期刊文献+

基于密文采样分片的云端数据确定性删除方法 被引量:10

Novel cloud data assured deletion approach based on ciphertext sample slice
下载PDF
导出
摘要 "确定性删除"技术旨在保障云服务器内过期或备份数据的确定性删除,使数据被彻底删除或者是永远不可解密和访问的,以保护用户的数据隐私性。但现有方案仅仅只删除了密钥,云端密文依旧完整,一旦密钥被窃取,会威胁数据隐私性,因此未实现"真正"意义上的确定性删除。针对上述问题,提出了一种基于密文采样分片的方案,来实现云端数据的确定性删除。利用密文采样分片思想,使云端存储不完整的密文,即使在密钥被泄露的情况下,也能保证数据的高机密性。而对采样密文的销毁,也实现了云端数据的即时确定性删除。理论分析以及实验结果表明,所提方法能够满足云存储系统中机密数据的确定性删除要求,并且在性能开销低的同时能提供比现有方案更高的安全性。 The technique named assured deletion was namely that the expired or backup data was reliably deleted and remain permanently unrecoverable and inaccessible by any party, However, the previous schemes only deleted the key while the cipher text still maintains entirely. Once the key was compromised, it would be a great threat to the privacy of sensitive data. Therefore, it cannot satisfy the real sense of assured deletion. Aiming at the above problems, a new scheme based on cipher text sample slice named ADCSS was proposed. The scheme can ensure that the cloud server only store the incomplete data by means of cipher text sample slice, which contributes to the top confidentiality of outsourced data even the key is obtained by accident or by malicious attacks. Moreover, the goal of assured deletion can be achieved by destroying the exact cipher text. Theoretical analysis and experimental results show that the proposed scheme can meet the requirement of the assured deletion of sensitive data on cloud storage. Moreover, the scheme performs higher security than the existing ones with low performance overhead.
出处 《通信学报》 EI CSCD 北大核心 2015年第11期108-117,共10页 Journal on Communications
基金 国家自然科学青年基金资助项目(61303219) 陕西省自然科学基础研究计划基金资助项目(2014JQ8295) 中央高校基本科研业务费基金资助项目(JB140303)~~
关键词 云存储 数据隐私性 确定性删除 密文采样分片 cloud storage data privacy assured deletion ciphertext sample slice
  • 相关文献

参考文献15

  • 1PERLMAN R. File system design with assured delete[A]. Security inStorage Workshop, SISW05[C]. 2005,88.
  • 2GEAMBASU R, KOHNO T, LEVY A A, et al. Vanish: increasing dataprivacy with self-destructing data[A]. USENIX Security Sympo-sium[C]. 2009. 299-316.
  • 3STOICA I,MORRIS R, KARGER D, et al. Chord: a scalablepeer-to-peer lookup service for internet appiications[J]. ACM SIG-COMM Computer Communication Review, 2001, 31(4): 149-160.
  • 4DABEK F. A Distributed Hash Table[D]. Massachusetts Institute ofTechnology, 2005.
  • 5YUE F, WANG Q LIU Q. A secure self-destincting scheme for elec-tronic data[A]. Embedded and Ubiquitous Computing, IEEE/IFIP In-ternational Conference[C]. 2010. 651-658.
  • 6TANG Y, LEE P P C, LUI J C S, ef al. FADE: secure overlay cloudstorage with file assured deletion[A]. Security and Privacy in Commu-nication Networks[C]. 2010. 380-397.
  • 7王丽娜,任正伟,余荣威,韩凤,董永峰.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272. 被引量:39
  • 8JREARDON J,CAPKUN S,BASIN D A. Data node encrypted filesystem: efficient secure deletion for flash memory [A]. USENIX Secu-rity Symposium[C]. 2012. 333-348.
  • 9LEE J, YI S, HEO J, et al. An efficient secure deletion scheme forflash file systems[J]. J. Inf. Sci. Eng., 2010,26(1): 27-38.
  • 10POPPER C, BASIN D, CAPKUN S,et al. Keeping data secret underfull compromise using porter devices[A]. Proceedings of the 26th An-nual Computer Security Applications Conference[C]. ACM, 2010.241-250.

二级参考文献16

  • 1武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 2Fengshun Yue,Guojun Wang,Qin Liu.A secure self-destructing scheme for electronic data[A].Proc of EUC 2010[C].New York:IEEE Press,2010.651-658.
  • 3Lingfang Zeng,Zhan Shi,Shengjie Xu,et al.Safevanish:An improved data self-destruction for protecting data privacy[A].Proc of CloudCom 2010[C].New York:IEEE Press,2010.521-528.
  • 4Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 5Weichao Wang,Zhiwei Li,Rodney Owens,et al.Secure and efficient access to outsourced data[A].Proc of CCSW'09[C].New York:ACM Press,2009.55-65.
  • 6J.Falkner,M.Piatek,J John,et al.Profiling a million user DHT[A].Proc of the 7th ACM SIGCOMM conference on Internet measurement[C].New York:ACM Press,2007.129-134.
  • 7Y Xie,F Yu,K Achan,et al.How dynamic are IP addresses?[A].Proc of SIGCOMM'07[C].New York:ACM Press,2007.301-312.
  • 8Vanish.[EB/OL].http://vanish.cs.washington.edu/,2011-07-29/2011-07-29.
  • 9Farla L A De, Boodta J F C, Trasatti S. Physic- chemical and electrochemical characterization of Ru-based ternary oxides containg Ti and Ce [J]. Electrochem Acta, 1992, 37(13): 2511-2518.
  • 10Silava L A Da, Alves V A, Trasatti S,et al.Surface and electrocatalytic properties of ternary oxides Ir0.3Ti (0.7-x)PtxO2:Oxygen evolution from acidic solution [J]. Journal of Electroanlytical Chememistry,1997, 427:97-104.

共引文献38

同被引文献76

引证文献10

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部