期刊文献+

空间高效的分布式数据存储方案 被引量:2

Scheme of high space efficiency in distributed storage
下载PDF
导出
摘要 针对分布式数据存储中空间效率低、计算复杂度高等问题,基于Jordan矩阵和拉格朗日差值公式,提出了一种一般访问结构上高效的分布式数据存储方案。方案是计算安全的,空间利用率与理论安全的方案相比提高了m2倍,每个存储服务器只需维护长度很短的秘密份额,就可以实现大数据的分布式存储。在数据存储过程中,存储服务器根据双线性对的性质计算并贡献影子份额,确保秘密份额的安全性。方案具有可公开验证性,有效防止了数据分发者与存储服务器的欺骗。最后对方案的正确性、安全性、拓展性、空间效率等进行分析,表明方案在分布式数据安全存储中具有很好的应用前景。 Focusing on the problem of low space efficiency and high computational complexity in distributed network,this paper proposed a scheme of high space efficiency in distributed data storage on general access structure based on the theory of Jordan matrix and the formulary of Lagrange differential. This scheme was computational secure,which improved the efficiency of m2 times compared to those which were theoretical secure. Each storage server could share a long secret with each of them keeping a short share. In the process of data storing,storage server just computed and contributed the shadow according to the theory of bilinear pairing,assuring the safety of the share. The scheme was publicly verifiable,so cheating between secret distributer and storage server was avoided. In the end,it analyzed the validity,security,expansibility and space efficiency of the scheme. The result indicates that the scheme can be of good use in secure distributed storage.
出处 《计算机应用研究》 CSCD 北大核心 2015年第5期1508-1511,共4页 Application Research of Computers
基金 国家自然科学基金资助项目 陕西省自然科学基础研究计划面上计划资助项目
关键词 秘密共享 空间高效 Jordan矩阵 分布式数据存储 secret sharing space efficiency Jordan matrix distributed storage
  • 相关文献

参考文献12

  • 1SHAMIR A. How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys[C] //Proc of AFIPS National Computer Conference. 1979:313-317.
  • 3张柄虹,张串绒,焦和平,张欣威,高胜国.一种基于双线性对的公开可验证多秘密共享方案[J].空军工程大学学报(自然科学版),2014,15(4):83-87. 被引量:4
  • 4MINOWA T,TAKAHASHI T. Secure distributed storage for bulk data[J].Lecture Notes in Computer Science,2012,7667(1):576-583.
  • 5PARAKH A,KAK S. Space efficient secret sharing[C] //Proc of the 4th Annual Computer Science Research Conference. 2009.
  • 6刘艳红,张福泰.不需要安全信道的空间有效秘密分享方案[J].计算机学报,2012,35(9):1816-1822. 被引量:2
  • 7YANG Xiao-yuan,LIU Zhen,ZHANG Wei,et al. A high efficiency data distribution algorithm in distributed storage[C] //Proc of the 5th International Conference on Information Assurance and Security. 2009:627-630.
  • 8ZHAO Da-wei,PENG Hai-ping,WANG Cong,et al. A secret sharing scheme with a short share realizing the threshold and the adversary structure[J].Computer &Mathematics with Applications,2012,64(4):611-615.
  • 9PANG Liao-jun,WANG Yu-min. A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing[J].Applied Mathema-tics and Computation,2005,167(2):840-848.
  • 10徐仲,张凯远,陆权,等.矩阵论简明教程[M].2版.北京:科学出版社.2005:114-118.

二级参考文献33

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2黄东平,刘铎,王道顺,戴一奇.一种安全的门限多秘密共享方案[J].电子学报,2006,34(11):1937-1940. 被引量:6
  • 3Blakley G R. Safeguarding cryptographic keys//Proceedings of the AFIPS 1979 National Computer Conference. New York, 1979:313-317.
  • 4Shamir A. How to share a :secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 5Harn L. Efficient sharing (broadcasting) of multiple secrets. IEEE Proceedings Computers and Digital Techniques, 1995, 142(3) : 237-240.
  • 6Chien H Y,Jan J K, Tseng Y M. A practical (t,n) multi secret sharing scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2000, E83 A(12): 2762- 2765.
  • 7Pang L J, Wang Y M. A new (t,n) multi-secret sharing scheme based on Shamir' s secret sharing. Applied Mathe matics and Computation, 2005, 167(2): 840-848.
  • 8Yang C C, Chang T Y, Hwang M S. A (t,n) multi-secret sharing scheme. Applied Mathematics and Computation, 2004, 151(2): 483-490.
  • 9Li Huixian, Cheng Chentian, Pang Liaojun. A new (t,n) threshold multi-secret sharing scheme//Lecture Notes in Artificial Intelligence. Berlin: Springer-Verlag, 2005: 421-426.
  • 10Li Huixian, Pang Liaojun, Cai Wandong. An efficient threshold multi-group-secret sharing scheme//Proceedings of the 2nd International Conference on Fuzzy Information and Engineering. Heidelberg, 2007:911-918.

共引文献5

同被引文献16

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部