期刊文献+

云存储中数据完整性的聚合盲审计方法 被引量:7

Aggregated privacy-preserving auditing for cloud data integrity
下载PDF
导出
摘要 针对云存储中数据完整性问题,提出了一种聚合盲审计方法。利用双线性对映射的性质,在云服务器端将数据证据和标签证据加密后再合并,实现审计者在不知数据内容的情况下进行盲审计。在此基础上,设计高效的索引机制支持数据更新,使数据更新操作不会导致大量额外的计算和通信开销,实现了动态审计。同时,针对多个审计请求,设计将不同的证据聚合的方法,以支持对多所有者多云服务器多文件的批量审计,使批量审计的通信开销与审计请求的数量无关。理论分析和实验结果表明,该方法是可证明安全的,与现有的其他审计方案相比,所提的单审计和批量审计的效率分别提高了21.5%和31.8%。 To solve the problem of data integrity in cloud storage, an aggregated privacy-preserving auditing scheme was proposed. To preserve data privacy against the auditor, data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server. Furthermore, an efficient index mechanism was designed to support dynamic auditing, which could ensure that data update operations did not lead to high additional computation or communication cost. Meanwhile, an aggregation method for different proofs was designed to handle multiple auditing requests. Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files. The communication cost of batch auditing was independent of the number of auditing requests. The theoretical analysis and experimental results show that the proposed scheme is provably secure. Compared with existing auditing scheme, the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.
出处 《通信学报》 EI CSCD 北大核心 2015年第10期119-132,共14页 Journal on Communications
基金 国家自然科学基金资助项目(61373040 61173137) 湖北省自然科学基金资助项目(2010CDA004)~~
关键词 云存储 数据完整性 盲审计 动态审计 批量审计 cloud storage data integrity privacy-preserving auditing dynamic auditing batch auditing
  • 相关文献

参考文献26

  • 1ARMBRUST M, FOX A, GRIFFITH A, et al. A view of cloud com- puting[J]. Comrnun ACM, 2010, 53(4): 50-58.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 3BAIRAVASUNDARAM L N, GOODSON G R, PASUPATHY S, et aL An analysis of latent sector errors in disk drives[A]. Proc of ACM SIGMETRICS Int'l Conf Measurement and Modeling of Computer Systems[C]. 2007. 289-300.
  • 4SCHROEDER B, GIBSON G A, disk failures in the real world:what does an MTTF of 1 000 000 hours mean to you[A]. Proc of USENIX Conf File and Storage Technologies[C]. 2007.1 - 16.
  • 5WANG H, ZHANG Y. On the knowledge soundness of a cooperative provable data possession scheme in multiclund storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 264-267.
  • 6NI J, YU Y, Mu Y, et al. On the security of an efficient dynamic audit- ing protocol in cloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(10):2760-2761.
  • 7ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data pos- session at untrusted stores[A]. Proc of the 14th ACM Conference on Computer and Communications Security[C]. 2007. 598-609.
  • 8JUELS, KALISKI B S. PORs: Proofs of retrievability for large files[A]. Proc ofACM CCS[C]. 2007.584-597.
  • 9SHACHAM H, WATERS B. Compact proofs of reievability[A]. Proc of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology, ASIACRYPT'08[C]. Berlin, Heidelberg, 2008.90-107.
  • 10WANG C, WANG Q, REN K, et al. Privacy-preserving public audit- ing for data storage security in cloud computing[A]. Proc of IEEE INFOCOM[C]. 2010. 525-533.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

同被引文献86

引证文献7

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部