigα(H (R)), g) set up when, judgeWhether It sets up, wherein u is random number and u ∈ G;
When establishment, audit document is judged by integrity checking, otherwise judges to examine Meter file does not pass through integrity checking.
CN201610118988.0A 2016-03-02 2016-03-02 Cloud file integrality public audit evidence generation method and public audit method Active CN105787389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610118988.0A CN105787389B (en) 2016-03-02 2016-03-02 Cloud file integrality public audit evidence generation method and public audit method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610118988.0A CN105787389B (en) 2016-03-02 2016-03-02 Cloud file integrality public audit evidence generation method and public audit method

Publications (2)

Publication Number Publication Date
CN105787389A CN105787389A (en) 2016-07-20
CN105787389B true CN105787389B (en) 2018-07-27

Family

ID=56386846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610118988.0A Active CN105787389B (en) 2016-03-02 2016-03-02 Cloud file integrality public audit evidence generation method and public audit method

Country Status (1)

Country Link
CN (1) CN105787389B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231370A (en) * 2017-06-23 2017-10-03 成都鼎智汇科技有限公司 A kind of data monitoring method based on cloud computing
CN107343008A (en) * 2017-07-17 2017-11-10 山东超越数控电子有限公司 A kind of data safety isolation of anti-access module leakage is with sharing implementation method
CN107612969B (en) * 2017-08-16 2020-01-14 中国民航大学 B-Tree bloom filter-based cloud storage data integrity auditing method
CN108229208B (en) * 2018-01-08 2021-03-23 华侨大学 Public auditing method for multi-copy data in cloud storage service
CN108418796B (en) * 2018-01-30 2020-12-18 西安电子科技大学 Cloud data multi-copy integrity verification and association deletion method and cloud storage system
CN109583229B (en) * 2018-10-30 2021-05-11 中国科学院信息工程研究所 Privacy information tracing and evidence obtaining method, device and system
CN109688103B (en) * 2018-11-09 2021-07-16 杭州安恒信息技术股份有限公司 Auditable encryption storage method
CN109586896B (en) * 2018-11-14 2021-09-03 陕西师范大学 Data integrity verification method based on Hash prefix tree
CN110912706B (en) * 2019-11-15 2021-08-03 东北大学 Identity-based dynamic data integrity auditing method
CN110958116B (en) * 2019-12-06 2021-02-26 中山大学 Multi-copy cloud data integrity auditing method based on lattice signature
CN111898164B (en) * 2020-07-02 2024-03-29 武汉纺织大学 Data integrity auditing method supporting label block chain storage and query
CN115037507B (en) * 2022-04-22 2024-04-05 京东科技控股股份有限公司 User access management method, device and system
CN118467506A (en) * 2024-05-29 2024-08-09 成都虚谷伟业科技有限公司 Method and system for auditing out-of-order data in time sequence database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067363A (en) * 2012-12-20 2013-04-24 华中科技大学 Index conversion method for public data integrity checking
CN103218574A (en) * 2013-04-09 2013-07-24 电子科技大学 Hash tree-based data dynamic operation verifiability method
CN105072086A (en) * 2015-07-06 2015-11-18 武汉科技大学 Cloud-storage batch auditing method based on MapReduce
CN105095794A (en) * 2015-07-20 2015-11-25 武汉科技大学 Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067363A (en) * 2012-12-20 2013-04-24 华中科技大学 Index conversion method for public data integrity checking
CN103218574A (en) * 2013-04-09 2013-07-24 电子科技大学 Hash tree-based data dynamic operation verifiability method
CN105072086A (en) * 2015-07-06 2015-11-18 武汉科技大学 Cloud-storage batch auditing method based on MapReduce
CN105095794A (en) * 2015-07-20 2015-11-25 武汉科技大学 Verification method for dynamic cloud data integrity based on balanced Merkle Hash tree

Also Published As

Publication number Publication date
CN105787389A (en) 2016-07-20

Similar Documents

Publication Publication Date Title
CN105787389B (en) Cloud file integrality public audit evidence generation method and public audit method
US20230410215A1 (en) Cryptographic method and system for secure extraction of data from a blockchain
US11888992B2 (en) System and method for generating digital marks
CN101004805B (en) Digital document management system, digital document management method
CN106301789A (en) Apply the dynamic verification method of the cloud storage data that linear homomorphism based on lattice signs
CN103560882B (en) A kind of elliptic curve cipher system based on mark
CN105760781B (en) The storage method, restoration methods and operating method of large data files can be deduced in order
JP2020511017A (en) System and method for implementing blockchain-based digital certificates
CN104978239B (en) A kind of method, apparatus and system realizing more Backup Data dynamics and updating
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN109586896A (en) A kind of data integrity verification method based on Hash prefix trees
CN110263584A (en) A kind of data integrity auditing method and system based on block chain
CN108123934A (en) A kind of data integrity verifying method towards mobile terminal
CN111783148A (en) Justice-supporting lightweight multi-copy data cloud auditing method and device
CN110225012B (en) Method for checking and updating ownership of outsourced data based on alliance chain
CN112613601A (en) Neural network model updating method, device and computer storage medium
CN109117672A (en) Carry out the hiding cloud storage Data Audit method of sensitive information
CN106790311A (en) Cloud Server stores integrality detection method and system
CN106611136A (en) Data tampering verification method in cloud storage
Mo et al. Enabling non-repudiable data possession verification in cloud storage systems
CN107612969A (en) Cloud storage data integrity auditing method based on B Tree Bloom filters
Lashkami et al. A blockchain based framework for complete secure data outsourcing with malicious behavior prevention
CN105338004B (en) The applicable public audit method with secret protection of low-performance equipment under cloud environment
CN111259454B (en) Non-interactive data integrity auditing method, fair payment method and system
CN113992389A (en) SGX data integrity auditing method based on dynamic frequency table

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant