期刊文献+

基于同态hash的数据多副本持有性证明方案 被引量:12

Multiple-replica provable data possession based on homomorphic hash
下载PDF
导出
摘要 为检查云存储中服务提供商(CSP)是否按协议完整地存储了用户的所有数据副本,在分析并指出一个基于同态hash的数据持有性证明方案安全缺陷的基础上,对其进行了改进和扩展,提出了一个多副本持有性证明方案。为实现多副本检查,将各副本编号与文件连接后利用相同密钥加密以生成副本文件,既有效防止了CSP各服务器的合谋攻击,又简化了用户和文件的授权访问者的密钥管理;为提高检查效率,利用同态hash为数据块生成验证标签,实现了对所有副本的批量检查;为保证方案安全性,将文件标志和块位置信息添加到数据块标签中,有效防止了CSP进行替换和重放攻击。安全性证明和性能分析表明,该方案是正确和完备的,并具有计算、存储和通信负载低,以及支持公开验证等特点,从而为云存储中数据完整性检查提供了一种可行的方法。 In cloud storage,in order to check whether all the file replicas were stored by the CSP(cloud service provider) intactly,this paper proposed a multiple-replica provable data possession scheme by improving and extending one scheme based on homomorphic hash.To achieve multiple-replica checking,it generated differentiable replicas by using a single key to encrypt the concatenation of the serial numbers of replicas and the file.Differentiable replicas could prevent the colluding attack among servers,and simplify the key management of cloud user and authorized file users.To improve checking performance,it generated the verifying tags by homomorphic hash,which enabled the batch checking of all replicas.It added the information of file identification and block position into the block tags to prevent both of the replace and replay attacks from the CSP.The security and performance analysis shows that the scheme is correct and sound,and has some favorable characteristics,which includes low computing,storing and communicating load,and public verifiability support.Therefore,this scheme provides a practicable method for integrity checking in cloud storage.
出处 《计算机应用研究》 CSCD 北大核心 2013年第1期265-269,共5页 Application Research of Computers
基金 国家"973"资助项目(2012CB315901)
关键词 云存储 完整性检查 多副本持有性证明 同态哈希 cloud storage integrity checking multiple-replica provable data possession homomorphic hash
  • 相关文献

参考文献19

  • 1DESWARTE Y, QUISQUATER J J, SAIDANE A. Remote integrity checking[ C]//Proc of Integrity and Internal Control in Information Svstems. Berlin : SDrinzer-Verlaa. 2003 : 1 - 11.
  • 2ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data pos- session at untrusted stores[ C ]//Proc of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
  • 3JULES A, KALISKI B S. Pors: proofs of retrievability for large files [ C ]//Proc of the 14th ACM Conference on Computer and Communi-cations Security ( ACM-CCS' 07 ), New York : ACM,2007:584-597.
  • 4DODIS Y, VADHAN S, WICHS D. P'oofs of retrievability via hard- ness amplificationl C]//Proe of the 6th Theory of Cryptography Con- ference on Theory of Cryptography. Berlin : Springer-Vedag, 2009 : 109-127.
  • 5BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: theory and implementation [ C ]//Proc of ACM Workshop on Cloud Compu- ting Security. New York:ACM,2009:43-54.
  • 6ZHU Yan, WANG Huai-xi, HU Ze-xing, et al. Dynamic audit serv- ices for integrity verification of outsourced storage in clouds[ C ]//Proc of ACM Symposium on Applied Computing. New York : ACM, 2011 : 1550-1557.
  • 7ZHENG Qing-ji, XU Shou-huai. Fair and dynamic proofs of retriev- ability[ C]//Proc of the 1st ACM Conference on Data and Application Security and Privacy. New York:AGM,2011:237-248.
  • 8LIU Fei-fei, GU Da-wu, LU Hai-ning. An improved dynamic prov- able data possession model [ C ]//Proc of IEEE International Confer- ence on Cloud Computing and Intelligences Systems. Washington DC : IEEE Computer Society, 2011:290- 295.
  • 9WANG Qian, WANG Cong, REN Kui, et al. Enabling public audit- ability and data dynamics for storage security in cloud computing[ J]. IEEE Yrans on Parallel and Distributed Systems, 2011,22(5) : 847- 859.
  • 10ZHUO Hao, SHENG Zhong, NENG Hai-yu. A privacy-preserving re- mote data integrity checking protocol with data dynamics and public verifiability[ J]. IEEE Xrans on Knowledge and Data Engineer- ing,2011,23(9) :1432-1437.

二级参考文献20

  • 1Deswarte Y, Quisquater J J, and Saidane A. Remote integrity checking. Proceedings of IICIS'03, Switzerland, Nov. 13-14, 2003: 1-11.
  • 2Ateniese G, Burns R, Curtmola R, et al.. Provable data possession at untrusted stores. Proceedings of ACM-CCS '07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 598-609.
  • 3Ateniese G. Kamara S, and Katz J. Proofs of Storage from homomorphic identification protocols. Proceedings of ASIACRYPT '09, Tokyo, Japan, Dec. 6-10, 2009: 319-333.
  • 4Ateniese G, Pietro R D, Mancini L V, et al.. Scalable and efficient provable data possession. Proceedings of SecureComm'08, Istanbul, Turkey, Sept. 22-26, 2008: 1-10.
  • 5Curtmola R, Khan O, Burns R, and Ateniese G. MR-PDP: multiple-replica provable data possession. Proceedings of ICDCS '08, Beijing, China, June 19, 2008: 411-420.
  • 6Erway C, Kttpcu A, Papamanthou C, et al.. Dynaxnic provable data possession. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 213-222.
  • 7Juels A and Kaliski B S. Pors: proofs of retrievability for large files. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 584-597.
  • 8Shacham H and Waters B. Compact proofs of retrievability. Proceedings of ASIACRYPT '08, Melbourne, Australia, Dec. 7-11, 2008: 90-107.
  • 9Boneh D, Lynn B, and Shacham H. Short signatures from the Well pairing. Journal of Cryptology, 2004, 17(4): 297-319.
  • 10Dodis Y, Vadhan S, and Wichs D. Proofs of retrievability via hardness amplification. Proceedings of TCC'09, San Francisco, CA, USA, Mar. 15-17, 2009: 109-127.

共引文献29

同被引文献77

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2刘田甜,李超,胡庆成,张桂刚.云环境下多副本管理综述[J].计算机研究与发展,2011,48(S3):254-260. 被引量:20
  • 3ATENIESE G, PIETRO R D, MANCINI L V, et al.Scalableand efficientprovable datapossession[C]//Proc of the 4th International Conference on Secure and Privacy in Communication Networks.New York:ACM Press,2008:9.
  • 4ERWAY C, KP A, PAPAMANTHOU C, et al.Dynamic prova-ble datapossession[C]//Proc of the 16th ACM Conference on Computer and Communications.New York:ACM Press,2009:213-222.
  • 5SHACHAM H, WATERS B.Compact proofs ofretrievability[C]//Advances in Cryptology.Berlin:Springer,2008:90-107.
  • 6BONEH D, LYNN B, SHACHAM H.Short signatures from theWeilpairing[J].Journal of Cryptology,2004,17(4):297-319.
  • 7BOWERS K D, JUELS A, OPREA A.Proofs ofretrievability:theoryand implementation[C]//Proc of the 1st ACM Cloud Computing Security Workshop.Nwe York:ACM Press,2009:43-54.
  • 8JONES G A, JONES J M.Elementary number theory[M].London:Springer-Verlag,1998.
  • 9WANG Qian, WANG Cong, LI Jin, et al.Enabling publicverifiabilityand data dynamics for storage security in cloud computing[C]//Proc of the 14th European Symposium on Research in Computer Security.Berlin:Springer-Verlag,2009:355-370.
  • 10NOUHA O, JEAN L, YVES R.Verifying remote dataintegrity inpeer-to-peer data storage:a comprehensivesurvey ofprotocols[J].Peer-to-Peer Networking and Applications,2011,5(3):231-243.

引证文献12

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部