期刊文献+

基于哈希树的云存储完整性检测算法 被引量:6

Integrity Checking Algorithm Based on Hash Tree for Cloud Storage
下载PDF
导出
摘要 云存储服务使得用户无需大量软硬件投入即可享受大容量、高规格的存储服务,但是同时也带来了云环境下数据机密性、完整性和可用性等安全问题。针对云存储中的完整性问题,利用哈希树结构和大数模运算,提出了一种新的基于哈希树结构的数据完整性检测算法。分析结果表明,该算法使得用户只需在常量的存储、计算和网络资源下就能高概率地、正确地检测远端服务器数据文件的完整性,且支持文件数据的动态更新。 Cloud storage services enable user to enjoy high-capacity and high-quality storage with less overhead,but it also brings many potential threats,for example,data integrality,data availability and so on.This paper proposed a new integrality checking algorithm.Follow the analysis,this new algorithm,based on hash tree and big integer operation,can check mass file's integrality in less storage,compute and network resource.In addition,it also supports some data dynamic update.
机构地区 信息工程大学
出处 《计算机科学》 CSCD 北大核心 2012年第12期94-97,113,共5页 Computer Science
基金 863新概念高效能计算机体系结构及系统研究开发(2009aa012201)项目 现代通信实验室预研项目(9140C1103040902)资助
关键词 云计算 云存储 数据安全 数据完整性 Cloud computing Cloud storage Data security Data integrality
  • 相关文献

参考文献14

  • 1Kaufman L M. Data Security in the World of cloud computing [J]. Security & Privacy, 2009,7 : 61-64.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 3Mykletun E, Narasimha M, Tsudik G. Authentication and integ- rity in nutsourced databases [J]. ACM Transactions on Storage, 2006,2 (2) : 107-138.
  • 4Ateniese G, Burns R, Curtmola R, et al. Provable data posses- sion at untrusted stores [C]// Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York: ACM, 2007 : 598-609.
  • 5Juels A, Kaliski B S. Pors: proofs of retrievability for large files [C] // Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York: ACM, 2007 : 584-597.
  • 6Shacham H, Waters B. Compact proofs of retrievability[C]// Proceedings of Asiacrypt 2008. Berlin.. Springer-Verlag, 2008: 90-107.
  • 7Ateniese G, Pietro R D, Mancini L V, et al. Scalable and efficient provable data possession [C]//Proceedings of the 4th interna- tional conference on security and privacy in Communication net- works. New York: ACM, 2008: 9 : 1-10.
  • 8Wang C, Wang Q, Ren K, et al. Ensuring data storage security in cloud computing[C]//Proceedings of International Workshop on Quality of Service 2009. New York: USA: IEEE, 2009 : 1-9.
  • 9Erway C C, Kupcu A, Papamanthou C, et al. Dynamic provable data possession [C]// Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, 2009:213-222.
  • 10Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[J]. Lec- ture Notes in Computer Science, 2009,5789/2009 :355-370.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

同被引文献61

  • 1靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,28(6):1013-1020. 被引量:4
  • 2赵跃龙 蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计.计算机研究与发展,2009,46:44-49.
  • 3Bruce Schneier.应用密码学[M].吴世忠,祝世雄,张文政,等,译.北京:机械工业出版社2000.
  • 4李现伟,刘国华,苑迎,麻会东.一种基于信息分解与合成的数据库加密方法[J].计算机工程与科学,2007,29(10):54-56. 被引量:4
  • 5Zhan Ying,Sun Yong. Cloud storage management technology[A].2009.
  • 6Storage networking Industry Association. Cloud storage for cloud computing[EB/OL].http://www.snia.org,.
  • 7Larry D. Cloud computing hasn't gone fortune 500 yet,but it's coming[EB/OL].http://blogs.zdnet.corn/BTL/? p=8199,.
  • 8Atenises G,Burns R,Curtmola R. Provable data possession at untrusted stores[A].New York:ACM Press,2007.598-609.
  • 9Atenises G,Kamara S,Katz J. Proofs of storage from homomorphic identification protocols[A].Berlin:Springer-Verlag,2009.319-333.
  • 10Shah M A,Baker M,Mogul J C. Auditing to keep online storage services honest[A].Berkeley,CA:USENIX Association,2007.1-6.

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部