期刊文献+

云存储服务中支持动态数据完整性检测研究 被引量:2

Research on Dynamic Data Integrity Detection on Cloud Storage
下载PDF
导出
摘要 伴随着云计算与存储技术的飞速发展,越来越多的用户选择把自己的存储需求交由云来实现.与此同时,用户的数据也面临严峻的安全考验,云存储安全事件引起了业界的强烈关注和研究.在云存储服务中,为了使用户能方便地检测其存储在云端数据的完整性,本文提出了一种基于同态标签的数据完整性检测架构.本架构通过同态标签的特有性质能方便快捷地检测数据的完整性,并且支持数据动态更新和公开可验证性,然后给出了本架构的正确性和安全性分析.开发实现了云存储数据完整性检测服务.最后,通过实验表明本架构能较好地实现数据完整性检测. More and more users have chosen cloud for their storage demands for its low cost, high availability and reliability. In the meantime, a great challenge for data security is also brought in the spotlight, and some security incidents have decreased users' trust in cloud services. Consequently, security problems of cloud storage have come hot topic to researches. In the paper, a data integrity detection framework is proposed based on homomorphic verifiable tags, which is designed to detect the integrity of data stored in the clouds. The services provided by the framework can be used for data signature and integrity detection quickly through homomorphic verifiable tags characteristic. The framework supports data dynamic updating and third party auditor. The correctness and security of algorithms used for signature and integrity detection is also analyzed. The service components were developed for data integrity detec- tion and deployed on Eucalyptus cloud platform. An experiment is constructed in order to show feasibility of this framework in data integrity detection.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第2期239-243,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61202376)资助
关键词 云存储 数据完整性检测 数据动态更新 公开可验证性 cloud storage data integrity detection dynamic data public verifiability
  • 相关文献

参考文献2

二级参考文献40

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 3Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 4Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 5Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 6Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 7Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 8Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 9Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.
  • 10Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS'07). New York:ACM, 2007:598-609.

共引文献1091

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部