期刊文献+

改进的基于同态哈希的云存储数据完整性验证方案 被引量:2

An improved method of data integrity verification based on homomorphic hashing in cloud storage
下载PDF
导出
摘要 为了解决云存储用户数据完整性验证问题,在分析现有远程数据完整性校验方法的基础上,在标签生成的过程中加入同态哈希与伪随机数,提出一种支持动态数据与无限次挑战的同态哈希的数据完整性验证方案。通过安全性与性能的分析证明该方案的有效性,在保证远程数据完整性的同时,减少了存储空间的冗余和带宽消耗。 Based on analysis of existing remote data integrity verification methods and using homomorphic hashing and pseudo-random numbers in the tag blocking stage, a data integrity verification method, supporting dynamic data and considering challenges to be unlimited, is proposed to deal with the problem of users ’ data integrity verification in cloud storage. The effectiveness of this method is verified through security and performance analyses. With a guarantee of maintaining the remote data integrity, the method can reduce the redundancy of storage space and the bandwidth consumption in data communication.
出处 《河海大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第3期278-282,共5页 Journal of Hohai University(Natural Sciences)
关键词 云存储 数据完整性 同态哈希 标签 cloud storage data integrity homomorphic hashing tag
  • 相关文献

参考文献4

二级参考文献72

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 4Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 5Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 6Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 7Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 8Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 9Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 10Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.

共引文献1117

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部