CN103347085A - Public auditing designing method of multiple writing models of cloud data security - Google Patents

Public auditing designing method of multiple writing models of cloud data security Download PDF

Info

Publication number
CN103347085A
CN103347085A CN2013102921459A CN201310292145A CN103347085A CN 103347085 A CN103347085 A CN 103347085A CN 2013102921459 A CN2013102921459 A CN 2013102921459A CN 201310292145 A CN201310292145 A CN 201310292145A CN 103347085 A CN103347085 A CN 103347085A
Authority
CN
China
Prior art keywords
data
audit
cloud server
cloud
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102921459A
Other languages
Chinese (zh)
Other versions
CN103347085B (en
Inventor
万长胜
周琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310292145.9A priority Critical patent/CN103347085B/en
Publication of CN103347085A publication Critical patent/CN103347085A/en
Application granted granted Critical
Publication of CN103347085B publication Critical patent/CN103347085B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a public auditing designing method of multiple writing models of cloud data security, and belongs to the technical field of cloud computing security. The public auditing designing method of the multiple writing models of the cloud data security comprises the following steps that (1) secret key distribution is conducted, wherein secret key materials are distributed to a cloud server, a third party auditor and a multiple data owner from a secret key server in the secret key distribution stage; (2) data writing stage, the multiple data owner needs to carry out communication with the cloud server CS about data storage and signature; (3) multiple writing model auditing stage, the third party auditor carries out auditing on shared data block set on the cloud server. The public auditing designing method of the multiple writing models of the cloud data security can reduce communication cost of an auditing protocol, and can reduce the operation cost of the auditor. Meanwhile, the public auditing designing method of the multiple writing models of the cloud data security supports multiple writing data source authorization and authentication which are not supported by an existing scheme, and meets the requirement of new safe and high-efficient characteristics of the multiple writer public auditing.

Description

The public audit method for designing that writes model of cloud data security more
Technical field
The present invention relates to a kind of public audit method for designing that writes model of cloud data security more, belong to cloud computing safe practice field.
Background technology
Cloud computing now becomes more and more popular, and data are outsourced in the cloud in the cloud computing.Its advantage is apparent: alleviate data owner's storage administration burden, have the conventional data visit in independent geographical position, and avoid hardware, software, capital expenditures such as personnel's maintenance.Yet the outsourcing data can cause new safety problem.First problem is the integrality of data.Second problem is the truthless Cloud Server CSP of provider.
In order to solve this two problems, need proof to see it is that the CSP of Cloud Server provider is storing data for data owner and user, and data can not revised by the entity beyond the data owner.Because data are stored among the Cloud Server CS, rather than the data owner.Owing to need very high communications cost, be that traditional cryptography primitive of purpose can not directly be used with the protected data integrality.In addition, in cloud computing environment, should before visit data, detect corrupted data.Compare with traditional cryptography primitive, audit is a better choice that can realize storage correctness target in the cloud computing, and it is widely adopted.Audit sampling can make the transfer of data cost reduce.Audit Report is assessed data damage risk before can be implemented in visit data.
A kind of audit program based on symmetric key has been proposed thus.But there are following serious problems in this scheme: (1) if herself data on Cloud Server CS of each data owner DO audit, the communications burden on the Cloud Server CS will be very heavy.When a plurality of data owner DOs audited simultaneously, Denial of Service attack will produce.(2) owing to some data owner of currency reason may not support audit.(3) public credibility of data owner DO audit a little less than.When data collision takes place, be difficult to obtain objective and legal argument timely.
Therefore, need outside the 3rd audit side TPA.Because Cloud Server CS is only audited by the minority third party side of audit rather than a lot of data owner, and data owner DO does not participate in audit phase, audit burden on Cloud Server CS and the data owner DO is all reduced widely, and the Denial of Service attack on the Cloud Server CS also reduces.Because the 3rd audit side TPA is independent of Cloud Server CS and data owner DO, her public credibility is stronger.Based on the Audit Report of the auditing result of the 3rd audit side TPA issue, not only can help the data owner that the cloud data, services of signature is separately carried out risk assessment, and be conducive to the CSP of Cloud Server provider and improve their cloud based on service platform.
Produced the public audit program based on the bilinearity pairing thus.But this scheme is because following safety and efficiency is not suitable for writing person's model more: (1) is the communications cost height of audit in batches.The height that assesses the cost on (2) the 3rd audit side TPA and a plurality of data owner DOs.(3) licensing issue.May cause taking place on the authorization server Denial of Service attack DDOS during writing data blocks simultaneously as many data owner attacks.
Summary of the invention
In order to solve above-mentioned safety and efficiency, the present invention proposes a kind of public audit method for designing that writes model of cloud data security more, this method can provide the encryption key distribution efficiently that satisfies above-mentioned security performance, signature and audit algorithm and agreement.Because data block, makes communications cost and the reduction of the computing cost on the 3rd audit side TPA on the audit agreement by fully polymerization, and effective mandate and data source authentication method are provided aspect the audit of person's model writing more.Its final goal be make up reliable cloud data efficiently write the public audit design system of model more.
The present invention adopts following technical scheme for solving its technical problem:
A kind of public audit method for designing that writes model of cloud data security comprised as the next stage more:
(1) the encryption key distribution stage: key material is distributed to Cloud Server CS, the 3rd audit side TPA and multidata owner DOs from key server, guarantees that the data owner DO that is only having key could write the set of data blocks of sharing;
(2) data write phase: multidata owner DOs need just store data and signature and Cloud Server CS and communicate, and Cloud Server CS must guarantee to have only the multidata owner Dos through mandate could store the set of data blocks of sharing;
(3) write the model audit phase: the shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA is audited more, and the key material that this stage generates the key distribution phase is applied on the data and signature of data write phase generation.
Beneficial effect of the present invention is as follows:
That the present invention guarantees to audit Cloud Server CS is the 3rd audit side TPA, and the data of transmitting in the audit agreement gather, be that the 3rd audit side TPA and Cloud Server CS can't imitate data owner DO generation signature, the 3rd audit side TPA also can't imitate Cloud Server CS.Can also guarantee not have the duplicity Cloud Server in that do not have really to store under the situation of multidata owner DOs data can be from the 3rd audit side TPA by audit phase, and the data of multidata owner DOs can not revealed to the 3rd audit side TPA.
The present invention is a kind of communications cost that can reduce the audit agreement, can reduce public's auditing method of audit side's computing cost again.Simultaneously, it supported existing scheme can not support write data source mandate and authentication more, satisfied the new safety and the efficient characteristics that write the public audit of person more.
By safety analysis and performance evaluation, this method meets desired fail safe target and has obtained efficient preferably.The research of this method is to improving public's audit technique of cloud data, so promote China's cloud data service development and the prosperity internet economy significant.
Description of drawings
Fig. 1 is the system model that writes person's audit program more.
Fig. 2 is the trust model figure of this method for designing.
Fig. 3 is encryption key distribution stage flow chart.
Fig. 4 is data write phase flow chart.
Fig. 5 writes person's audit phase flow chart more.
Embodiment
Below in conjunction with accompanying drawing the invention is described in further details.
Do not write the system model of person's audit program as shown in Figure 1 more.It comprises the entity that this scheme relates to, the agreement of linking up between these entities, and the algorithm that moves in agreement.
The present invention has defined five kinds of entities: one group of multidata owner Dos, user, Cloud Server CS, the 3rd audit side TPA and key server.Key server is used for the key of management Cloud Server CS, the 3rd audit side TPA and multidata owner DOs, also is used for authorizing multidata owner DOs writing data blocks.Multidata owner DOs need just store data and signature and Cloud Server CS and communicate, and Cloud Server CS must guarantee to have only the multidata owner DOs through authorizing can store shared set of data blocks.Shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA is audited, and the key material that the key distribution phase generates is applied on the data and signature of data write phase generation.
The design basis of this programme is: trust model." trust model " refers to one group of trusting relationship of setting up in advance (being escape way) in safety approach.Design a safety approach, must at first define trust model.This programme breaks the wall of mistrust in advance between key server (as aaa server), data owner DO, Cloud Server CS, the 3rd audit side TPA and concerns PTR.The trust model of this method for designing is illustrated in fig. 2 shown below:
On the whole, the invention provides a kind of public audit method for designing that writes model of cloud data security, this method can reduce the communications cost of audit agreement more, can reduce public's auditing method of audit side's computing cost again.Simultaneously, it supported existing scheme can not support write data source mandate and authentication more, satisfied the new safety and the efficient characteristics that write the public audit of person more.
Concrete division is as follows:
(1) of the present inventionly proposed a kind of new cipher key distribution mechanisms, having comprised:
Cipher key distribution mechanisms realized key material from key server to Cloud Server CS, the distribution of the 3rd audit side TPA and data owner DO.Key server goes out Cloud Server CS according to this function calculation then by certain rule and method construct Lagrange's interpolation function, and each self-corresponding key of the 3rd audit side TPA and data owner DO is also distributed to this three corresponding entities.
This embodiment makes each data owner DO after the initialization, Cloud Server CS, and the 3rd audit side TPA has key material separately.Guaranteed that the data owner DO that is only having key just can write the set of data blocks of sharing.
(2) of the present inventionly proposed a kind of new data writing mechanism, having comprised:
The data writing mechanism has realized that multidata owner DOs can communicate with regard to storing data and signature problem and Cloud Server CS.After the data block of data owner DO was signed, Cloud Server CS determined whether to store data by the legitimacy of integrity check algorithm inspection signature according to assay.
This embodiment makes Cloud Server CS can guarantee to have only the multidata owner DOs through authorizing can store shared set of data blocks.
(3) the present invention proposes a kind of new person's model Audit Mechanism that writes more, comprising:
Do not write the audit that person's model Audit Mechanism has realized the shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA more.The 3rd audit side TPA verifies the data that Cloud Server CS utilizes the proof algorithm to obtain by verification algorithm, thereby reaches the purpose of audit.
This embodiment finishes on embodiment one and two basis and writes the model audit process more, thereby has realized the key material that the key distribution phase generates is applied on the data and signature of data write phase generation.
By above-mentioned audit process, thereby judge whether most pieces are correctly stored in the file.
The technical scheme that is provided by the embodiment of the invention described above as can be seen, this invention is a kind of communications cost that can reduce the audit agreement, can reduce public's auditing method of audit side's computing cost again.Simultaneously, it supported existing scheme can not support write data source mandate and authentication more, satisfied the new safety and the efficient characteristics that write the public audit of person more.
Embodiments of the invention comprise the three parts content: (1) encryption key distribution stage; (2) data write phase; (3) write the model audit phase more.
Breaking the wall of mistrust the model stage, key server is an entity of being trusted, it respectively with Cloud Server CS, the 3rd audit side TPA and the data owner DO relation of breaking the wall of mistrust.
In the encryption key distribution stage, realized key material from key server to Cloud Server CS, the distribution of the 3rd audit side TPA and multidata owner DOs.
In the data write phase, realized that multidata owner DOs can communicate with regard to problem and the Cloud Server CS of storage data and signature.
Write person's audit phase more, realizing the audit of the shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA.
The above-mentioned three parts content model that at first breaks the wall of mistrust is given Cloud Server CS by the key server distributing key then, and the 3rd audit side TPA and data owner DO connect down and finish the data write phase, and realization at last writes person's audit phase more.
For ease of the understanding to the embodiment of the invention, will describe embodiments of the invention below.
Embodiment one
Encryption key distribution is finished in the present embodiment design.Encryption key distribution purpose be: give Cloud Server CS, the 3rd audit side TPA and data owner DO distribution key material separately.Include but not limited to following steps (adopting form to represent):
Step Content
100 Elliptic curve of key server structure and Lagrange's interpolation function, and by the parameter generation authentication of elliptic curve and the key of auditing.
102 Key server goes out the key material of data owner DO correspondence according to the Lagrange's interpolation function calculation, and distributes to this data owner DO.
104 Key server is according to the key material of Lagrange's interpolation function calculation Cloud Server CS correspondence, and distributes to this data owner's Cloud Server CS.
106 Key server is distributed to TPA with the key material of the 3rd audit side TPA correspondence.
The agreement flow process of present embodiment is illustrated in fig. 3 shown below.
Step among the embodiment one is described as follows:
(1) step 100: key server is at first created an elliptic curve according to basic point G and exponent number n
Figure 632923DEST_PATH_IMAGE001
The parameter of elliptic curve is by Cloud Server CS, and the 3rd audit side TPA and multidata owner DOs know.Key server uses two keys that generate at random
Figure 264893DEST_PATH_IMAGE002
Make up the Lagrange's interpolation function.Calculate authentication and audit key then
Figure 100475DEST_PATH_IMAGE003
(2) step 102: key server will
Figure 83474DEST_PATH_IMAGE004
(wherein Be elliptic curve,
Figure 214427DEST_PATH_IMAGE005
Be the parameter that is calculated at the data owner DO that authorizes by the Lagrange's interpolation function) distribute to corresponding data owner DO.
(3) step 104: key server will
Figure 240152DEST_PATH_IMAGE006
(wherein
Figure 694136DEST_PATH_IMAGE001
Be elliptic curve,
Figure 830719DEST_PATH_IMAGE007
Be authentication and audit key,
Figure 420970DEST_PATH_IMAGE008
A number that produces at random for key server,
Figure 679913DEST_PATH_IMAGE009
Be by the Lagrange's interpolation function at The parameter that calculates) distributes to Cloud Server CS.
(4) step 106: key server will
Figure 298817DEST_PATH_IMAGE010
(wherein
Figure 759886DEST_PATH_IMAGE001
Be elliptic curve,
Figure 189730DEST_PATH_IMAGE007
Be authentication and audit key) distribute to the 3rd audit side TPA.
Embodiment two
The data write phase is finished in the present embodiment design.The purpose in this stage is: data owner DO is, and data block is signed, and the integrality of certifying signature.Include but not limited to following steps (adopting form to represent):
Step Content
108 The data block of data owner DO sign and will sign result and related data sends to Cloud Server CS.
110 Cloud Server CS determines thus by the legitimacy of integrity check algorithm inspection signature whether Cloud Server CS stores these data.
The agreement flow process of present embodiment is illustrated in fig. 4 shown below.
Step among the embodiment two and agreement flow chart are described as follows:
(1) step 108: as certain data owner (
Figure 831113DEST_PATH_IMAGE012
Be the set that all data owners constitute,
Figure 661534DEST_PATH_IMAGE013
Represent an element in this set) to give piece
Figure 934384DEST_PATH_IMAGE014
(
Figure 850256DEST_PATH_IMAGE015
Represent the set that all data blocks constitute) when signing (if sign be ), at first calculate
Figure 572190DEST_PATH_IMAGE017
, then
Figure 140574DEST_PATH_IMAGE018
Send to Cloud Server CS(and note,
Figure 481426DEST_PATH_IMAGE019
Be the point on the curve,
Figure 550882DEST_PATH_IMAGE005
With
Figure 841049DEST_PATH_IMAGE020
Be a kind of with character string
Figure 973477DEST_PATH_IMAGE021
With
Figure 349095DEST_PATH_IMAGE022
Convert the coding method of a point on the curve to).
(2) step 110: Cloud Server CS receives
Figure 956663DEST_PATH_IMAGE018
The bilinearity proof of algorithm is used in the back, then whether data is stored as this result of merit and sends to data owner DO.
Embodiment three
The present embodiment design is finished and is write the model audit phase more.The purpose in this stage is: realize the audit of the shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA.Include but not limited to following steps (adopting form to represent):
Step Content
112 The 3rd audit side TPA selects group mark data to send to Cloud Server CS.
114 Cloud Server CS utilizes the proof algorithm to produce after receiving flag data
Figure 429233DEST_PATH_IMAGE023
Send to the 3rd audit side TPA.
116 The data that the 3rd audit side TPA utilizes verification algorithm audit multidata owner DOs to write.
The agreement flow process of present embodiment is illustrated in fig. 5 shown below.
The step that reaches the agreement flow chart among the embodiment three is described as follows:
(1) step 112: when the 3rd audit side TPA will examine the data that multidata owner DOs writes, he had selected the suitable flag data of a combination Send to Cloud Server CS.
(2) step 114: receive flag data
Figure 326967DEST_PATH_IMAGE025
After, Cloud Server CS calculates according to the proof algorithm
Figure 488958DEST_PATH_IMAGE026
, and it is sent to the 3rd audit side TPA(note,
Figure 816034DEST_PATH_IMAGE027
With
Figure 287336DEST_PATH_IMAGE028
Be the point on the curve).
(3) step 116: when receiving
Figure 637546DEST_PATH_IMAGE029
After, the 3rd audit side TPA examines the data that multidata owner DOs writes by verification algorithm.

Claims (1)

1. the public audit method for designing that writes model of a cloud data security is characterized in that more, comprises as the next stage:
(1) the encryption key distribution stage: key material is distributed to Cloud Server CS from key server, and the 3rd audit side TPA and multidata owner DOs guarantee that the data owner DO that is only having key could write the set of data blocks of sharing;
(2) data write phase: multidata owner DOs need just store data and signature and Cloud Server CS and communicate, and Cloud Server CS must guarantee to have only the multidata owner Dos through mandate could store the set of data blocks of sharing;
(3) write the model audit phase: the shared set of data blocks on the Cloud Server CS of the 3rd audit side TPA is audited more, and the key material that this stage generates the key distribution phase is applied on the data and signature of data write phase generation.
CN201310292145.9A 2013-07-12 2013-07-12 The public audit method for designing of many writes model of cloud data security Expired - Fee Related CN103347085B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310292145.9A CN103347085B (en) 2013-07-12 2013-07-12 The public audit method for designing of many writes model of cloud data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310292145.9A CN103347085B (en) 2013-07-12 2013-07-12 The public audit method for designing of many writes model of cloud data security

Publications (2)

Publication Number Publication Date
CN103347085A true CN103347085A (en) 2013-10-09
CN103347085B CN103347085B (en) 2016-03-23

Family

ID=49281859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310292145.9A Expired - Fee Related CN103347085B (en) 2013-07-12 2013-07-12 The public audit method for designing of many writes model of cloud data security

Country Status (1)

Country Link
CN (1) CN103347085B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916393A (en) * 2014-03-31 2014-07-09 公安部第三研究所 Cloud data privacy protection public auditing method based on symmetric keys
US10686886B2 (en) 2016-10-19 2020-06-16 Mirosoft Technology Licensing, LLC Establishing secure sessions for stateful cloud services

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012006638A1 (en) * 2010-07-09 2012-01-12 State Street Corporation Systems and methods for private cloud computing
CN102571821A (en) * 2012-02-22 2012-07-11 浪潮电子信息产业股份有限公司 Cloud security access control model
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102833346A (en) * 2012-09-06 2012-12-19 上海海事大学 Storage metadata based security protection system and method for cloud sensitive data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012006638A1 (en) * 2010-07-09 2012-01-12 State Street Corporation Systems and methods for private cloud computing
CN102611749A (en) * 2012-01-12 2012-07-25 电子科技大学 Cloud-storage data safety auditing method
CN102571821A (en) * 2012-02-22 2012-07-11 浪潮电子信息产业股份有限公司 Cloud security access control model
CN102833346A (en) * 2012-09-06 2012-12-19 上海海事大学 Storage metadata based security protection system and method for cloud sensitive data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916393A (en) * 2014-03-31 2014-07-09 公安部第三研究所 Cloud data privacy protection public auditing method based on symmetric keys
CN103916393B (en) * 2014-03-31 2017-04-05 公安部第三研究所 Cloud data-privacy protection public's auditing method based on symmetric key
US10686886B2 (en) 2016-10-19 2020-06-16 Mirosoft Technology Licensing, LLC Establishing secure sessions for stateful cloud services

Also Published As

Publication number Publication date
CN103347085B (en) 2016-03-23

Similar Documents

Publication Publication Date Title
Lin et al. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks
Ma et al. Redactable blockchain in decentralized setting
CN110120868B (en) Smart power grid safety data aggregation method and system based on block chain technology
CN106936566B (en) Outsourcing document signing method based on block chain technology
EP3746966A1 (en) System and method for secure transaction verification in a distributed ledger system
Feng et al. An efficient privacy-preserving authentication model based on blockchain for VANETs
Li et al. Toward secure and privacy-preserving distributed deep learning in fog-cloud computing
CN107979840A (en) A kind of the car networking V2I Verification Systems and method of Key-insulated safety
CN113301022B (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
CN103501352A (en) Cloud storage data security auditing method allowing group-user identity revocation
CN103733564A (en) Digital signatures with implicit certificate chains
CN112839041B (en) Block chain-based power grid identity authentication method, device, medium and equipment
CN101951388A (en) Remote attestation method in credible computing environment
CN103227780A (en) Method for designing public auditable storage verifiable scheme for cloud data
CN113940032A (en) Method and apparatus for recording work history and certifying reputation in blockchain networks
CN103259662A (en) Novel procuration signature and verification method based on integer factorization problems
CN106341232A (en) Anonymous entity identification method based on password
CN101741842A (en) Method for realizing dependable SSH based on dependable computing
CN103916393B (en) Cloud data-privacy protection public's auditing method based on symmetric key
CN114503146A (en) Method and apparatus for registration and authentication of miner identity in a blockchain network
CN103888262A (en) Secret key changing and signature updating method for cloud data audit
Wang et al. Privacy-preserving energy storage sharing with blockchain
Rajasekaran et al. ABRIS: Anonymous blockchain based revocable and integrity preservation scheme for vehicle to grid network
Zhou et al. An efficient identity authentication scheme with dynamic anonymity for VANETs
CN103414731A (en) Identity-based aggregate signature method with parallel key-insulation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Wan Changsheng

Inventor after: Zhou Lin

Inventor after: Chou Ruiteng

Inventor before: Wan Changsheng

Inventor before: Zhou Lin

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160323

Termination date: 20170712

CF01 Termination of patent right due to non-payment of annual fee