期刊文献+

云存储服务中支持合作方式的数据完整性验证研究

Research on Collaborative Approach Data Integrity Verification on Cloud Storage
下载PDF
导出
摘要 伴随着云计算和存储技术的发展,越来越多的用户把自己的敏感数据存储在云服务器上,与此同时,用户的数据面临安全的考验,针对这种情况,为了更好的实现数据完整性验证技术,帮助用户更好的使用云存储服务,提出一种支持合作方式的数据完整性验证方法,通过引入分布式多TPA系统可以同时处理不同用户的数据验证请求,运用代数签名和同态标签的性质对数据进行审计,并且支持公开可验证。最后实验结果显示了该方法在数据完整性验证方面的性能和高效性。 More and more have chosen cloud for their storage demands for its low cost, high availability and reliability. In the meantime, a great challenge for data security is also brought in the spotlight, and some security incidents have decreased users' trust in cloud services. For this kind of situation, in order to better implement the data integrity verification technology, help us- ers to better use cloud storage service, In the paper, Put forward a way to support the cooperation of data integrity verification method, by introducing a distributed multiple TPA system can handle data validation request of different users at the same time, using algebra signatures and homomorl0hism tags to the nature of the audit data, and support the publicly verifiable.
作者 王惠清 周雷 WANG Hui-qing,ZHOU Lei (1.Department of Luzhou Medical College, Luzhou Medical College, Luzhou 646000,China;2.College of Information Science and Engineering, Central South University, Changsha 410083, China)
出处 《电脑知识与技术》 2015年第1期19-23,共5页 Computer Knowledge and Technology
基金 国家自然科学基金青年科学基金项目(51308465)
关键词 云存储 数据完整性验证 代数签名 同态 多TPA cloud storage Data integrity verification algebraic signature homomorphic TAG multiple TPA
  • 相关文献

参考文献10

  • 1陈兰香.一种基于同态Hash的数据持有性证明方法[J].电子与信息学报,2011,33(9):2199-2204. 被引量:30
  • 2Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted store[C]//Pro of thel4thACM Conference on Comuter and Communication Security.New York:ACM Press,2007:598-609.
  • 3Erway C,Kupcu A,Papamanthou C, et al. Dynamic provable data possession[c]//proc of the 16 th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009: 213-222.
  • 4肖达,舒继武,陈康,郑纬民.一个网络归档存储中实用的数据持有性检查方案[J].计算机研究与发展,2009,46(10):1660-1668. 被引量:24
  • 5Shacham H, Water B.Compact Proofs of retrievability[C]//Proc of the lgth International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer-Verlag, 2008: 90- 107.
  • 6Boneh D,Lynn B,Shacham H. Short signatures from the Weil pairing[J]. Journal of Cryptology, 2004, 17(4): 297-319.
  • 7Bowers K D, Juels A, Opre A. Proofs of retrievability: theory and implementation[C]//Proc of ACM Workshop on Cloud Computing Se- curity. New York:ACM Press, 2009:43-54.
  • 8Schwarz T J E, Miller E L.Store, forget, and check: using algebraic signatures to check remotely administered storage[C]//Proc of ICDCS,2006,12.
  • 9Litwin, W, Schwarz, T J E. Algebraic signatures for scalable and distributed data structures[C]//ICDE 2004.Boston,MA, 2004:412- 423.
  • 10胡德敏,余星.一种基于同态标签的动态云存储数据完整性验证方法[J].计算机应用研究,2014,31(5):1362-1365. 被引量:14

二级参考文献50

  • 1Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 2Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 3Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 4Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 5Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 6Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 7Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 8Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.
  • 9Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS'07). New York:ACM, 2007:598-609.
  • 10Filho D, Baretto P. Demonstrating data possession and uneheatable data transfer [EB/OL]. [2008-02-10]. http:// eprint. iacr. org/2006/150. pdf.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部