期刊文献+

基于改进哈希树模型的数据完整性验证方案 被引量:1

Research on Data Integrity Validation Based on Improved Hash Tree Model
下载PDF
导出
摘要 针对存储在云端数据的完整性问题,结合同态认证标签机制和R-MHT哈希树结构,提出基于改进哈希树模型的数据完整性验证方案,在验证过程中能有效降低计算量和通讯开销,并能够支持数据的动态操作。实验结果证明,该方案相比传统的哈希树结构,在验证的性能上和准确性上有一定的优势,能够很好地完成数据完整性验证。 Cloud storage is the future trend of data storage, users demand access to high - quality applica-tions and services from the cloud instead of storing a copy of any data locally. Aiming at the integrity of the data stored in the cloud, this paper combined homomorphic verifiable tags with R - M H T hash tree struc-ture, proposing a data integrity verification scheme based on the improved hash tree model, which can not only effectively reduce the computational complexity and communication overhead, but also support dynamic data manipulation. Experimental results show that the proposed scheme has some advantages over the tradi-tional hash tree in performance and accuracy, and can be used to validate data integrity.
出处 《西南科技大学学报》 CAS 2017年第1期64-69,共6页 Journal of Southwest University of Science and Technology
基金 国家自然科学基金面上项目(61471306 61672438) 四川省教育厅自筹项目(12ZB331) 四川省科技厅应用基础研究基金项目(2014JY0230) 四川省高等学校成果转化重大培育基金项目(13CZ00025) 人工智能四川省重点实验室开放基金项目(2014RYY03)
关键词 云存储 数据完整性验证 同态认证标签 R-MHT哈希树 Cloud storage Data integrity verification Homomorphic verifiable tags R - M H T hash tree
  • 相关文献

参考文献2

二级参考文献36

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1079

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部