CN103002040B - Method for checking cloud computation user data - Google Patents

Method for checking cloud computation user data Download PDF

Info

Publication number
CN103002040B
CN103002040B CN201210543765.0A CN201210543765A CN103002040B CN 103002040 B CN103002040 B CN 103002040B CN 201210543765 A CN201210543765 A CN 201210543765A CN 103002040 B CN103002040 B CN 103002040B
Authority
CN
China
Prior art keywords
user
tpa
data
cloud server
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210543765.0A
Other languages
Chinese (zh)
Other versions
CN103002040A (en
Inventor
季一木
康家邦
王汝传
孙力娟
王振洪
马晓东
韩志杰
付雄
戴华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU YITONG HIGH-TECH Co Ltd
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
JIANGSU YITONG HIGH-TECH Co Ltd
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU YITONG HIGH-TECH Co Ltd, Nanjing Post and Telecommunication University filed Critical JIANGSU YITONG HIGH-TECH Co Ltd
Priority to CN201210543765.0A priority Critical patent/CN103002040B/en
Publication of CN103002040A publication Critical patent/CN103002040A/en
Application granted granted Critical
Publication of CN103002040B publication Critical patent/CN103002040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for checking cloud computation user data. In order to guarantee the completeness of user data and save user calculation resources and communication burdens, establishment of reliable checking systems is pivotal. The checking is performed by aid of a third party auditor (TPA) for acting for users. The TPA can act for users to check data completeness periodically, and a technique based on homomorphic linear certification is utilized to guarantee that the TPA can act for users to form checking work accurately on the premise of not obtaining user data, accordingly, privacy is protected, the safety of cloud computation user data is guaranteed. In order to improve safety and reliability, the technical scheme is improved, and a user data block authentication process is added, so that the TPA acts for checking user data block signature before data block checking, and the checking reliability is improved.

Description

A kind of method that cloud computation user data checks
Technical field
The present invention is secure user data solution under the cloud computing environment based on Open Source Platform, under being mainly used in solving cloud environment, terminal use is for data security and completeness guarantee's problem, ensure that user effectively can ensure secure user data under the security inspection of data being given to third-party prerequisite, belong to cloud computing security fields.
Background technology
Cloud computing is the another large computation schema that computer realm proposes after grid computing, Distributed Calculation, and cloud computing can be divided into three kinds of service mode: IaaS (Infrastructure-as-a-service), and namely infrastructure serve.Consumer can obtain service from perfect computer based Infrastructure, PaaS (Platform-as-a-Service) by Internet, and namely platform serves, and in fact Paas refers to the platform of research and development of software as one service.SaaS(Software-as-a-Service), namely software serve, and it is the pattern being provided software by Internet, and user without the need to buying software, but rents the software of sing on web to provider, carry out management enterprise business activities.Relative to traditional calculations pattern, cloud computing mode has huge advantage:
As required from service, immanent access to netwoks, by use paying, risk transfer.But due to cloud computing mode particularity, user needs their data to be stored on Cloud Server, although the burden of service data to be transferred to Liao Yun supplier there, avoid for software, the cost expense of hardware maintenance and related maintenance personnel, but because user lacks data, the controllability of equipment and environment causes the distrust to cloud computing, user by the environment trustship of the data of oneself and daily process to service provider, lose the control to data, so verification msg storage security is particularly important under the prerequisite not obtaining cloud data, consider the computing capability that cloud user is limited and store the bulkyness of data, user self is relied on to check that in cloud environment, data correctness will be very difficult, therefore in order to ensure fail safe and the saving user computational resource of data, need by means of believable third party examiner TPA(third party auditor) help set up reliable checking mechanism, guarantee integrality and the availability of user data.Thus cloud computing is trusted by user, promote greatly developing, for medium-sized and small enterprises and domestic consumer bring vital interests of cloud computing technology.
Summary of the invention
Technical problem: the object of this invention is to provide a kind of method that cloud computation user data checks; public key technology based on homomorphism certification will be improved; obtain the data-privacy protective effect of public cloud system; due to improvement opportunity; add the reliability of inspection; the integrality of the cloud user data ensured; due to this technology bilinear characteristics; thus make to check that user scope expands to multi-user environment; TPA thus simultaneously can perform multiple inspection task, reduces workload further and improves checking efficiency.
Technical scheme: the concrete steps of the method that a kind of cloud computation user data of the present invention checks are as follows:
1) cloud computing user runs key schedule KeyGenerator order to produce PKI pk and private key sk, KeyGenerator is a kind of key schedule, and user is used for generating PKI and private key;
2) for the user data F=(m of given user file 1... .m n), user data is divided into n block, and each data block is expressed as m i(1≤i≤n), gets name kas each user file unique identification, user runs SigGenerator order to generate the label t of user data F; SigGenerator is used for generating the metadata of certification, comprises MAC, signature, or other relevant information being used to check;
3) signature sigma of each data block is then calculated i, signature set is expressed as Φ={ σ i} 1≤j≤n, { t, F, Φ } is then sent to Cloud Server by user;
4) examination phase: at examination phase, third party checks that first TPA obtains file label t, and then TPA carrys out certifying signature t by public keys pk, if authentification failure just produces represent that inspection makes mistakes FALSE information, shows that label is imperfect, otherwise enters next step;
5) TPA produces challenge information chal, and " chal " specifies the particular location needing checked data block at examination phase, then challenge information is sent to Cloud Server;
6) Cloud Server is once be subject to challenge information chal, will run GeneratorProof to produce to show that data store the response evidence proof of correctness; GeneratorProof is run by Cloud Server, is used for producing the evidence that data store correctness;
7) then Cloud Server sends proof and stores the proof of correctness to TPA as data;
8) after receiving the corresponding evidence that Cloud Server sends, TPA runs VerifyProof order and checks the correctness that data store, if certification is passed through, show that Cloud Server correctly stores user data, finding out from scheme does not need maintenance customer's private key can not bring any added burden to user at examination phase TPA yet, in addition, owing to not needing to obtain user data in checking process, thus the object of secret protection is reached; By third party, VerifyProof checks that TPA runs and is used for checking that server end beams back the correctness of corresponding evidence.
The inspection that described TPA processes from different user is simultaneously acted on behalf of, the technical support of bilinearity aggregate signature is multiple has the signature of multiple different user to different information to aggregate into single signature, K certification equation is aggregated into one, and check while realizing multitask, concrete steps are as follows:
1) have K user in supposing the system, each user k has
F k=(m k, 1, m k, 2...., m k, n), k ∈ 1 ...., K}, for specific user k, KeyGenerator order generation system public keys pk and private key pk;
2) establishment stage: for each user data F k=(m k, 1, m k, 2...., m k, n), k ∈ 1 ...., K}, gets name kas each user file unique identification, user runs the label t that SigGenerator order carrys out calculation document F k=name k|| SSig sk(name k), SSig sk(name k) be by name kwith the signature that a kth private key for user produces;
3) then each user k calculates each data block m k, i(i ∈ 1 ... .n}) signature { σ k,i} 1≤k≤K(i=1 ..., n); Signature set is expressed as Φ k={ σ k,i} 1≤i≤n; User is then by { t k, F k, Φ kbe sent to Cloud Server;
4) first examination phase: TPA obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys ssk(name k), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5) then TPA sends and checks that challenge information chal acts on behalf of the data checks of all K user to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., and k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k;
6) Cloud Server then having property of return data evidence P={proof i} 1≤i≤kto TPA, similar with unique user example, TPA runs the correctness that VerifyProof acts on behalf of k user authentication data storage, and batch inspection not only allows TPA to complete multiple check work simultaneously, and the calculating of the traffic and TPA end that greatly reduce cloud server end spends.
Beneficial effect:
1. allow cloud computing user the work of inspection to be submitted to computational resource and the stronger third party of reliability checks, reduce burden that user carries out separately checking and complexity.
2., owing to adding the inspection to data file signature, the reliability checked is improved further, expands the further use of cloud computing.
3. third party is not obtaining user data and carrying out the inspection work of user data correctness under bringing the prerequisite of added burden to cloud computing user, reaches the effect of secret protection.
4. this scheme supports easily extensible and efficient public inspection in cloud computing, particularly supports batch inspection from different user inspection agency, compares concrete single inspection and wants many efficiently with other schemes, and do not bring the increase of communication and amount of calculation.
Accompanying drawing explanation
Fig. 1 cloud computing data security check system general frame figure,
Fig. 2. diagram shown in scheme 1,
Fig. 3. diagram shown in scheme 2,
Fig. 4. unique user checking process.
Embodiment
The invention reside in and improve the existing public key technology based on homomorphism certification, be intended to the reliability guaranteeing to check, the i.e. uniqueness mark of user's selecting file, then private key for user spanned file label is used to unique identification, first client public key certifying signature integrality is used in inspection cloud computing user procedures, complete if sign, then continue to check individual data block, owing to adding the proof procedure to user's signature, compare the existing public key technology based on homomorphism certification, add the reliability of inspection, support the secret protection of cloud computation user data in public inspection simultaneously, namely believable third party is issued to the effect of inspection in the process checked in the prerequisite of the user data mustn't go to, compare some to need user data to submit to third party examiner and want safety many to the object reaching inspection, because user does not want oneself privately owned data to check for inspection side, new unsafe factor can be brought like this, simultaneously owing to checking that task will be dull in heavy one by one, support that batch inspection task will improve checking efficiency greatly, by improving homomorphism authentication techniques, our scheme ensure that the reliability of inspection, compare and directly inspection is carried out to the block of user data and compare, higher safety is had to protect, this authentication mode will optimize existing inspection scheme further.Check process will be made a concrete analysis of below.
One, model and architecture
A) cloud stores service relates to three different entities:
1) cloud terminal use U, he has the data needing in a large number to be stored on Cloud Server;
2) Cloud Server CS(cloud server), it is by cloud service provider CSP(cloud serviceprovider) manage and data storage service be provided and have enough memory spaces and huge computational resource (after this, we will not distinguish for CS and CSP);
3) third party checks TPA, and he has the unexistent professional checking ability of cloud user and agent client request checks cloud storage security;
User relies on Cloud Server CS to carry out cloud storage and data maintenance, and user also can carry out obtaining and renewal rewards theory of data with Cloud Server alternately in order to various application purpose.User also can seek help from TPA and guarantee the data security that they store, and wish store data not understand by TPA, we think that TPA is reliable and independently, and can not privately gang up with CS or user in checking process, the phenomenon of any leaking data or loss in CS all will be found when being checked by TPA.Its concrete data security check system frame diagram is as shown in accompanying drawing 1..
B) public check system framework and definition
Public inspection scheme includes four kinds of algorithms, that is: SigGenerator, GeneratorProof, VerifyProof, KeyGenerator is a kind of key schedule, user is used for generating PKI and private key, SigGenerator is used for generating the metadata of certification, comprise MAC, signature, or other relevant information being used to check, GeneratorProof is run by Cloud Server, be used for producing the evidence that data store correctness, VerifyProof is run by TPA and is used for checking that server end beams back the correctness of corresponding evidence.
Our public check system can be divided into two stages by the scheme that checks above, sets up and checks:
● establishment stage: user, by performing the public and private cipher key of KeyGenerator order initialization system, produces data signature label by using private cipher key preprocessed data file F.Then signature set is produced to data block signature, then the signatures tab of data file F and data file signatures tab and data block is stored on Cloud Server.
● first from cloud service, it obtains file label to examination phase: TPA, then use client public key carry out signature authentication, if certification by will send one check or challenge information guarantee Cloud Server during checking complete preservation data file F to Cloud Server.Cloud Server generates corresponding message by performing GeneratorProof order from storage data and verify data unit and feeds back to TPA, and TPA is then by VerifyProof order certification corresponding message!
Two, existing inspection scheme
Basic scheme 1.
The each data block m of cloud computing user precomputation i(i ∈ 1 ... n}) MACs, σ i=MAC si(i|m i), by data file F and MACs{ σ i} 1≤i≤nbe sent on Cloud Server, then private key sk sent to TPA.At examination phase, TPA it is chosen immediately the MACs of some data blocks and their correspondences to confirm the correctness of data file from cloud service, the benefit of this way checks that partial document is easy to many than inspection all files, but, there is following critical defect in this simple solution: needs to obtain user data when 1) TPA checks, this should be prohibited under the prerequisite of privacy of user protection; 2) its communication and computation complexity linear relative to data from the sample survey size, this can cause the extension of the traffic and time delay, particularly particularly evident when limited bandwidth available between TPA and Cloud Server.Its checking process as shown in Figure 2.
Basic scheme 2.
In order to avoid choosing user data from Cloud Server thus protection privacy of user, scheme can make into as follows by we: before user upload the data to Cloud Server, cloud user random selecting s authenticate key { sk τ} 1≤τ≤s, for whole file system, the MACs of precomputation s correspondence, these authorize metadata are submitted to TPA.TPA takes a sk at every turn τto Cloud Server, and require that Cloud Server produces new MAC and compares, so just reach the object of secret protection.The checking process of its correspondence as shown in Figure 3.
Shortcoming:
1) number of times that specific file can be used to check receives the restriction of key number.Once all possible key has been used up, cloud user has to from cloud service, and it has obtained data, thus calculates new MACs for TPA checking from new.
2) TPA has to safeguard state between renewal inspection, records the MAC key had, and considers from multi-user inspection agency potential in a large number, safeguards that so many state is that difficulty produces error with easy for TPA.
This programme: the improvement of the public inspection scheme of secret protection
In order to ensure the reliability checked, in our scheme, existing inspection is improved, the uniqueness mark of first user's selecting file, then private key for user spanned file label is used to unique identification, in inspection cloud computing user procedures, first use client public key certifying signature integrality, if it is complete to sign, then continue to check individual data block, owing to adding the proof procedure to user's signature, compare the existing public key technology based on homomorphism certification, add the reliability of inspection.
In order to be issued to public Checking on effect in the prerequisite not obtaining user data; adopt homomorphism authentication techniques, but, directly adopt these technology and be not suitable for our final purpose; because the linear combination of these data blocks probably demonstrates user data information, violate secret protection principle.Particularly, if the linear combination of the same data block of sufficient amount is collected into, TPA can gently and magnanimous act undertaken for the public good obtains user data content from a series of linear equation.
For this reason, adopt the technology that homomorphism certification combines with random mask, in our agreement, from the linear combination of the data from the sample survey of the response of server cover by the random number that produced by pseudo-random function (PRF), due to the effect covered, TPA is not having the necessary information can setting up correct system of linear equations group, so can not obtain user data content, the linear combination of how many file data blocks is collected into all like this.
Simultaneously, notice in our scheme, we adopt the public key technology based on homomorphism certification, specifically, bilinearity aggregate signature, improves public inspection agreement, and it will make our benifit from multiple design task in the flexibility in polymerization of signing, as shown in Figure 3, in figure, dash area is improved scheme place to its checking process.
Adopt the technology of homomorphism certification can carry out inspection work when user data not being revealed to TPA, make the reliability checked improve further and not bring extra burden to user to the improvement of existing scheme, the support simultaneously criticizing inspection makes the more effective when checking user data of this technology will make a concrete analysis of its inspection step below.
(1) unique user checks scheme
Concrete steps are as follows:
1. establishment stage: cloud computing user runs KeyGenerator order generation system public keys pk and private key sk;
2. for user data F=(m 1... .m n), get name, as file unique identification, user runs the label t=name||SSig that SigGenerator order carrys out calculation document F sk(name), SSig sk(name) be that name private key sk is produced signature;
3. then calculate the signature sigma of each data block i, i ∈ (1 ... n).Signature set is expressed as Φ={ σ i} 1≤i≤n.{ t, F, Φ } is then sent to Cloud Server by user;
4. examination phase: at examination phase, first TPA obtains file label t, and then TPA carrys out certifying signature SSig by public keys pk ssk(name), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5., in order to produce inspection message chal, chal specifies the particular location needing checked data block at examination phase;
6. Cloud Server is once be subject to challenge information proof, will run GeneratorProof to produce to show that data store the response evidence proof of correctness;
7. send proof and store the proof of correctness to TPA as data;
8., after receiving the corresponding evidence that Cloud Server sends, TPA runs VerifyProof order and verifies corresponding correctness by inspection certification equation;
9. if check and pass through, prove storage of subscriber data integrality, user is checked by the agency of third party TPA and passes through, and shows that Cloud Server correctly stores data block;
Clearly the R of random mask does not have anything to affect on the validation verification of data.Concrete flow process as shown in Figure 4.
(2) for the support that the batch of multiple user checks
The inspection work of unique user for TPA be dull with lack efficiency, this programme can support batch inspection, namely the inspection that TPA can process from different user is simultaneously acted on behalf of, the technical support of bilinearity aggregate signature is multiple has the signature of multiple different user to different information to aggregate into single signature, therefore provides effective certification to all information authenticities.Owing to having signature polymerization technique and bilinear characteristic, K certification equation can be aggregated into one by us, therefore checks while multitask that target can realize.
Concrete steps are as follows:
1. have K user in supposing the system, each user k has F k=(m k, 1, m k, 2...., m k, n), k ∈ 1 ...., K}, for specific user k, KeyGenerator order generation system public keys pk and private key pk;
2. establishment stage: for each user data F k=(m k, 1, m k, 2...., m k, n), k ∈ 1 ...., K}, gets name kas each user file unique identification, user runs the label t that SigGen order carrys out calculation document F k=name k|| SSig sk(name k), SSig sk(name k) be by name kwith the signature that a kth private key for user produces;
3. then each user k calculates each data block m k, i(i ∈ 1 ... .n}) signature { σ k,i} 1 < k < K(i=1 ..., n), signature set is expressed as Φ k={ σ k,i} 1 < k < n.User is then by { t k, F k, Φ kbe sent to Cloud Server;
4. first examination phase: TPA obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys ssk(name k), if authentification failure just produces FALSE information.Show that label is imperfect, otherwise enter next step;
5. then TPA sends and checks that challenge information chal acts on behalf of the data checks of all K user to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., and k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k;
6. Cloud Server then having property of return data evidence P={proof i} 1≤i≤kto TPA, similar with unique user example, TPA runs the correctness that VerifyProof acts on behalf of k user authentication data storage.Criticize and check that not only permission TPA completes multiple check work simultaneously, and greatly reduce the traffic of cloud server end and the calculating cost of TPA end.

Claims (2)

1. a method for cloud computation user data inspection, is characterized in that the concrete steps of the method are as follows:
1) cloud computing user runs key schedule KeyGenerator order to produce PKI pk and private key sk, KeyGenerator is a kind of key schedule, and user is used for generating PKI and private key;
2) for the user data F=(m of given user file 1... .m n), user data is divided into n block, and each data block is expressed as m i(1≤i≤n), gets name kas each user file unique identification, user runs SigGenerator order to generate the label t of user data F; SigGenerator is used for generating the metadata of certification, comprises MAC, signature, or other relevant information being used to check;
3) signature sigma of each data block is then calculated i, signature set is expressed as Φ={ σ i} 1≤i≤n, { t, F, Φ } is then sent to Cloud Server by user;
4) examination phase: at examination phase, third party checks that first TPA obtains file label t, and then TPA carrys out certifying signature t by public keys pk, if authentification failure just produces represent that inspection makes mistakes FALSE information, show that label is imperfect, otherwise enter next step;
5) TPA produces challenge information chal, and " chal " specifies the particular location needing checked data block at examination phase, then challenge information is sent to Cloud Server;
6) Cloud Server is once receive challenge information chal, will run GeneratorProof to produce to show that data store the response evidence proof of correctness; GeneratorProof is run by Cloud Server, is used for producing the evidence that data store correctness;
7) then Cloud Server sends proof and stores the proof of correctness to TPA as data;
8) after receiving the corresponding evidence that Cloud Server sends, TPA runs VerifyProof order and checks the correctness that data store, if certification is passed through, show that Cloud Server correctly stores user data, finding out from scheme does not need maintenance customer's private key can not bring any added burden to user at examination phase TPA yet, in addition, owing to not needing to obtain user data in checking process, thus the object of secret protection is reached; By third party, VerifyProof checks that TPA runs and is used for checking that server end beams back the correctness of corresponding evidence.
2. the method for cloud computation user data inspection according to claim 1, it is characterized in that the inspection that described TPA processes from different user is simultaneously acted on behalf of, the technical support of bilinearity aggregate signature is multiple has the signature of multiple different user to different information to aggregate into single signature, K certification equation is aggregated into one, check while realizing multitask, concrete steps are as follows:
1) have K user in supposing the system, each user k has
F k=(m k, 1, m k, 2...., m k,n), k ∈ 1 ...., K}, for specific user k, KeyGenerator order generation system public keys pk and private key pk;
2) establishment stage: for each user data F k=(m k, 1, m k, 2...., m k,n), k ∈ 1 ...., K}, gets name kas the unique identification of each user file, user runs the label t that SigGenerator order carrys out calculation document F k=name k|| SSig sk(name k), SSig sk(name k) be by name kwith the signature that a kth private key for user produces;
3) then each user k calculates each data block m k,i(i ∈ 1 ... .n}) signature { σ k,i} 1≤k≤K(i=1 ..., n); Signature set is expressed as Φ k={ σ k,i} 1≤i≤n; User is then by { t k, F k, Φ kbe sent to Cloud Server;
4) first examination phase: TPA obtains the file label t of each user k k, then TPA verifies each user's signature SSig by public keys ssk(name k), if authentification failure just produces FALSE information, show that label is imperfect, otherwise enter next step;
5) then TPA sends and checks that challenge information chal acts on behalf of the data checks of all K user to Cloud Server, Cloud Server after receiving challenge information, for each user i (i ∈ 1 ..., k}), server generates the proof proof of corresponding proof data memory integrity i(i ∈ 1 ..., and k}), then each user's integrity certification is aggregated into P={proof i} 1≤i≤k;
6) Cloud Server then having property of return data evidence P={proof i} 1≤i≤kto TPA, similar with unique user example, TPA runs the correctness that VerifyProof acts on behalf of k user authentication data storage, and batch inspection not only allows TPA to complete multiple check work simultaneously, and the calculating of the traffic and TPA end that greatly reduce cloud server end spends.
CN201210543765.0A 2012-12-14 2012-12-14 Method for checking cloud computation user data Active CN103002040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210543765.0A CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210543765.0A CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Publications (2)

Publication Number Publication Date
CN103002040A CN103002040A (en) 2013-03-27
CN103002040B true CN103002040B (en) 2015-04-08

Family

ID=47930173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210543765.0A Active CN103002040B (en) 2012-12-14 2012-12-14 Method for checking cloud computation user data

Country Status (1)

Country Link
CN (1) CN103002040B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104166821B (en) * 2013-05-17 2017-07-21 华为技术有限公司 A kind of method and apparatus of data processing
CN103825743A (en) * 2014-02-13 2014-05-28 南京邮电大学 Data security aggregation method with privacy protection function
CN104378370B (en) * 2014-11-12 2017-07-07 南京邮电大学 A kind of safe handling method of private data in cloud computing
CN104811300B (en) * 2015-04-22 2017-11-17 电子科技大学 The key updating method of cloud storage and the implementation method of cloud data accountability system
CN105072086B (en) * 2015-07-06 2018-03-02 武汉科技大学 A kind of cloud storage batch auditing method based on MapReduce
CN105227317B (en) * 2015-09-02 2019-04-05 青岛大学 A kind of cloud data integrity detection method and system for supporting authenticator privacy
CN106790303B (en) * 2017-03-23 2019-07-23 西安电子科技大学 The data integrity verification method completed in cloud storage by third party
CN107682379A (en) * 2017-11-22 2018-02-09 南京汽车集团有限公司 Safe information transmission device, transmission method and storage method based on homomorphic cryptography
CN108650097B (en) * 2018-04-28 2021-03-09 上海扈民区块链科技有限公司 Efficient digital signature aggregation method
CN109274504B (en) * 2018-11-20 2021-07-13 桂林电子科技大学 Multi-user big data storage sharing method and system based on cloud platform
US11741254B2 (en) * 2020-04-08 2023-08-29 International Business Machines Corporation Privacy centric data security in a cloud environment
CN115955489B (en) * 2023-03-15 2023-05-23 中国民航大学 Cloud storage-oriented onboard software holding proving method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102647433A (en) * 2012-05-21 2012-08-22 北京航空航天大学 Efficient cloud storage data possession verification method
CN102710757A (en) * 2012-05-21 2012-10-03 北京航空航天大学 Distributed cloud storage data integrity protection method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102647433A (en) * 2012-05-21 2012-08-22 北京航空航天大学 Efficient cloud storage data possession verification method
CN102710757A (en) * 2012-05-21 2012-10-03 北京航空航天大学 Distributed cloud storage data integrity protection method

Also Published As

Publication number Publication date
CN103002040A (en) 2013-03-27

Similar Documents

Publication Publication Date Title
CN103002040B (en) Method for checking cloud computation user data
Bera et al. Designing blockchain-based access control protocol in IoT-enabled smart-grid system
US20210271764A1 (en) Method for storing data on a storage entity
Wei et al. Security and privacy for storage and computation in cloud computing
Yang et al. Provable data possession of resource-constrained mobile devices in cloud computing
Wei et al. SecCloud: Bridging secure storage and computation in cloud
CN109889497B (en) Distrust-removing data integrity verification method
Cai et al. Towards private, robust, and verifiable crowdsensing systems via public blockchains
CN104811450A (en) Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing
CN106254374A (en) A kind of cloud data public audit method possessing duplicate removal function
CN105721158A (en) Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system
Shang et al. Identity-based dynamic data auditing for big data storage
CN103856477A (en) Trusted computing system, corresponding attestation method and corresponding devices
Shao et al. Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment
CN103259663A (en) User unified authentication method in cloud computing environment
Nirmala et al. Data confidentiality and integrity verification using user authenticator scheme in cloud
Yan et al. Integrity audit of shared cloud data with identity tracking
CN108390866A (en) Trusted remote method of proof based on the two-way anonymous authentication of dual-proxy
Xie et al. A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices
Dwivedi et al. Design of blockchain and ECC-based robust and efficient batch authentication protocol for vehicular ad-hoc networks
CN114826572A (en) Decentralized crowdsourcing method and system supporting attribute privacy protection and terminal
Xu et al. An edge computing data privacy-preserving scheme based on blockchain and homomorphic encryption
Qiao et al. An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET
Benrebbouh et al. Enhanced secure and efficient mutual authentication protocol in iot-based energy internet using blockchain
CN116827821B (en) Block chain cloud-based application program performance monitoring method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20130327

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000208

Denomination of invention: Method for checking cloud computation user data

Granted publication date: 20150408

License type: Common License

Record date: 20161110

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000208

Date of cancellation: 20180116

EC01 Cancellation of recordation of patent licensing contract