期刊文献+

云存储中一个高效的数据完整性审计方案 被引量:4

A light-weight data auditing scheme for the cloud storage environment
下载PDF
导出
摘要 云计算被视为新一代企业IT架构,在诸多领域有着广泛的应用。云计算技术使得应用软件与数据库部署于集中式大型数据中心,在大数据计算、存储方面具有开销低廉、访问便捷等特点。然而,云计算在应用过程中仍存在一系列安全挑战。针对存储在云中的外包数据,本文提出了一个高效的外包数据审计方案,该方案支持云存储中数据完整性验,且具有轻量级计算开销。同时,本文给出了该方案的正确性分析与性能评估。实验结果表明本文所提出的数据完整性审计方案更加高效,且能够满足云存储环境下的数据完整性审计要求。 Cloud computing is considered as a new IT framework for enterprises and has been widely used in various fields. In the cloud environment, application software and databases are deployed in the centralized large data centers which has advantages of low cost, convenient access and so on in terms of big data computation and storage. However, cloud computing has several security challenges. In this paper, we proposed a efficient data auditing scheme for cloud-based storage. This scheme provides cloud-based data integrity verification with light-weight computation cost. Furthermore, we show the correctness and performance analysis of the proposed cloud-based data auditing scheme. The experimental results demonstrate that the proposed scheme in this paper is more efficient and enables to satisfy the requirement of data integrity verification for the cloud storage environment.
作者 田祎
机构地区 商洛学院
出处 《电子设计工程》 2016年第17期22-24,27,共4页 Electronic Design Engineering
基金 陕西省自然科学基础研究计划资助项目(2015JM6347) 陕西省教育厅科研项目(14JK1221)
关键词 云计算 数据完整性 审计 云存储 cloud computing data integrity auditing cloud storage
  • 相关文献

参考文献15

  • 1Pan Y, Zhang J. Parallel programming on cloud computing platforms [J]. JoumalofConvergence Volume, 2012, 3(4): 23-28.
  • 2Wei L, Zhu H, Cao Z, et al. Security and privacy for storage and computation in cloud computing [J]. Information Sciences, 2014(258): 371-386.
  • 3Teraoka T. Organization and exploration of heterogeneous personal data collected in daily life [J]. Human-Centric Computing and Information Sciences, 2012, 2(1 ): 1-15.
  • 4Ateniese G, Bums R, Curtmola R, et al. Provable data possession at untrusted stores [C]// Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007: 598-609.
  • 5Schwarz T S J, Miller E L. Store, forget, and check: Using algebraic signatures to check remotely administered storage [C]//26th IEEE International Conference on Distributed Computing Systems. IEEE, 2006: 12-21.
  • 6Naor M, Rothblum G N. The complexity of online memory checking [J]. Journal of the ACM (JACM), 2009, 56(1): 2.
  • 7Juels A, Kaliski Jr B S. PORs: Proofs of retrievability for large files [Off Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007: 584-597.
  • 8Sebe F, Domingo-Ferrer J, Martinez-Balleste A, et al. Efficient remote data possession checking in critical information infrastmctures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
  • 9Shacham H, Waters B. Compact proofs of retrievability [M]. Advances in Cryptology-ASIACRYPT' 08. Springer Berlin Heidelberg, 2008: 90-107.
  • 10Wang C, Chow S S M, Wang Q, et al. Privacy-preserving public auditing for secure cloud storage [J]. IEEE Transactions on Computers, 2013, 62(2): 362-375.

同被引文献20

引证文献4

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部