Now cloud storage has become the preferred way for users to store large amounts of data. In order to verify the integrity of remote data, Merkle hash tree is often used to generate data fingerprints. Aiming at the shortcomings of existing common schemes for remote data authentication based on Merkle hash tree, in this paper, based on data block index number constructs the balance binary sort Merkle hash tree, and using two-layer data nodes to shorten the authentication path. At the same time, by introducing “virtual nodes” to maintain binary sort Merkle tree balance and simplify insertion; In addition, considering the requirements of sensitive information confidentiality, by group hash for sensitive information and non-sensitive information to ensure that sensitive information is not leaked in the verification process. Theoretical analysis shows that the authentication structure can fulfill the function of data integrity audit well, and support the dynamic operation of data blocks while maintaining the balance of Merkle tree.
CITATION STYLE
Shen, M., Liu, M., Li, Y., Batbayar, D., & Yao, X. (2019). Remote Data Authentication Scheme Based Balance Binary Sort Merkle Hash Tree. In Communications in Computer and Information Science (Vol. 1137 CCIS, pp. 199–213). Springer. https://doi.org/10.1007/978-981-15-1922-2_14
Mendeley helps you to discover research relevant for your work.