期刊文献+

基于代理重签名的支持用户可撤销的云存储数据公共审计方案 被引量:8

Efficient public auditing scheme for cloud storage supporting user revocability with proxy re-signature scheme
下载PDF
导出
摘要 针对用户动态可撤销需要新的数据管理员对其前任所管理的数据进行完整性验证的问题,基于单向代理重签名技术提出了具有隐私保护的支持用户可撤销的云存储数据公共审计方案。首先,该方案中所采用的单向代理重签名算法,其代理重签名密钥由当前用户私钥结合已撤销用户公钥生成,不存在私钥泄露问题,能够安全实现数据所有权的转移;其次,该方案证明了恶意的云服务器不能产生伪造的审计证明响应信息来欺骗第三方审计者(TPA)通过审计验证过程;更进一步,该方案采用了随机掩饰码技术,能够有效防止好奇的第三方审计者恢复原始数据块。和Panda方案相比较,所提方案在增加抗合谋攻击功能的基础上,其审计过程中通信开销与计算代价仍全部低于Panda方案。 Due to user revocability, the new data manager needs to verify the integrity of the former data manager's management data stored in the cloud server, which is obviously inevitable in reality. In order to solve this issue, an efficient privacy-preserving public auditing scheme for cloud storage scheme was proposed. Firstly, in the proposed scheme based on unidirectional proxy re-signature, the proxy re-signature key was generated by the current data manager's private key and the former public key, which did not leak any information, to realize transferring of ownership data caused by the users revocability securely. Secondly, it was proved that the proposed scheme could protect any malicious cloud server from generating the forged response proof which could pass the verification to cheat the Third Party Auditor( TPA). Moreover, the random masking technique was employed to prevent the curious TPA from revealing the primitive data blocks. Compared with the Padna scheme, even though the proposed scheme adds the new functions but its communication overhead in the process of auditing and computational cost are also lower than Panda's.
出处 《计算机应用》 CSCD 北大核心 2016年第7期1816-1821,共6页 journal of Computer Applications
基金 国家自然科学基金重点资助项目(61370203) 四川省科技支撑计划项目(2012SZ0162)~~
关键词 云存储 代理重签名 隐私保护 完整性验证 用户可撤销 cloud storage proxy re-signature privacy-preserving integrity verification user revocation
  • 相关文献

参考文献17

  • 1HUBBARD D, SUTTON M. Top threats to cloud computing vl. 0 [ EB/OL]. [ 2015- 09- 10]. https://cloudsecurityalliance, org/ topthreats/csathreats, vl. 0. pdf.
  • 2YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [ C ]// INFOCOM' 10: Proceedings of the 29th Conference on Information Communications. Piscataway, NJ: IEEE, 2010:534-542.
  • 3LI M, YU S, REN K, et al. Securing personal health records in cloud computing: patient-centric and fine-grained data access con- trol in multi-owner settings [ C]// SecureComm 2010: Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks. Berlin: Springer, 2010: 89-106.
  • 4RAJU M, LANITHA B. Survey about cloud computing threats [ J]. International Journal of Computer Science and Information Technolo- gies, 2014, 5(1): 384-389.
  • 5JUELS A, KALISKI B S, Jr. PORs: proofs of retrievability for large files [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007:584-597.
  • 6ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007:598-609.
  • 7SHACHAM H, WATERS B. Compact proofs of retrievability [ C]// ASIACRYPT' 08: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securi- ty: Advances in Cryptology. Berlin: Springer, 2008: 90-107.
  • 8WANG C, WANG Q, REN K, et al. Privacy-preserving public au- diting for data storage security in cloud computing [ C ]// INFOCOM' 10: Proceedings of the 29th Conference on Information Communications. Piscataway, NJ: IEEE, 2010:525-533.
  • 9WANG Q, WANG C, LI J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing [ C ]// ESORICS' 09: Proceedings of the 14th European Conference on Re- search in Computer Security. Berlin: Springer, 2009:355 -370.
  • 10WANG C, CHOW S S M, WANG Q, et al. Privacy-preserving public auditing for secure cloud storage [ J]. IEEE Transactions on Computers, 2013, 62(2): 362-375.

同被引文献29

引证文献8

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部