期刊文献+

云计算中一种对大群组用户的隐私保护公共审计方案 被引量:20

A Privacy-Preserving Public Auditing Mechanism for the Date with Large Groups Users in the Cloud Computing
下载PDF
导出
摘要 如今,随着科学技术的发展,云计算得到越来越多的关注和应用,随之而来的则是数据存储的安全问题。因此,与云存储有关的密码学研究成为学术界的一个热门领域。使用云存储服务的用户可以享受高质量的按需服务。但是,由于用户不再物理地拥有数据,因此无法保证云计算中数据的正确性和完整性。文章提出了一种隐私保护机制来保护用户存储在云中的数据的隐私,同时引进可信的第三方审计员(TPA)支持公共审计。在执行公共审计时,检查外包数据的完整性。为安全引进有效的TPA,必须保证审计过程对用户数据的隐私不构成新的安全威胁,同时不会给用户带来其他在线压力。特别地,当用户数据要和云中大部分人共享时,为保证数据不被云篡改,就必须委托TPA进行审计,同时TPA可以不检索整个数据。因此,无论是数据块信息还是数据块上的签名信息,对TPA而言仍是保密的。 Nowadays, with the development of science and technology, cloud computing gets more and more attentions and is put in use increasingly, and then the security problem of date storage appears. Therefore, cryptography related to the cloud storage has become a very hot topic in the academic circles. Users can enjoy the on-demand high quality services by using cloud storage. But, because users no longer physically occupy the date,they can' t ensure the correctness and the integrity of the date in the cloud computing. This paper proposes a privacy-preserving mechanism to ensure the privacies of the users, introduces a trusted third party auditor(TPA) to perform public audit, while checks the integrities of the outsourcing data. To securely introduce an effective TPA, the auditing process should bring no new security threats towards the users' date privacies, and bring no additional online pressure to users. Especially, while the users' date should be shared by a large number of users in the cloud, it must entrust the TPA to audit in order to ensure data not be tampered, and at the same time the TPA can not retrieve the entire data. Therefore, no matter the information or signature information on the data block, they are still confi dential to TPA.
出处 《信息网络安全》 2015年第2期19-25,共7页 Netinfo Security
基金 国家自然科学基金面上项目[11271003] 广东省高校科技创新项目[2013KJCX0146] 教育部高等学校博士学科点专项科研基金联合资助课题(博导类联合)[20134410110003]
关键词 隐私保护 第三方审计员 云审计 云存储 云计算 privacy-preserving third party auditor(TPA) cloud audit cloud storage cloud computing
  • 相关文献

参考文献2

二级参考文献37

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1097

同被引文献167

  • 1石井,吴哲,谭璐,王昊鹏,王娜.RSA数据加密算法的分析与改进[J].济南大学学报(自然科学版),2013,27(3):283-286. 被引量:26
  • 2杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 3任永杰,单海涛.KVM虚拟化技术实战与原理解析[M].北京:机械工业出版社,2013.
  • 4Hacigiiln/.is H, lyer B, Mehrotras S. Providing database as a service[C]//Proceedings of the 18th International Conference on Data Engineering, Washington, 2002:29 38.
  • 5Kivest L, Adleman M, and Dertouzos L. On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978: 169-178.
  • 6Bijit H. Storing and querying data securely in untrusted environments[I)]. University of California, 2007.
  • 7Cao Ning, Wang Cong, Li Ming, et al. Privacy-preserving multi keyword ranked search over encrypted cloud data[C]//Proceedings of INFOCOM. Shanghai, 2011, 829-837.
  • 8Sun S. Anti-tamper database research: Query encrypted databascs[D]. Case Western Reserve University. 2005.
  • 9Craig G. Fully homomorphic encryption using ideal lattices[C]// Proceedings of the 41st ACM Symposium on Theory of Computing. Maryland, 20(19, 169-179.
  • 10Marten D, Craig G, Shai H, et al. Fully homomorphic encryption over the integers[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010, LNCS 6110: 24-43.

引证文献20

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部