Remote Data Authentication Scheme Based Balance Binary Sort Merkle Hash Tree

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Now cloud storage has become the preferred way for users to store large amounts of data. In order to verify the integrity of remote data, Merkle hash tree is often used to generate data fingerprints. Aiming at the shortcomings of existing common schemes for remote data authentication based on Merkle hash tree, in this paper, based on data block index number constructs the balance binary sort Merkle hash tree, and using two-layer data nodes to shorten the authentication path. At the same time, by introducing “virtual nodes” to maintain binary sort Merkle tree balance and simplify insertion; In addition, considering the requirements of sensitive information confidentiality, by group hash for sensitive information and non-sensitive information to ensure that sensitive information is not leaked in the verification process. Theoretical analysis shows that the authentication structure can fulfill the function of data integrity audit well, and support the dynamic operation of data blocks while maintaining the balance of Merkle tree.

Cite

CITATION STYLE

APA

Shen, M., Liu, M., Li, Y., Batbayar, D., & Yao, X. (2019). Remote Data Authentication Scheme Based Balance Binary Sort Merkle Hash Tree. In Communications in Computer and Information Science (Vol. 1137 CCIS, pp. 199–213). Springer. https://doi.org/10.1007/978-981-15-1922-2_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free