US 11,689,354 B2
Efficient and scalable mechanism to protect integrity and authenticity of large data sets in cloud logging environments
Karthik Venkatesh, Bothell, WA (US); Saikat Chakrabarti, Pueblo, CO (US); and Pratibha Anjali Dohare, Seattle, WA (US)
Assigned to Oracle International Corporation, Redwood Shores, CA (US)
Filed by Oracle International Corporation, Redwood Shores, CA (US)
Filed on Oct. 7, 2020, as Appl. No. 17/65,313.
Prior Publication US 2022/0109557 A1, Apr. 7, 2022
Int. Cl. H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/0643 (2013.01) [H04L 9/0836 (2013.01); H04L 9/30 (2013.01); H04L 9/3247 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving at a recipient system from a sender system transmitted content (C) and appended content, the appended content comprising a digital signature associated with the content (C) and a hash tree (“SHT”) associated with the content (C) and comprising a plurality of first nodes and a first root node;
authenticating the digital signature based on a hash tree (“RHT”), wherein RHT is generated by the recipient system with content (C), wherein authenticating the digital signature based on RHT comprises comparing a resultant hash generated from the digital signature to a particular hash value generated based on at least a portion of RHT;
identifying a potentially corrupted portion of content (C) based on a comparison of at least portions of SHT with at least portions of RHT; and
indicating that the content (C) could not be verified.