期刊文献+

代理动态操作的云数据拥有性证明方案

Provable Cloud Data Possession Scheme via Third-Party Proxy Dynamic Operations
下载PDF
导出
摘要 传统支持动态操作的云存储系统中,对于云中动态文件的动态操作所产生的计算和通信开销是由用户完全承担的,这给用户带来了相应的计算和通信压力。为了解决该问题,构造了云环境下第三方代理动态操作的数据拥有性证明方案,方案中引入了一个功能强大的第三方审计者,用户不仅能委托其承担审计工作而且能够使其代理完成动态操作的任务,在任务处理的过程,系统能够保证用户的数据在第三方审计者中的隐私性。从安全和性能分析可以看出该方案能高效安全地完成审计任务。 In the traditional cloud storage system which supports dynamic operations, the computing and communication cost derived from the dynamic operations to the file is undertaken by the user completely. It brings user the corresponding pressure on computation and communication. In order to solve this problem, we design a provable data possession scheme via third-party proxy dynamic operations in clouds. In this scheme we bring in a powerful third-party auditor, the users can delegate it to perform the audit and fulfill the dynamic operations. In this processing, the system can ensure the user's data privacy in the third party auditor. Finally, the security and performance analysis show that our scheme can complete the audit task efficiently and securely.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2016年第5期796-801,共6页 Journal of University of Electronic Science and Technology of China
基金 国家863项目(2015AA016007) 国家自然科学基金(61472064)
关键词 代理动态操作 云存储安全 Merkle哈希树 第三方代理审计 agent dynamic operation cloud-storage security Merkle Hash tree (MHT) the third-partyaudit
  • 相关文献

参考文献15

  • 1ATENIESE C BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. [S.1.]: ACM, 2007: 598-609.
  • 2. JUELS A, KALISKI Jr B S. PORs: Proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. [S.1.]: ACM, 2007: 584-597.
  • 3ATENIESE C DI PIETRO R, MANC1NI L V, et al. Scalable and efficient provable data possession [C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. IS.1.]: ACM, 2008: 9.
  • 4SHACHAM H, WATERS B. Compact proofs of retrievability[M]//PIEPRZYK J. Advances in Cryptology- ASIACRYPT 2008. Berlin Heidelberg: Springer, 2008: 90-107.
  • 5WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//1NFOCOM, 2010 Proceedings IEEE. [S.1.]: IEEE, 2010: 1-9.
  • 6ZHU Y, WANG H, HU Z, et al. Dynamic audit services for integrity verification of outsourced storages in clouds[C]//Proceedings of the 2011 ACM Symposium on Applied Computing. [S.I.]: ACM, 2011: 1550-1557.
  • 7WANG Qian, WANG Cong, LI Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[J]. European Symposium on Computer Security- Esorics, 2009, 22(5): 355-370.
  • 8BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: Theory and implementation[C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. [S.1.]: ACM, 2009: 43-54.
  • 9CHANG E C, XU J. Remote integrity check with dishonest storage server[J]. European Symposium on Research in Computer Security: Computer Security, 2008, 5283: 223-237. 1.
  • 10SHAH M A, SWAMINATHAN R, BAKER M. Privacy- preserving audit and extraction of digital contents[R]. IS.1.]: Hewlett-Packard Development Company, 2008.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部