期刊文献+

一种新的满足隐私性的云存储公共审计方案 被引量:3

A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
下载PDF
导出
摘要 在云存储网络环境中,数据的安全性、完整性和隐私性是用户最关心的问题之一。云存储服务中,用户将存储的数据和认证标识信息存储在云服务器中。为了保证存储数据的完整性,云存储服务提供者需要向用户或第三方审计者证明其正确地持有用户存储的数据。公共审计是指由用户以外的第三方代替用户完成审计工作,这对于计算资源比较有限的用户尤其重要。目前多数云存储审计方案没有考虑隐私性问题。本文提出了一种新的可聚合基于签名的广播加密(ASBB)方案,并在此基础上设计了新的满足隐私性的云存储公共审计方案。新方案在随机预言模型下是可证安全的,并且在计算开销方面更具有优势。 When user stores their data in the cloud storage, they most concern about whether the data is complete, privacy and unchanged. To ensure the availability and integrity of users" stored data, cloud server must prove a verifier that it is actually storing all of a client's data unchanged. And, enabling public auditability for cloud storage is of critical importance to users with constrained computing resources, who can resort to a third party auditor to check the integrity of outsourced data. However, most of the existing auditing schemes do not consider data privacy problem. In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.
出处 《电信科学》 北大核心 2012年第9期15-21,共7页 Telecommunications Science
基金 国家自然科学基金资助项目(No.60903181) 南京邮电大学基金资助项目(No.NY208072)
关键词 云计算 云存储 公共审计 隐私性 完整性 cloud computing, cloud storage, public auditing, privacy, integrity
  • 相关文献

参考文献19

  • 1Einar M, Maithili N, Gene T. Authentication and integrity in outsourced databases. ACM Transactions on Storage, 2006,2(2): 107-138.
  • 2Ateniese G, Burns R, Curtmola R, et al. Provable Data Possession at Untrusted Stores. Cryptology ePrint Archive, Report 2007/202, 2007.
  • 3Ateniese G, Pietro R D, Maneini L V, et d. Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, ACM, 2008.
  • 4Juels A, Kaliski B. Pors: proofs of retrievability for large files. Proceedings of CCS 2007, Alexandria, VA, USA, 2007:584-597.
  • 5Erway C, Kupcu A, Papamanthou C, et ol. Dynamic Provable Data Possession. Cryptology ePrint Archive, Report 2008/432, 2008.
  • 6Wang Q, Wang C, Li J, et ol. Enabling public verifiability and data dynamics for storage security in cloud computing. Lecture Notes in Computer Science, 2009(5759):355-370.
  • 7Wang Q, Wang C, Ren K, et al. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847-859.
  • 8Shah M A, Baker M, Mogul J C, et ol. Auditing to keep online storage services honest. Proceedings of I-IotOS'07, Berkeley, CA, USENIX, 2007:1 N6.
  • 9Cao N, Yang Z Y, Wang C, et al. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of IEEE INFOCOM 2010, San Diego, CA, 2010:525-533.
  • 10Shacham H, Waters B. Compact proofs of retrievability. Proceedings of ASIACRYPT 2008, Melbourne, Australia, 2008: 90 - 107.

同被引文献10

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部