期刊文献+

支持多代理的云存储数据完整性审计方法 被引量:3

An Audit Method of Data Integrity for Supporting Multiple Proxies in Cloud Computing
下载PDF
导出
摘要 由于云存储服务面临许多损坏数据的风险,检验数据完整性便成为一个亟需解决的基本问题。数据持有性验证(provable data possession,PDP)是检验云存储数据完整性的重要方法。然而,在传统的PDP模型中,单审计代理易造成单点故障并且易形成性能瓶颈。为此,提出了一种支持多代理的数据完整性审计方法(multi-proxies PDP,MP-PDP)。该方法采用循环链表管理多代理节点,使用审计队列存储文件的审计任务,实现了审计任务分发、节点监控、失效节点切换和动态增加代理等功能,并且利用备份节点消除了系统的单点故障。实验结果表明,MP-PDP有效减少了文件的审计执行时间,并且能够快速增删审计代理。 Since cloud storage service faces many security risks that can damage data,checking data integrity has become increasingly urgent. Provable Data Possession( PDP) is an important method for verifying data integrity in cloud computing. But the single proxy in the traditional PDP models easily becomes the single point of failure and catches the performance bottleneck. So we propose an improved PDP,called MP-PDP by us,for supporting mutiple proxies in cloud computing. It adopts a circular linked list and uses audit queues to store the audit tasks. It achieves such functions as assigning audit tasks,monitoring nodes,switching failed node and dynamically adding proxy and uses the backup node for eliminating the single point of failure. The experimental results indicate that MP-PDP can efficiently reduce the audit time for files and quickly add or delete the audit proxy.
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2016年第2期343-348,共6页 Journal of Northwestern Polytechnical University
基金 国家"863"高技术研究发展计划基金(2013AA01A215) 国家自然科学基金(61472323) 中央高校基本科研业务费专项资金(3102015JSJ0009) 华为创新基金(YB2014040023)资助
关键词 多代理 数据持有性证明 数据完整性验证 云存储安全 algorithms big data conceptual design cost reduction design of experiments dynamic models dynamical systems efficiency fault tolerance mathematical models monitoring scalability software reliability switching frequency cloud storage security data integrity checking multiple proxies PDP(provable data possession)
  • 相关文献

参考文献7

  • 1李晖,孙文海,李凤华,王博洋.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409. 被引量:93
  • 2谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. 被引量:102
  • 3Ateniese G, Burns R, Curtmola R, et al. Remote Data Checking Using Provable Data Possession [ J ]. ACM Trans on Information and System Security, 2011, 14(1) : 12.
  • 4Wang Cong, Chow S S M, Wang Q, et al. Privacy-Preserving Public Auditing for Secure Cloud Storage [ J ]. IEEE Trans on Computers, 2013, 62(2): 362-375.
  • 5Zhu Y, Hu H, Ahn G J, et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage [ J ]. IEEE Trans on Parallel and Distributed Systems, 2012, 23(12) : 2231-2244.
  • 6Wang Boyang, Li Baochun, Li Hui. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud[ C] //IEEE Trans on Cloud Computing, 2014, 1:43-56.
  • 7Yang K, Jia X. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [ J ]. IEEE Trans on Parallel and Distributed Systems, 2013, 24(9) : 1717-1726.

二级参考文献108

  • 1Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 2Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 3Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 4Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 5Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 6Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 7Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 8Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 9Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.
  • 10Canetti R, Hohenherger S. Chosen-ciphertext secure proxy re-encryption [C] //Proc of ACM CCS 2007. New York: ACM, 2007:185-194.

共引文献181

同被引文献21

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部