期刊文献+

一种高效的大数据中心完整性检查方案研究 被引量:12

Research on An Effective Integrity Check Scheme for Big Data Center
下载PDF
导出
摘要 在大数据中心的云存储应用中,用户不需要在本地客户端保存自己的文件,因而存储文件的安全性非常重要。数据的鲁棒性是云存储的重要关注点,可能会面临两大问题:服务故障和服务损坏。文章提出了一种能够增强数据鲁棒性的完整性检查方案,使得大数据中心存储系统不仅可以解决存储服务器故障问题,而且还可以应对存储服务器损坏问题。方案采用了同态完整性标签,不需要用户密钥或备份服务器的参与,新型完整性标签可以从存储服务器中旧的完整性标签计算得出。最后,文章形式化地证明了完整性检查方案的安全性。 For the application of cloud storage in the big data center, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. For data robustness, there are two concerns: service failure, and service corruption. In this paper, we propose an integrity check scheme for their system to enhance data robustness against storage server corruption, with which their storage system in the big data center can deal with not only the problem of storage server failure, but also the problem of storage server corruption. Furthermore, we adopt homomorphic integrity tags such that new integrity tags can be computed from old integrity tags by storage servers without involvement of the user's secret key or backup servers. In conclusion, we prove the security of our integrity check scheme formally.
出处 《信息网络安全》 2016年第5期1-8,共8页 Netinfo Security
基金 国家自然科学基金[61100240]
关键词 完整性检查方案 云存储 大数据中心 数据鲁棒性 安全 integrity check scheme cloud storage big data center data robustness security
  • 相关文献

参考文献25

  • 1FRANK F, MARCOS K.移动云计算:无线、移动和社交网络中分布式资源的开发利用[M].郎为民,译.北京:机械工业出版社,2015.
  • 2BOYENX, WATERS B.Ful卜domain Subgroup Hiding andConstant-size Group Signatures [C]//IEEE. PKC 2007.10th InternationalConference on Practice and Theory in Public-Key Cryptography April16-20,2007,Beijing, China.NJ : IEEE, 2007: 1-15.
  • 3MAJI H K, PRABHAKARAN M, ROSULEK M. Attribute-ased Signatures [EB/OL].http://eprint.iacr.org/2010/595.pdf, 2010-11-22.
  • 4DOIDSY,YAMPOLSKIY A. A Verifiable Random Function withShort Proofi and Keys[C]//IEEE. PKC 2005.8th International Workshopon Theory and Practice in Public Key Cryptography, January 23-26,2005,Les Diablerets, Switzerland. NJ : IEEE, 416-431.
  • 5SHACHAMH, WATEWRS . Compact Proofe of Retrievability [J].Journal of Cryptology, 2015, 28(3): 442-483.
  • 6HANJ, WU S, MU Y, et al. Improving Privacy and Security inDecentralized Ciphertext-Policy Attribute-Based Encryption[J].IEEETransactions on Information Forensics and Security, 2015, 10(03): 665-678.
  • 7CHIP W,LEI C L.Audit-Free Cloud Storage via DeniableAttribute-based Encryption[J].IEEE Transactions on Cloud Computing,2015,21(7): 865-876.
  • 8ZHOUZ B, HUANG D J, WANG Z .Efficient Privacy-Preserving Ciphertext -Policy Attribute -based Encryption andBroadcast Encryption[J]. IEEE Transactions on Computers, 2015,64(01): 126-138.
  • 9LIC L, CHEN Y,TAN P, et al. An Efficient Provable DataPossession Scheme with Data Dynamics[C]//IEEE. CSSS.Proceedingsof 2012 International Conference on Computer Science & ServiceSystem (CSSS),August 11 - 13,2012 , Nanjing China.NJ : IEEE,2012: 706-710.
  • 10WANGJ X, LI S L. Dynamic Provable Data Possession withBatch-update Verifiability [C]//IEEE. ICADE.Proceedings of 2012 IEEEInternational Conference on Intelligent Control, Automatic Detection andHigh-End Equipment (ICADE). July 27-29,2012, Beijing, China.NJ : IEEE, 2012: 108-113.

二级参考文献20

  • 1Aleniese G, Burns R, Curtmola R. Provable data possession at untrusted stores [C] //Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:598-609.
  • 2Bowers D, Juels A, Oprea A. Proofs of retrievability: Theory and implementation [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009: 43-54.
  • 3Erway C, Kupcu A, Papamanthou C, et al. Dynamic provable data possession [C]//Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:213-222.
  • 4Bnwers D, Juels A, Oprea A. HALL: A high-availability and integrity layer for cloud storage [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:187-198.
  • 5Baker M, Shah M, Rusenthal D, et al. A fresh look at the reliability of long term digital storage [J]. ACM SIGG/PS Operating Systems Review, 2006, 40(4): 221-234.
  • 6Zhu Y, Wang H, Hu Z, et al. Efficient provable data possession for hybrid clouds, 2010 234 [R/OL]. San Diego, CA: IACR Cryptology ePrint Archive, 2010[2013-12-10]. http://eprint, iacr. org/.
  • 7Ateniese G. Kamara S, Katz J. Proofs of storage from homomorphic identification protocols [C] //Proc of the 15th Int Conf on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2009:319-333.
  • 8Yamamoto G, Oda S, Aoki K. Fast integrity for large data [C] //ProcofSPEED'07. Berhn: Springer, 2007:21-32.
  • 9Sehe F, Domingo-Ferrer J, Martinez-Balleste A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Trans on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
  • 10Zeng K. Publicly verifiable remote data integrity [C] //Proc of the 10th Int Conf on Information and Communications Security. Berlin: Springer, 2008:419-434.

共引文献13

同被引文献51

引证文献12

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部