CN107423637B - Integrity auditing method supporting traceability of electronic medical record data on cloud - Google Patents

Integrity auditing method supporting traceability of electronic medical record data on cloud Download PDF

Info

Publication number
CN107423637B
CN107423637B CN201710641333.6A CN201710641333A CN107423637B CN 107423637 B CN107423637 B CN 107423637B CN 201710641333 A CN201710641333 A CN 201710641333A CN 107423637 B CN107423637 B CN 107423637B
Authority
CN
China
Prior art keywords
data
cloud
evidence
party auditor
integrity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710641333.6A
Other languages
Chinese (zh)
Other versions
CN107423637A (en
Inventor
付安民
周磊
俞研
王永利
陈珍珠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN201710641333.6A priority Critical patent/CN107423637B/en
Publication of CN107423637A publication Critical patent/CN107423637A/en
Application granted granted Critical
Publication of CN107423637B publication Critical patent/CN107423637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an integrity auditing method supporting traceability of electronic medical record data on a cloud, which comprises the following steps: (1) generating a secret key; (2) generating a copy; (3) generating a label; (4) generating authorization; (5) generating a challenge; (6) generating evidence; (7) and (5) verifying the evidence. According to the scheme disclosed by the invention, a plurality of copy storage modes are adopted, so that privacy protection is provided for the electronic medical record data, and the durability and disaster resistance of the electronic medical record data are enhanced. Meanwhile, by designing a new data structure and a Dynamically Mapped Hash Table (DMHT), a data traceable function is provided for the system on the basis of effectively supporting data dynamics. In addition, under the condition of ensuring the system safety, the calculation and communication overhead in the integrity design process is reduced, and the efficiency of the method is effectively improved.

Description

Integrity auditing method supporting traceability of electronic medical record data on cloud
Technical Field
The invention mainly relates to the field of cloud storage and electronic medical treatment, in particular to an integrity auditing method supporting traceable electronic medical record data on a cloud.
Background
The Electronic Medical Record (Electronic Medical Record) records the disease condition change and diagnosis and treatment process of the patient completely and continuously. It can provide accurate and timely information for disease treatment and first aid, and also can provide important data for medical research. Compared with traditional performance-limited devices, the appearance of cloud storage well meets the requirements of increasingly expanding data volume, frequent data updating and data sharing of medical records. Therefore, the establishment of the electronic medical record on the cloud has important significance. When the patient uploads the data of the patient to the cloud, the doctor can better judge the illness state of the patient through the previous medical record, so that the patient can be helped to recover health more quickly. However, cloud storage fails to provide reliability protection for stored data, so patients worry about whether their data is stored correctly. In addition, electronic medical records contain many sensitive information, names, cell phone numbers, social security numbers, so patients need to be sure that data on the cloud is not revealed to unauthorized entities. Therefore, how to efficiently verify the integrity of the medical record data on the cloud is an urgent problem to be solved on the premise of protecting the data privacy.
Integrity auditing is considered to be an effective means for a user to verify the integrity of cloud storage data. Meanwhile, the introduction of public audit well lightens the calculation and storage burden of a user side. To better provide data privacy protection, multiple copy integrity audit techniques are proposed. The data before uploading is encrypted, so that the possibility of medical record data leakage is isolated. More importantly, as long as one data copy in the cloud is not damaged, the damaged data can be completely recovered, and therefore the usability and the durability of the data are improved. Therefore, it is necessary to provide a plurality of sets of the disclosed auditing method for the electronic medical records on the cloud.
In addition, in order to ensure the completeness and accuracy of the electronic medical record, the stored data needs to be updated continuously with time, so that the electronic medical record on the cloud needs to support dynamic data operation. In addition, in order for a physician to be able to track data by analyzing the patient's physical changes over a period of time in the past, a data traceability function must be provided. However, in the existing solutions, the data structures designed by them to support data dynamics have the problem of inefficiency, and none of them can provide the function of tracking data.
Disclosure of Invention
The invention aims to provide an integrity auditing method supporting traceability of electronic medical record data on a cloud.
The technical solution for realizing the invention is as follows: an integrity auditing method supporting traceability of electronic medical record data on a cloud comprises the following steps:
step 1, key generation: the data owner selects public parameters for the system to generate a public key and a private key;
step 2, copy generation: the data owner divides the original file F into blocks and connects the copy number i with the data block bjEncrypting to generate m copies FiThe data owner creates and initializes a dynamic mapping hash table DMHT and sends the DMHT to a cloud storage server CSS;
step 3, label generation: the data owner selects the Filename Filename and calculates the file identifier Fid for the file, for all file blocks bijCompute integrity verification tag sigmaijAggregating the data block labels with the same position sequence number in all the copies to obtain an integrity label set phi, and { { F { (F) }i}1≤i≤mPhi, Fid is uploaded to a cloud storage server CSS;
and 4, authorization generation: the data owner inquires the identity AID for authorization of the third party auditor TPA, the third party auditor TPA returns the identity AID for authorization, and after the data owner receives the identity AID for authorization, the data owner calculates the authorization signature auth Sigssk(AUTH AID T), wherein AUTH is authorization information, and T is effective time of authorization; the data owner sends the authorization signature AUTH and the audit request to a third party auditor TPA together, and uploads { AUTH, T } to a cloud storage server CSS;
step 5, challenge generation: when a data owner needs to verify the integrity of cloud data, sending an audit request to a third party auditor TPA, then generating a challenge message chal by the third party auditor TPA, and sending the challenge message to a cloud storage server;
and 6, generating an evidence: after receiving the challenge message, the CSS generates a corresponding evidence P, and then returns the evidence to a third party auditor TPA;
and 7, verifying the evidence: and the third party auditor TPA verifies the integrity of the response message P after receiving the response message P and obtains a conclusion, and then returns an audit result to the data owner.
Compared with the prior art, the invention has the following remarkable advantages: 1) providing data privacy protection: the invention encrypts the data before uploading the data, thereby avoiding the content of the data file from being leaked to an unauthorized entity; 2) data dynamics are supported: the invention designs a new data structure to realize effective support to data dynamics. Allowing authorized users to access, modify, insert and delete data; 3) the realization of data traceability: the invention not only allows the user to access the data block with the latest version, but also allows the user to access all historical versions of a certain data block, namely, the change of the data block is tracked; 4) and (3) realizing authorization audit: the present invention eliminates malicious challenges from counterfeit TPA by adding an authorization process between the data owner and the TPA; 5) reducing computation and communication overhead: the invention simplifies the dynamic process of data, and stores the data structure at the TPA end, thus solving the problem of low efficiency in the background technology to a certain extent; 6) the safety of the invention is provable: any unauthorized entity cannot challenge the cloud storage server and a malicious cloud server cannot pass integrity verification by launching forgery, replacement, and replay attacks.
The present invention is described in further detail below with reference to the attached drawings.
Drawings
FIG. 1 is a system model for implementing an integrity auditing method supporting traceability of electronic medical record data on a cloud.
FIG. 2 is a basic flowchart of the integrity auditing method supporting traceability of electronic medical record data on a cloud according to the present invention.
Detailed Description
With reference to fig. 2, the integrity auditing method supporting traceability of electronic medical record data on the cloud includes the following steps:
step 1, key generation: the data owner selects public parameters for the system to generate a public key and a private key, and the method specifically comprises the following steps:
step 1-1, selecting multiplication circulation group G with orders q1、G2、GTWherein q is a randomly selected large prime number; selecting bilinear mapping e: G1×G2→GT(ii) a Selecting a one-way hash function H1:{0,1}*→G1
Step 1-2, the data owner generates a public key pk and a private key sk, and selects s random values { r }1,r2,…,rs}。
Step 1-2-1 takes a secure signature algorithm Sig () and a corresponding pair of signature keys (spk, ssk);
step 1-2-2 random selection of secret value x ∈ ZqCalculating y as gxWherein G is G2One generator of, Zq={1,2,···,q-1};
Step 1-2-3 of randomly selecting s random values r1,r2,…,rs←Zq
The steps 1-2-4 output a public key pk ═ { g, y, spk } and a private key sk ═ { ssk, x }, and disclose the public key and keep the private key private.
Step 2, copy generation: the data owner divides the original file F into blocks and connects the copy number i with the data block bjEncrypting to generate m copies FiThe data owner creates and initializes the DMHT and sends the DMHT to the CSS, which specifically includes the following steps:
step 2-1, the data owner divides n blocks of the original file F to obtain F ═ bj}1≤j≤nDividing and dividing each block into s-zones to obtain bj={bj1,bj2,···,bjk,···,bjsK is more than or equal to 1 and less than or equal to s;
step 2-2, the connected copy number i and the data block b are comparedjEncrypting to generate m copies Fi=EK(i||bjk)={bijk}1≤i≤m,1≤j≤n,1≤k≤s
Step 2-3, creating a dynamic mapping hash table DMHT, wherein the table comprises four columns of SN, BN, OT and PR, and has n +1 rows in total, wherein SN represents a physical serial number of a data block in a file, BN represents a logic number of a storage position of the data block, OT represents creation or modification time of the data block, and PR represents a pointer pointing to the data block before being modified;
step 2-4, initializing the value, SN, in the DMHT of the dynamic mapping hash tablej=BNj={1,2,···,n},OTjFor the current time of the system, PRjFor null, only one version is initially created on behalf of the data block, and the DMHT is sent to the third party auditor TPA.
Step 3, label generation: the data owner selects the Filename Filename and calculates the file label for the fileIdentify Fid for all file blocks bijCompute integrity verification tag sigmaijAggregating the data block labels with the same position sequence number in all the copies to obtain an integrity label set phi, and { { F { (F) }i}1≤i≤mPhi and Fid are uploaded to a cloud storage server CSS, and the specific steps are as follows:
step 3-1, selecting Filename Filename ← Z by userq
Step 3-2, Filename, m, r1,r2,…,rsConnecting to obtain an identifier:
Fid=Filename||m||r1||…||rs
step 3-3, calculating data block bijIntegrity verification tag of (1):
Figure BDA0001365970040000041
step 3-4, aggregating the data block labels with the uniform position serial numbers in all the copies, and expressing as
Figure BDA0001365970040000042
Get the set of all labels Φ ═ σ12,···,σj,···,σn};
Step 3-5, will { { Fi}1≤i≤mPhi, Fid is uploaded to CSS and the original data is deleted locally { { F { (F) }i}1≤i≤m,Φ}
And 4, authorization generation: the data owner inquires the identity AID for authorization of the third party auditor TPA, the third party auditor TPA returns the identity AID for authorization, and after the data owner receives the identity AID for authorization, the data owner calculates the authorization signature auth Sigssk(AUTH AID T), wherein AUTH is authorization information, and T is effective time of authorization; the data owner sends the authorization signature AUTH and the audit request to a third party auditor TPA together, and uploads { AUTH, T } to a cloud storage server CSS;
step 5, challenge generation: when a data owner needs to verify the integrity of cloud data, sending an audit request to a third party auditor TPA, then generating a challenge message chal by the third party auditor TPA, and sending the challenge message to a cloud storage server; the method comprises the following specific steps:
step 5-1, the third party auditor TPA selects two functions: pseudo-random permutation function pikey(·):key×{0,1}*→{0,1}*Pseudo random function
Figure BDA0001365970040000056
And selects the corresponding two keys: k is a radical of1The key being a function pi, k2Is a function of
Figure BDA0001365970040000057
The secret key of (a);
step 5-2, third party auditor TPA use k1And k is2Generating a set Q { (j, v)j) Therein is here
Figure BDA0001365970040000051
Where j is the position index, vjIs a random value, c is the number of data blocks requiring challenge;
step 5-3, the third party auditor TPA generates a random challenge message
Figure BDA0001365970040000053
And sent to the cloud storage server CSS, where,
Figure BDA0001365970040000052
the AID is encrypted by using a public key PK of a CSS on behalf of a third party auditor TPA.
And 6, generating an evidence: after receiving the challenge message, the CSS generates a corresponding evidence P, and then returns the evidence to a third party auditor TPA, and the method specifically comprises the following steps:
step 6-1, after the cloud storage server CSS receives the challenge message chal, using the signature public key spk to verify whether auth is valid, if yes, executing the following steps, otherwise, rejecting the audit request:
step 6-2, the cloud storage serverCSS generated data evidence u ═ { u ═ u }ik}1≤i≤m,1≤k≤sAnd label evidence
Figure BDA0001365970040000054
Wherein
Figure BDA0001365970040000055
And 6-3, returning the verification evidence P to the third party auditor TPA.
And 7, verifying the evidence: the third party auditor TPA receives the response message P, verifies the integrity of the response message P and obtains a conclusion, and returns an audit result to the data owner, and the method specifically comprises the following steps:
after the third party auditor TPA receives the evidence P from the cloud storage server CSS { σ, u }, the third party auditor TPA runs to check the validity of the evidence by checking whether the following equation holds:
Figure BDA0001365970040000061
if the equation is established, the third party auditor TPA sends a message "1" to the data owner to prove that the cloud storage server CSS indeed correctly stores m copies of each copy, otherwise, sends a message "0" to the data owner to represent that the cloud storage server CSS does not correctly store m copies.
The invention designs a new two-dimensional data structure called as a Dynamic Mapping Hash Table (DMHT), wherein the table simultaneously comprises two structural parts of a table and a linked list, the table records the latest versions of all data blocks according to the index sequence of the data blocks, and the linked list organizes all historical versions of the data blocks before the current data block according to the time sequence.
As shown in fig. 1, the system model of the method includes four types of entities: data owner, authorized user, and third party auditor TPA. First, a data owner encrypts a data file and then uploads the file to a cloud storage server. An authorized user can obtain the encryption key from the data owner to obtain the data plaintext. At the same time, the third party auditor TPA obtains authorization information from the data owner. After outsourcing the data, the third party auditor TPA generates a random challenge, which is then sent to the cloud storage server CSS. After receiving the challenge message, the cloud storage server CSS first extracts the authorization information from the challenge and then verifies its validity. And if the verification is passed, the CSS generates corresponding evidence and returns the evidence to the TPA of the third party. Otherwise, the cloud storage server CSS ignores the challenge. After receiving the evidence, the TPA of the third party auditor verifies the validity of the evidence. If the verification is passed, the third party auditor TPA returns a message of "1" to the data owner, otherwise, returns a message of "0".
Therefore, the integrity auditing method supporting the traceability of the electronic medical record data on the cloud, disclosed by the invention, not only provides privacy protection for the electronic medical record data, but also enhances the durability and disaster resistance of the data. Meanwhile, a new data structure is designed, and a data traceable function is provided for the system on the basis of effectively supporting data dynamics. In addition, in the auditing process, the calculation and communication expenses are reduced, and the efficiency of the method is effectively improved.

Claims (7)

1. The integrity auditing method supporting traceability of electronic medical record data on the cloud is characterized by comprising the following steps of:
step 1, key generation: the data owner selects public parameters for the system to generate a public key and a private key;
step 2, copy generation: the data owner divides the original file F into blocks and connects the copy number i with the data block bjEncrypting to generate m copies FiThe data owner creates and initializes the DMHT and sends the DMHT to the CSS, which specifically includes the following steps:
step 2-1, the data owner divides n blocks of the original file F to obtain F ═ bj}1≤j≤nAnd dividing each block into s regions to obtain bj={bj1,bj2,…,bjk,…,bjsK is more than or equal to 1 and less than or equal to s;
step 2-2, pairThe concatenated copy number is encrypted with the data block to generate m microreplicated Fi=EK(i||bjk)={bijk}1≤i≤m,1≤j≤n,1≤k≤s
Step 2-3, creating a dynamic mapping hash table DMHT, wherein the table comprises four columns of SN, BN, OT and PR, and has n +1 rows in total, wherein SN represents a physical serial number of a data block in a file, BN represents a logic number of a storage position of the data block, OT represents creation or modification time of the data block, and PR represents a pointer pointing to the data block before being modified;
step 2-4, initializing the value, SN, in the DMHT of the dynamic mapping hash tablej=BNj={1,2,…,n},OTjFor the current time of the system, PRjFor null, only one version is initially created on behalf of the data block, and the DMHT is sent to a third-party auditor TPA;
step 3, label generation: the data owner selects the Filename Filename and calculates the file identifier Fid for the file, for all file blocks bijCompute integrity verification tag sigmaijAggregating the data block labels with the same position sequence number in all the copies to obtain an integrity label set phi, and { { F { (F) }i}1≤i≤mPhi, Fid is uploaded to a cloud storage server CSS;
and 4, authorization generation: the data owner inquires the identity AID for authorization of the third party auditor TPA, the third party auditor TPA returns the identity AID for authorization, and after the data owner receives the identity AID for authorization, the data owner calculates the authorization signature auth Sigssk(AUTH AID T), wherein AUTH is authorization information, and T is effective time of authorization; the data owner sends the authorization signature AUTH and the audit request to a third party auditor TPA together, and uploads { AUTH, T } to a cloud storage server CSS;
step 5, challenge generation: when a data owner needs to verify the integrity of cloud data, sending an audit request to a third party auditor TPA, then generating a challenge message chal by the third party auditor TPA, and sending the challenge message to a cloud storage server;
and 6, generating an evidence: after receiving the challenge message, the CSS generates a corresponding evidence P, and then returns the evidence to a third party auditor TPA;
and 7, verifying the evidence: and the third party auditor TPA verifies the integrity of the response message P after receiving the response message P and obtains a conclusion, and then returns an audit result to the data owner.
2. The integrity auditing method supporting traceability of electronic medical record data on the cloud as claimed in claim 1, wherein in step 1 the data owner selects public parameters for the system to generate public and private keys, specifically comprising the steps of:
step 1-1, selecting multiplication circulation group G with orders q1、G2、GTWherein q is a randomly selected large prime number; selecting bilinear mapping e: G1×G2→GT(ii) a Selecting a one-way hash function H1:{0,1}*→G1
Step 1-2, the data owner generates a public key pk and a private key sk, and selects s random values { r }1,r2,…,rs}。
3. The integrity auditing method supporting traceability of electronic medical record data on the cloud as claimed in claim 1, characterized in that in step 1-2, the data owner generates a public key pk and a private key sk, and selects s random values { r }1,r2,…,rsThe method specifically comprises the following steps:
step 1-2-1 takes a secure signature algorithm Sig () and a corresponding pair of signature keys (spk, ssk);
step 1-2-2 random selection of secret value x ∈ ZqCalculating y as gxWherein G is G2One generator of, Zq={1,2,…,q-1};
Step 1-2-3 of randomly selecting s random values r1,r2,…,rs←Zq
The steps 1-2-4 output a public key pk ═ { g, y, spk } and a private key sk ═ { ssk, x }, and disclose the public key and keep the private key private.
4. The integrity auditing method supporting traceability of electronic medical record data on the cloud according to claim 1, where the specific steps of label generation in step 3 are:
step 3-1, selecting Filename Filename ← Z by userq
Step 3-2, Filename, m, r1,r2,…,rsConnecting to obtain an identifier:
Fid=Filename||m||r1||…||rs
step 3-3, calculating data block bijIntegrity verification tag of (1):
Figure FDA0002414764850000031
step 3-4, aggregating the data block labels with the uniform position serial numbers in all the copies, and expressing as
Figure FDA0002414764850000032
Get the set of all labels Φ ═ σ12,…,σj,…,σn};
Step 3-5, identifying the generated copy, the generated label set and the file { { Fi}1≤i≤mPhi, Fid are uploaded to CSS together, and the original data is deleted locally { { Fi}1≤i≤m,Φ}。
5. The integrity auditing method supporting traceability of electronic medical record data on the cloud according to claim 1, where the specific step of challenge generation in step 5 is:
step 5-1, the third party auditor TPA selects two functions: pseudo-random permutation function pikey(·):key×{0,1}*→{0,1}*Pseudo random function
Figure FDA0002414764850000033
And selects the corresponding twoAnd (3) secret key: k is a radical of1The key being a function pi, k2Is a function of
Figure FDA0002414764850000034
The secret key of (a);
step 5-2, third party auditor TPA use k1And k is2Generating a set Q { (j, v)j) Therein is here
Figure FDA0002414764850000035
Where j is the position index, vjIs a random value, c is the number of data blocks requiring challenge;
step 5-3, the third party auditor TPA generates a random challenge message
Figure FDA0002414764850000036
And sent to the cloud storage server CSS, where,
Figure FDA0002414764850000037
the AID is encrypted by using a public key PK of a CSS on behalf of a third party auditor TPA.
6. The integrity auditing method supporting traceability of electronic medical record data on the cloud according to claim 1, where the specific step of evidence generation in step 6 is:
step 6-1, after the cloud storage server CSS receives the challenge message chal, using the signature public key spk to verify whether auth is valid, if yes, executing the following steps, otherwise, rejecting the audit request:
step 6-2, the cloud storage server CSS generates data evidence u ═ u { u ═ik}1≤i≤m,1≤k≤sAnd label evidence
Figure FDA0002414764850000041
Wherein
Figure FDA0002414764850000042
And 6-3, returning the verification evidence P to the third party auditor TPA.
7. The integrity auditing method supporting traceability of electronic medical record data on the cloud according to claim 1, where the specific step of verifying the evidence in step 7 is:
after the third party auditor TPA receives the evidence P from the cloud storage server CSS { σ, u }, the third party auditor TPA runs to check the validity of the evidence by checking whether the following equation holds:
Figure FDA0002414764850000043
if the equation is established, the third party auditor TPA sends a message "1" to the data owner to prove that the cloud storage server CSS indeed correctly stores m copies of each copy, otherwise, sends a message "0" to the data owner to represent that the cloud storage server CSS does not correctly store m copies.
CN201710641333.6A 2017-07-31 2017-07-31 Integrity auditing method supporting traceability of electronic medical record data on cloud Active CN107423637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710641333.6A CN107423637B (en) 2017-07-31 2017-07-31 Integrity auditing method supporting traceability of electronic medical record data on cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710641333.6A CN107423637B (en) 2017-07-31 2017-07-31 Integrity auditing method supporting traceability of electronic medical record data on cloud

Publications (2)

Publication Number Publication Date
CN107423637A CN107423637A (en) 2017-12-01
CN107423637B true CN107423637B (en) 2020-07-31

Family

ID=60431696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710641333.6A Active CN107423637B (en) 2017-07-31 2017-07-31 Integrity auditing method supporting traceability of electronic medical record data on cloud

Country Status (1)

Country Link
CN (1) CN107423637B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123934B (en) * 2017-12-06 2021-02-19 深圳先进技术研究院 Mobile-end-oriented data integrity verification method
CN108229208B (en) * 2018-01-08 2021-03-23 华侨大学 Public auditing method for multi-copy data in cloud storage service
CN108111313B (en) * 2018-01-12 2021-05-18 哈尔滨工业大学深圳研究生院 Method for performing third-party audit on user file stored on cloud server
CN109117672A (en) * 2018-08-24 2019-01-01 青岛大学 Carry out the hiding cloud storage Data Audit method of sensitive information
CN109981736B (en) * 2019-02-22 2021-09-21 南京理工大学 Dynamic public auditing method supporting mutual trust of user and cloud server
US20200313859A1 (en) * 2019-03-29 2020-10-01 Accenture Global Solutions Limited Cryptologic Blockchain-Based Off-Chain Storage Verification
CN111340118B (en) * 2020-02-27 2021-07-23 河南大学 Conflict evidence fusion method based on reliability entropy and BJS divergence

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611136A (en) * 2016-07-01 2017-05-03 四川用联信息技术有限公司 Data tampering verification method in cloud storage

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8515965B2 (en) * 2010-05-18 2013-08-20 Lsi Corporation Concurrent linked-list traversal for real-time hash processing in multi-core, multi-thread network processors
CN103729352B (en) * 2012-10-10 2017-07-28 腾讯科技(深圳)有限公司 Method and the system that distributed file system is handled multiple copy datas
CN104023085A (en) * 2014-06-25 2014-09-03 武汉大学 Security cloud storage system based on increment synchronization
CN105988723A (en) * 2015-02-12 2016-10-05 中兴通讯股份有限公司 Snapshot processing method and device
CN106650503B (en) * 2016-12-09 2019-10-18 南京理工大学 Cloud data integrity validation and restoration methods based on IDA
CN107197037B (en) * 2017-02-24 2018-02-02 重庆第二师范学院 A kind of data access method and system with audit function based on Cloud Server

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611136A (en) * 2016-07-01 2017-05-03 四川用联信息技术有限公司 Data tampering verification method in cloud storage

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于H-MHT的动态数据完整性检查方案;李莹 等;《计算机应用研究》;20151231;第32卷(第12期);第3710-3713页 *
基于改进哈希树模型的数据完整性验证方案;郭浩 等;《西南科技大学学报》;20170331;第32卷(第1期);第64-68页 *

Also Published As

Publication number Publication date
CN107423637A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
CN107423637B (en) Integrity auditing method supporting traceability of electronic medical record data on cloud
Zou et al. SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system
Yuan et al. Blockchain-based public auditing and secure deduplication with fair arbitration
CN110622165B (en) Security measures for determining privacy set intersections
Hao et al. Fine-grained data access control with attribute-hiding policy for cloud-based IoT
CN111916173B (en) Medical data safety sharing system and method based on IPFS and alliance chain
Zhang et al. An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things
Jin et al. Dynamic and public auditing with fair arbitration for cloud data
Barsoum et al. On verifying dynamic multiple data copies over cloud servers
Barsoum et al. Integrity verification of multiple data copies over untrusted cloud servers
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
Yi et al. Efficient integrity verification of replicated data in cloud computing system
JP2010220212A (en) Securing communications sent by first user to second user
CN112866990B (en) Conditional identity anonymous privacy protection public auditing method with incentive mechanism
Ma et al. Authenticated data redaction with fine-grained control
Zhao et al. User stateless privacy-preserving TPA auditing scheme for cloud storage
Dulin et al. An associated deletion scheme for multi-copy in cloud storage
Benil et al. Blockchain based secure medical data outsourcing with data deduplication in cloud environment
Mukundan et al. Replicated Data Integrity Verification in Cloud.
Tian et al. A provably secure and public auditing protocol based on the bell triangle for cloud data
CN112768018A (en) Electronic medical record security sharing method based on integrated credit evaluation intelligent contract
Liu et al. Blockchain-based integrity auditing for shared data in cloud storage with file prediction
Xu et al. A generic integrity verification algorithm of version files for cloud deduplication data storage
Gohel et al. A new data integrity checking protocol with public verifiability in cloud storage
Pawar et al. CovidBChain: Framework for access‐control, authentication, and integrity of Covid‐19 data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant