期刊文献+

有限域上高效的细粒度数据完整性检验方法 被引量:1

An Efficient Integrity Check Method for Fine-Grained Data over Galois Field
下载PDF
导出
摘要 基于交叉检验思想的细粒度数据完整性检验方法在实现完整性检验的同时可以对少数错误进行准确和高效的隔离,从而避免因偶然错误或个别篡改造成整体数据失效的灾难性后果.针对需要隔离多个错误时现有方案效率不高的问题,提出了多维结构下基于有限域均匀划分的完整性交叉检验方法,相应地构造了高效的多错完整性指示编码.该方法将完整性检验Hash数据分为若干组,任一组Hash可在某一中间粒度独立指示所有数据对象的完整性,多组Hash结合起来则在更小的基本粒度指示数据的完整性.该方法实现了模块化的Hash结构,对于GF(q)上的d维向量空间,每增加(d-1)组共(d-1)q个Hash即可多指示一个错.分析了该编码在不同参数下的性能,分析结论和实验结果表明该编码效率高,具有灵活的参数选择,可满足各种应用的不同需要. Fine-grained data integrity checking methods by crossing hashing could isolate a portion of corrupted data segments and assure the integrity of other data at the same time,so as to mitigate the disaster effect on the data by some random errors or intentional forging modification.To improve the efficient of current available method for multi-error cases,a new crossing-hash integrity checking method is proposed based on Galois field uniform partition of multi-dimension structure,herein an efficient integrity indication code for multi-errors case is constructed accordingly.The method has a modular hash check structure.All hashes are divided into several groups,where each group with q rows d-1 columns hashes can indicate the integrity of all data independently in a moderate grain and combined hashes of several groups can indicate the integrity of data in a finer grain.At the same time,in a d dimension vector space over GF(q),one more error can be indicated by adding q rows d-1 columns hashes every time.Performances with various parameters of the code are analyzed.The performances analysis and experiments results show that this code can indicate multiple errors accurately and efficiently.The code provides a scalable scheme for different applications with several parameters.
作者 陈龙 王国胤
出处 《计算机学报》 EI CSCD 北大核心 2011年第5期847-855,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60573068) 重庆市自然科学基金项目(CSTC2008BA2041 2007BB2454) 重庆邮电大学博士启动基金(A2009-25)资助
关键词 计算机取证 HASH 数据完整性 组合编码 有限域 computer forensics hash data integrity combinatorial coding Galois field
  • 相关文献

参考文献14

二级参考文献44

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 3Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 4Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 5grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 6Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 7ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 8Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 9Richard III G G, Roussev V. Next-generation Digital Forensics [J]. Communications of the ACM, 2006,49(2) :76-80
  • 10[美]Steel C.Windows取证:企业计算机调查指南[M].吴渝,唐红,陈龙,译.北京:科学出版社,2007

共引文献260

同被引文献6

  • 1Qian Wang,Cong Wang,Kui Ren et al.Enable Public Auditability and Data Dynamics for StorageSecurity in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems . 2011
  • 2Erway C C,Kupcu A,Papamanthou C,et al.Dynamic provabledata possession. Proceedings of the 16th ACM conferenceon Computer and communications security . 2009
  • 3Ari Juels,Burton S Kaliski.PORs:Proofs of retriev-ability for large files. Proc.of CCS’’07 . 2007
  • 4Wang Cong,Wang Qian,Ren Kui,et al.Privacy-pre-serving public auditing for data storage security incloud computing. InfoCom 2010 . 2010
  • 5Merkle R C.Protocols for public key cryptosyste-ms. Proc of IEEE Symposium on Security and Pri-vacy’’80 . 1980
  • 6冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1070

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部