期刊文献+

多路复用大型云动态数据完整性检测方法

Method of Multiplex Large Cloud Dynamic Data Integrity Detection
下载PDF
导出
摘要 对大型云动态数据的完整性检测可以避免云用户存储在其中数据被篡改或删除。传统方法中,采用代数结构标签加密方法进行数据完整性检测,不能保证足够的置信度,性能不好。在云储存环境下,提出一种基于可信第三方判定和动态标签信息更新的多路复用大型云动态数据完整性检测方法。假设被处理云采集数据的是可分类的,引入了一个管理因子,得到多路复用标签信息,基于可信第三方判定和动态标签信息更新进行,进行对用户存在云存储服务器上的文件块被篡改或删掉的判定,由此实现一次数据完整性验证,提高大型云动态数据检测的准确性。仿真结果表明,该算法具有较好的多路复用大型云动态数据完整性检测性能,系统使用率提高,计算开销较少,检测准确性提高。 The integrity detection of dynamic data of large clouds can avoid the cloud user storage in which data was modi?fied or deleted. In the traditional method, encryption method for data integrity detection using the algebraic structure of la?bel, it cannot guarantee sufficient confidence, the performance is not good. In the cloud storage environment, proposes a multiplexing large cloud dynamic data integrity detection method of trusted third party determination and dynamic label based on information update. The hypothesis is processing cloud data acquisition can be classified, introduced a manage?ment factor, be multiplexed label information, a trusted third party determination and the dynamic tag information based on user updates, there found cloud storage of files on the server block was manipulated or deleted, thereby realizing a data in?tegrity verification to improve the accuracy of dynamic data, large cloud detection. The simulation results show that, the al?gorithm has the multiplex large cloud dynamic data integrity better detection performance, less computation cost, improve detection accuracy.
作者 李娟
出处 《科技通报》 北大核心 2015年第6期85-87,共3页 Bulletin of Science and Technology
关键词 多路复用 云计算 数据 multiplex cloud computing data
  • 相关文献

参考文献6

二级参考文献55

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 3Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 4Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 5Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 6Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 7Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 8Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 9Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.
  • 10Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS'07). New York:ACM, 2007:598-609.

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部