System and method for verifying integrity of cloud data using unconnected trusted device
First Claim
Patent Images
1. A method for verifying integrity of cloud data, the method comprising:
- requesting, by a computing device, encrypted data through a terminal from a metadata offsite location on a cloud storage, the encrypted data is associated with original data that comprises a subset of the cloud data for a user that was uploaded and stored in the cloud storage;
receiving, by the computing device, the encrypted data, wherein the encrypted data is metadata obtained by identifying one or more sentinel locations within the original data that comprises the subset of the cloud data and encrypting the one or more sentinel locations and sentinel data by a user personalized key;
obtaining, by the computing, the sentinel data from one or more predefined sentinel locations in the encrypted data after decrypting through a user personalized key that is stored by the computing device;
requesting, by the computing device, the original data that comprises the subset of the cloud data from the cloud storage through the terminal;
comparing, by the computing device, the sentinel data and the original data to verify integrity of the original data in the cloud storage; and
displaying, by the computing device, a result of data integrity based on the comparing.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
-
Citations
3 Claims
-
1. A method for verifying integrity of cloud data, the method comprising:
-
requesting, by a computing device, encrypted data through a terminal from a metadata offsite location on a cloud storage, the encrypted data is associated with original data that comprises a subset of the cloud data for a user that was uploaded and stored in the cloud storage; receiving, by the computing device, the encrypted data, wherein the encrypted data is metadata obtained by identifying one or more sentinel locations within the original data that comprises the subset of the cloud data and encrypting the one or more sentinel locations and sentinel data by a user personalized key; obtaining, by the computing, the sentinel data from one or more predefined sentinel locations in the encrypted data after decrypting through a user personalized key that is stored by the computing device; requesting, by the computing device, the original data that comprises the subset of the cloud data from the cloud storage through the terminal; comparing, by the computing device, the sentinel data and the original data to verify integrity of the original data in the cloud storage; and displaying, by the computing device, a result of data integrity based on the comparing.
-
-
2. A computing device comprising:
-
a processor; a memory coupled to the processor which is configured to execute programmed instructions stored in the memory to; request encrypted data through a terminal from a metadata offsite location on a cloud storage, the encrypted data is associated with original data that comprises a subset of cloud data for a user that was uploaded and stored in the cloud storage; receive the encrypted data, wherein the encrypted data is metadata obtained by identifying one or more sentinel locations within the original data that comprises the subset of the cloud data and by encrypting the one or more sentinel locations and sentinel data by a user personalized key; obtain sentinel data from one or more predefined sentinel locations in the encrypted data after decrypting through a user personalized key that is stored by the computing device; request the original data from the cloud storage through the terminal; compare the sentinel data and the original data to verify integrity of the original data in the cloud storage; and display a result of data integrity based on the comparison.
-
-
3. A non-transitory computer readable medium having stored thereon instructions for verifying integrity of cloud data comprising machine executable code which when executed by at least one processor, causes the at least one processor to perform steps comprising:
-
requesting encrypted data through a terminal from a metadata offsite location on a cloud storage, the encrypted data is associated with original data that comprises a subset of the cloud data for a user that was uploaded and stored in the cloud storage; receiving the encrypted data wherein the encrypted data is metadata obtained by identifying one or more sentinel locations within original data that comprises the subset of the cloud data and by encrypting the one or more sentinel locations and sentinel data by a user personalized key; obtaining sentinel data from one or more predefined sentinel locations in the encrypted data after decrypting through a user personalized key that is stored by a computing device making the request; requesting original data from the cloud storage through the terminal; comparing the sentinel data and the original data to verify integrity of the original data in the cloud storage; and displaying a result of data integrity based on the comparing.
-
Specification