期刊文献+

云存储加密数据去重删除所有权证明方法 被引量:14

Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion
下载PDF
导出
摘要 随着云计算服务的广泛应用,为了节省磁盘空间和带宽,出现了一种新技术:客户端去重复化.但近期发现了一种针对该技术的新型攻击:攻击者只需获得原始文件的一个摘要信息,即文件的散列值,即可从服务器端获得全部原始文件.为了解决上述安全问题,提出了一个密码学安全的、高效的证明方案来支持多客户端加密文件的去重复删除场景.通过抽样检测、动态系数和随机选择的原始文件检索值使方案达到安全与高效的目标;同时,还提出了一种巧妙的分布式捎带技术,将文件加密密钥的分发过程与所有权证明过程同步实施.最后,对所提方案进行了严格的安全性证明和深入的性能分析与仿真,结果表明,所提的方案不仅能达到可证明的安全级别,而且执行效率较高,尤其在减少客户端计算负载方面. Abstract As the rapid adoption of cloud storage services, a new technology of client side deduplication is proposed to save the bandwidth of uploading copies of existing files to the server. This promising technology, however, has been recently found being vulnerable to a new kind of attack, in which by learning just a small piece of information about the file, namely its Hash value, an attacker is able to get the entire file from the server. To solve the problems mentioned above, we propose a cryptographically secure and efficient scheme to support cross-user client side deduplication over encrypted file. The new scheme utilizes the technique of spot checking in which the client only need to access small portions of the original file, dynamic coefficients, randomly chosen indices of the original files and a subtle approach to distribute the file encrypting key among clients to satisfy security requirements. Extensive security analysis shows that the proposed scheme can generate provable ownership of the encrypted file (POEF) with the presence of the curious server, and maintain a high detection probability of the client misbehavior. Both performance analysis and simulation results demonstrate that our proposed scheme is much more efficient than the existing schemes, especially in reducing the burden of the client.
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第1期248-258,共11页 Journal of Computer Research and Development
基金 国家自然科学基金青年基金项目(61303219 61100230) 国家自然科学基金重点项目(60633020) 中央高校基本科研业务费专项资金项目(K5051303007) 陕西省自然科学基金项目(2014JQ8295)
关键词 云存储 去重复化 可证明所有权 抽样检测 可证明安全 cloud storage deduplication provable ownership spot checking provable security
  • 相关文献

参考文献15

  • 1李建中,刘显敏.大数据的一个重要方面:数据可用性[J].计算机研究与发展,2013,50(6):1147-1162. 被引量:261
  • 2Wikipedia.Comparison of online backup services[EB/OL],(2014-01-27)[2014-01-28].http://en.wikipedia.org/wiki/Comparison of online backup services.
  • 3Dropbox Corporation.Dropbox cloud service[EB/OL],2007[2014-01-28].http://www.dropbox.com/.
  • 4Wuala Corporation.Wuala[EB/OL].2009[2014-01-28].http://www.wuala.com/.
  • 5Dutch M.Understanding data de-duplication ratios[EB/OL].(2009-02-01)[2014-01-28].http://www.snia.org/.
  • 6Harnik D,Pinkas B,Shulman-Peleg A.Side channels incloud services,the case of deduplication in cloud storage[J].IEEE Security and Privacy Magazine,2010,8(6):40-47.
  • 7Halevi S,Harnik D,et al.Proofs of ownership in remotestorage systems[C]//Proc of the 18th ACM Conf on Computer and Communications Security.New York:ACM,2011:491-500.
  • 8Mulazzani M,Schrittwieser S,et al.Dark clouds on thehorizon:Using cloud storage as attack vector and online slackspace[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:5-15.
  • 9Ryan S.Dropbox left user accounts unlocked for 4 hoursSunday[EB/OL].(2011-06-20)[2014-01-28].http://www.wired,com/threatlevel/2011/06/dropbox/.
  • 10Twitter Corporation.Tweetdeck[EB/OL].(2012-03-30)[2014-01-28].http://money,cnn.com/2012/03/30/technology/tweetdeckbug-twitter/.

二级参考文献159

  • 1Redman T. The impact of poor data quality on the typical enterprise [J]. Communications of the ACM, 1998, 41(2) : 79-82.
  • 2Miller D W, Yeast J D, Evans R L. Missing prenatal records at a birth center: A communication problem quantified [C] // Proc of AMIA Annual Syrup Proceedings. Maryland: American Medical Informatics Association, 2005 : 535-539.
  • 3Swartz N. Gartner warns firms of 'dirty data' [J]. Information Management Journal, 2007, 41(3): 6.
  • 4Kohn L T, Corrigan J M, Donaldson M S. To Err is Human: Building a Safer Health System [M]. Washington: National Academies Press, 2000.
  • 5Eckerson W. Data Warehousing Special Report Data quality and the bottom line [R]. Applications Development Trends, 2002.
  • 6English L P. Improving Data Warehouse and Business Information Quality: Methods for Reducing Costs and Increasing Profits [M]. New York: Wiley, 1999.
  • 7Woolsey B, Schulz M. Credit card statistics, industry facts, debt statistics [OL]. [2013-04-20 ]. http://www. creditcards, com/credit-card-news/credit-card-indust ry-facts- personal-debt-statistics-1276, php.
  • 8Shilakes C, Tylman J. Enterprise information portals [R]. New York: Merrill Lynch, 1998.
  • 9Rahm E, Do H H. Data cleaning:Problems and current approaches [J]. IEEE Data Engineering Bulletin, 2000, 23 (4): 3-13.
  • 10Dong X L, Berti-Equille L, Srivastava D. Integrating conflicting data:The role of source dependence[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 550-561.

共引文献260

同被引文献70

引证文献14

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部