[go: up one dir, main page]

CN102034061A - Cryptographic algorithm homogeneity-based data possession proving method - Google Patents

Cryptographic algorithm homogeneity-based data possession proving method Download PDF

Info

Publication number
CN102034061A
CN102034061A CN2010105941395A CN201010594139A CN102034061A CN 102034061 A CN102034061 A CN 102034061A CN 2010105941395 A CN2010105941395 A CN 2010105941395A CN 201010594139 A CN201010594139 A CN 201010594139A CN 102034061 A CN102034061 A CN 102034061A
Authority
CN
China
Prior art keywords
data
storage server
cryptographic algorithm
owner
homomorphism
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105941395A
Other languages
Chinese (zh)
Inventor
陈兰香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN2010105941395A priority Critical patent/CN102034061A/en
Publication of CN102034061A publication Critical patent/CN102034061A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

一种基于密码算法同态性的数据持有性证明方法,目的是验证不可信的存储服务器是否正确无误地持有数据拥有者的数据,避免存储服务提供者删除或篡改数据。技术方案是由数据拥有者将数据存放到存储服务器之前,使用具有同态性的密码算法对数据块计算标签,然后将数据块及其标签存放到存储服务器。在进行数据持有性检查时,数据拥有者随机选择一些数据块,存储服务器返回数据拥有者请求的数据块之和以及其标签之和,由于同态性,数据拥有者可以根据数据块之和与标签之和是否一致来验证存储服务器是否正确地持有数据。在数据的生存周期内,数据拥有者可以定期或不定期地验证其数据是否正确无误。适用于任何将数据存放在不可信的存储服务器上的存储系统。

Figure 201010594139

A data possession proof method based on cryptographic algorithm homomorphism, the purpose is to verify whether the untrusted storage server holds the data owner's data correctly, and prevent the storage service provider from deleting or tampering with the data. The technical solution is that before the data owner stores the data in the storage server, the data owner uses a cryptographic algorithm with homomorphism to calculate the label for the data block, and then stores the data block and its label in the storage server. When performing a data holding check, the data owner randomly selects some data blocks, and the storage server returns the sum of the data blocks requested by the data owner and the sum of their labels. Due to homomorphism, the data owner can It is consistent with the sum of tags to verify whether the storage server holds the data correctly. During the life cycle of data, data owners can regularly or irregularly verify whether their data is correct or not. Applicable to any storage system that stores data on untrusted storage servers.

Figure 201010594139

Description

基于密码算法同态性的数据持有性证明方法 Data Possession Proof Method Based on Cryptographic Algorithm Homomorphism

技术领域technical field

本发明属于计算机存储技术领域,具体涉及一种基于密码算法同态性的数据持有性证明方法,当用户将数据存放在不可信的存储服务器上时,他最关心的是其数据是否还正确无误,本发明提出的方法可以让用户定期或不定期地验证其数据是否还正确无误地存放在服务提供者的服务器上,适用于任何将数据存放在不可信的存储服务器上的存储系统。The invention belongs to the field of computer storage technology, and specifically relates to a method for proving data possession based on cryptographic algorithm homomorphism. When a user stores data on an untrusted storage server, he is most concerned about whether the data is still correct Yes, the method proposed by the present invention can allow users to regularly or irregularly verify whether their data is still correctly stored on the server of the service provider, and is applicable to any storage system that stores data on untrusted storage servers.

背景技术Background technique

外购存储服务或者云存储服务可以实现任意地点、任意时间、任意数据访问及保障法规遵从的需求等。对存储需求不可预测、需要廉价存储的用户来说,按需购买存储容量的外购存储服务或者云存储服务与一次性购买整套存储系统相比显然会带来更多的方便和效益,且外购存储服务或者云存储服务在为用户节省投资的同时也节约了社会资源与能源。但是,因为外购存储服务或者云存储服务的安全性、可靠性及服务水平等还存在众多问题亟待解决,所以还未得到人们的广泛使用。当用户将数据存放在外购存储服务或者云存储服务提供者的服务器中时,他们最关心的是其数据是否还正确无误。只有当用户确信其数据的还完备无误时,他们才可放心地使用外购存储服务或者云存储服务。Outsourced storage services or cloud storage services can achieve any location, any time, any data access and ensure compliance with laws and regulations. For users who have unpredictable storage requirements and need cheap storage, outsourcing storage services or cloud storage services that purchase storage capacity on demand will obviously bring more convenience and benefits than purchasing a complete storage system at one time, and the external Purchasing storage services or cloud storage services not only saves investment for users, but also saves social resources and energy. However, because there are still many problems to be solved urgently in the security, reliability and service level of outsourced storage services or cloud storage services, they have not been widely used by people. When users store data in outsourced storage services or servers of cloud storage service providers, they are most concerned about whether their data is correct or not. Only when users are sure that their data is still complete and correct, can they use outsourced storage services or cloud storage services with confidence.

目前所有公知的非对称加密算法以及部分散列函数均具有同态性。同态性有两种,一种是对乘法具有同态性,即对于密码算法E,有E(a*b)=E(a)*E(b),其中*表示乘法运算;另外一种是对加法具有同态性,即E(a+b)=E(a)+E(b),其中+表示加法运算。文中密码算法指代任何一种对加法具有同态性的密码算法。All currently known asymmetric encryption algorithms and some hash functions are homomorphic. There are two kinds of homomorphism, one is homomorphism for multiplication, that is, for cryptographic algorithm E, there is E(a*b)=E(a)*E(b), where * represents multiplication operation; the other is It is homomorphic to addition, that is, E(a+b)=E(a)+E(b), where + represents addition. In this paper, a cryptographic algorithm refers to any cryptographic algorithm that is homomorphic to addition.

发明内容Contents of the invention

本发明提出一种基于密码算法同态性的数据持有性证明方法,目的是验证不可信的存储服务器是否还正确无误地持有用户的数据,避免存储服务提供者删除或篡改数据。The present invention proposes a data possession proof method based on cryptographic algorithm homomorphism, with the purpose of verifying whether an untrustworthy storage server still holds the user's data correctly, and preventing the storage service provider from deleting or tampering with the data.

本发明所述数据持有性证明方法包括以下步骤:The data possession proof method of the present invention comprises the following steps:

第一步,数据拥有者对每个数据块di计算一个标签ti=Esk(di),其中Esk( )为密码算法的加密或签名操作,sk为保密密钥;In the first step, the data owner calculates a label t i =E sk (d i ) for each data block d i , where E sk ( ) is the encryption or signature operation of the cryptographic algorithm, and sk is the secret key;

第二步,数据拥有者将所有数据块<di, ti>存放到存储服务器上;In the second step, the data owner stores all data blocks <d i , t i > on the storage server;

第三步,数据拥有者随机选择c个数据块di1, di2, …dic,请求存储服务器返回数据持有证据;In the third step, the data owner randomly selects c data blocks d i1 , d i2 , … d ic , and requests the storage server to return the data holding evidence;

第四步,存储服务器取出数据拥有者请求的数据块di1, di2, …dic及其标签ti1, ti2, …tic,计算数据块之和D及其标签之和T,即D=di1+di2+…+dic,T=ti1+ti2+…+tic,将D和T发送给数据拥有者;In the fourth step, the storage server fetches the data blocks d i1 , d i2 , … d ic and their tags t i1 , t i2 , … t ic requested by the data owner, and calculates the sum D of the data blocks and the sum T of their tags, namely D=d i1 +d i2 +…+d ic , T=t i1 +t i2 +…+t ic , send D and T to the data owner;

第五步,数据拥有者使用保密密钥sk对数据块之和D计算Esk(D),因为该密码算法的同态性,有Esk(D)=Esk(di1+di2+…+dic)=Esk(di1)+Esk(di2)+…+Esk(dic)=ti1+ti2+…+ticIn the fifth step, the data owner uses the secret key sk to calculate E sk (D) for the sum D of the data block. Because of the homomorphism of the cryptographic algorithm, E sk (D)=E sk (d i1 +d i2 + …+d ic )=E sk (d i1 )+E sk (d i2 )+…+E sk (d ic )=t i1 +t i2 +…+t ic ;

第六步,数据拥有者判断Esk(D)是否与存储服务器发送的T相等,如果相等,说明存储服务器正确地持有数据,否则,说明数据被破坏。In the sixth step, the data owner judges whether E sk (D) is equal to T sent by the storage server. If they are equal, it means that the storage server holds the data correctly; otherwise, it means that the data is destroyed.

密码算法指代任何一种对加法具有同态性的密码算法。A cryptographic algorithm refers to any cryptographic algorithm that is homomorphic to addition.

利用本发明的数据持有性证明方法可以让数据拥有者验证存储服务器是否还正确无误地持有其数据。The method for proving data possession in the present invention can allow the data owner to verify whether the storage server still holds its data correctly.

附图说明Description of drawings

图1为本发明所涉及的各实体关系图。FIG. 1 is a relationship diagram of various entities involved in the present invention.

图2为本发明流程图。Fig. 2 is a flowchart of the present invention.

具体实施方式Detailed ways

如图1所示,数据拥有者9在将数据存放到存储服务器5之前,对所有数据块di使用同态密码算法计算标签ti,然后将数据及其标签<di, ti>通过2存放到存储服务器5,存储服务器5保存数据。然后数据拥有者9就可以定期或不定期地验证存储服务器是否还正确无误地持有其数据。在进行持有性检查时,数据拥有者9随机选择c个数据块,要求存储服务器5通过1返回持有证据,存储服务器5计算D=di1+di2+…+dic,T=ti1+ti2+…+tic,将D和T通过1发送给数据拥有者9。由于计算标签的密码算法的同态性,数据拥有者9可以使用其保密密钥计算Esk(D),判断与存储服务器5发送的T是否相等,相等说明存储服务器5正确地持有其数据,否则说明数据被破坏。As shown in Figure 1, before storing the data in the storage server 5, the data owner 9 uses the homomorphic encryption algorithm to calculate the label t i for all data blocks d i, and then passes the data and its labels <d i , t i > through 2 is stored in the storage server 5, and the storage server 5 saves the data. Then the data owner 9 can regularly or aperiodically verify whether the storage server still holds its data correctly. When performing the holding check, the data owner 9 randomly selects c data blocks, and requires the storage server 5 to return the holding evidence through 1, and the storage server 5 calculates D=d i1 +d i2 +...+d ic , T=t i1 +t i2 +…+t ic , send D and T to the data owner 9 via 1. Due to the homomorphism of the cryptographic algorithm for calculating tags, the data owner 9 can use its secret key to calculate E sk (D), and judge whether it is equal to the T sent by the storage server 5, which means that the storage server 5 holds its data correctly , otherwise the data is corrupted.

如图2所示,本发明的具体流程为:As shown in Figure 2, the concrete process of the present invention is:

第一步,数据拥有者对每个数据块di计算一个标签ti=Esk(di);In the first step, the data owner calculates a label t i =E sk (d i ) for each data block d i ;

第二步,数据拥有者将所有数据块<di, ti>存放到存储服务器上;In the second step, the data owner stores all data blocks <d i , t i > on the storage server;

第三步,数据拥有者随机选择c个数据块,请求存储服务器返回数据持有证据;In the third step, the data owner randomly selects c data blocks and requests the storage server to return data holding evidence;

第四步,存储服务器取出数据拥有者请求的数据块di1, di2, …dic及其标签ti1, ti2, …tic,计算D=di1+di2+…+dic,T=ti1+ti2+…+tic,将D和T发送给数据拥有者;In the fourth step, the storage server takes out the data blocks d i1 , d i2 , ...d ic requested by the data owner and their tags t i1 , t i2 , ...t ic , and calculates D=d i1 +d i2 +...+d ic , T=t i1 +t i2 +…+t ic , send D and T to the data owner;

第五步,数据拥有者使用保密密钥sk计算Esk(D),因为该密码算法的同态性,有Esk(D)=Esk(di1+di2+…+dic)=Esk(di1)+Esk(di2)+…+Esk(dic)=ti1+ti2+…+ticIn the fifth step, the data owner uses the secret key sk to calculate E sk (D), because of the homomorphism of the cryptographic algorithm, E sk (D)=E sk (d i1 +d i2 +…+d ic )= E sk (d i1 )+E sk (d i2 )+…+E sk (d ic )=t i1 +t i2 +…+t ic ;

第六步,数据拥有者判断Esk(D)是否与存储服务器发送的T相等,如果相等,说明存储服务器正确地持有数据,否则,说明数据被破坏。In the sixth step, the data owner judges whether E sk (D) is equal to T sent by the storage server. If they are equal, it means that the storage server holds the data correctly; otherwise, it means that the data is destroyed.

Claims (2)

1.一种基于密码算法同态性的数据持有性证明方法,其特征在于包括以下步骤:1. A data possession proof method based on cryptographic algorithm homomorphism, characterized in that it comprises the following steps: 第一步,数据拥有者对每个数据块di计算一个标签ti=Esk(di),其中Esk()为密码算法的加密或签名操作,sk为保密密钥;In the first step, the data owner calculates a label t i =E sk (d i ) for each data block d i , where E sk () is the encryption or signature operation of the cryptographic algorithm, and sk is the secret key; 第二步,数据拥有者将所有数据块<di, ti>存放到存储服务器上;In the second step, the data owner stores all data blocks <d i , t i > on the storage server; 第三步,数据拥有者随机选择c个数据块,请求存储服务器返回数据持有证据;In the third step, the data owner randomly selects c data blocks and requests the storage server to return data holding evidence; 第四步,存储服务器取出数据拥有者请求的数据块di1, di2, …dic及其标签ti1, ti2, …tic,计算D=di1+di2+…+dic,T=ti1+ti2+…+tic,将D和T发送给数据拥有者;In the fourth step, the storage server takes out the data blocks d i1 , d i2 , ...d ic requested by the data owner and their tags t i1 , t i2 , ...t ic , and calculates D=d i1 +d i2 +...+d ic , T=t i1 +t i2 +…+t ic , send D and T to the data owner; 第五步,数据拥有者使用保密密钥sk计算Esk(D),因为该密码算法的同态性,有Esk(D)=Esk(di1+di2+…+dic)=Esk(di1)+Esk(di2)+…+Esk(dic)=ti1+ti2+……+ticIn the fifth step, the data owner uses the secret key sk to calculate E sk (D), because of the homomorphism of the cryptographic algorithm, E sk (D)=E sk (d i1 +d i2 +…+d ic )= E sk (d i1 )+E sk (d i2 )+…+E sk (d ic )=t i1 +t i2 +…+t ic ; 第六步,数据拥有者判断Esk(D)是否与存储服务器发送的T相等,如果相等,说明存储服务器正确地持有数据,否则,说明数据被破坏。In the sixth step, the data owner judges whether E sk (D) is equal to T sent by the storage server. If they are equal, it means that the storage server holds the data correctly; otherwise, it means that the data is destroyed. 2.根据权利要求1所述的一种基于密码算法同态性的数据持有性证明方法,其特征在于所述的密码算法指代任何一种对加法具有同态性的密码算法。2. A method for proving data possession based on cryptographic algorithm homomorphism according to claim 1, characterized in that said cryptographic algorithm refers to any cryptographic algorithm that is homomorphic to addition.
CN2010105941395A 2011-02-16 2011-02-16 Cryptographic algorithm homogeneity-based data possession proving method Pending CN102034061A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105941395A CN102034061A (en) 2011-02-16 2011-02-16 Cryptographic algorithm homogeneity-based data possession proving method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105941395A CN102034061A (en) 2011-02-16 2011-02-16 Cryptographic algorithm homogeneity-based data possession proving method

Publications (1)

Publication Number Publication Date
CN102034061A true CN102034061A (en) 2011-04-27

Family

ID=43886941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105941395A Pending CN102034061A (en) 2011-02-16 2011-02-16 Cryptographic algorithm homogeneity-based data possession proving method

Country Status (1)

Country Link
CN (1) CN102034061A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064931A (en) * 2012-12-21 2013-04-24 清华大学 Verifiable privacy data comparison and ranking query method
CN105227549A (en) * 2015-09-15 2016-01-06 淮阴工学院 A kind of data property held proof scheme
CN107483212A (en) * 2017-08-15 2017-12-15 武汉信安珞珈科技有限公司 A kind of method of both sides' cooperation generation digital signature

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101300570A (en) * 2005-11-04 2008-11-05 微软公司 Microsoft corp

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101300570A (en) * 2005-11-04 2008-11-05 微软公司 Microsoft corp

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《Proceedings of the 14th ACM conference on Computer and communications security》 20071231 Giuseppe Ateniese等 Provable Data Possession at Untrusted Stores 第602页至第605页 1,2 , 2 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103064931A (en) * 2012-12-21 2013-04-24 清华大学 Verifiable privacy data comparison and ranking query method
CN103064931B (en) * 2012-12-21 2015-09-30 清华大学 The private data that can verify compares and rank querying method
CN105227549A (en) * 2015-09-15 2016-01-06 淮阴工学院 A kind of data property held proof scheme
CN105227549B (en) * 2015-09-15 2018-07-27 淮阴工学院 A kind of data property held method of proof
CN107483212A (en) * 2017-08-15 2017-12-15 武汉信安珞珈科技有限公司 A kind of method of both sides' cooperation generation digital signature

Similar Documents

Publication Publication Date Title
US20210271764A1 (en) Method for storing data on a storage entity
CN110741600B (en) Computer-implemented system and method for providing a decentralised protocol for retrieving encrypted assets
US20210135854A1 (en) Method for signing a new block in a decentralized blockchain consensus network
CN102647433B (en) Efficient cloud storage data possession verification method
CN104008351B (en) Window application completeness check system, method and device
CN107392618A (en) It is implanted into the method and apparatus of intelligent contract
CN109741016B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN108399510A (en) A kind of Contract Risk management-control method and equipment
CN107426165A (en) Bidirectional secure cloud storage data integrity detection method supporting key updating
CN107147720A (en) Traceable effective public auditing method and traceable effective public auditing system in cloud storage data sharing
CN106650503A (en) Cloud side data integrity verification and restoration method based on IDA
CN105721158A (en) Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system
CN104202168A (en) Cloud data integrity verification method based on trusted third party
CN111160998B (en) Comment data processing method and device based on block chain and comment system
EP3395031B1 (en) Method for providing a proof of retrievability
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance&#39;s chain
CN105227317A (en) A kind of cloud data integrity detection method and system supporting authenticator privacy
CN113886883B (en) Internet of Things data management method and device
CN116910816B (en) Multiparty asset collaborative management method and device for improving privacy protection
CN112347516A (en) Asset certification method and device based on block chain
CN113381992A (en) License management method based on block chain
CN105515778A (en) Cloud storage data integrity service signature method
CN103973703A (en) Request method for safety of data exchange between application program and server
CN102034061A (en) Cryptographic algorithm homogeneity-based data possession proving method
CN109873828B (en) Resource management method, apparatus, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110427