期刊文献+

云存储中数据完整性的可信第三方审计研究及进展 被引量:1

Research and Development of Trusted Third Party Audit for Data Integrity in Cloud Storage
下载PDF
导出
摘要 用户本地无需存储原始数据,就可以通过可信第三方完成对其在云端存储的数据是否具有完整性的验证,这一完整性审计(Provable Data Integrity,PDI)的处理成为学术界、工业界关注的焦点。基于此,本文对各种审计策略加以分类,在此基础上着重展示每种分类为了满足各种需求而对验证过程所作出的改变,并指出云存储中的数据完整性的第三方审计所面临的挑战和发展趋势。 Local users without the original data storage,you can through the trusted third party has completed to verify whether the integrity of the data stored in the cloud,the integrity of the audit(Provable Data,Integrity,PDI)processing has become the focus of attention of academia and industry. Based on this,this paper classified the various audit strategies,and on this basis,focused on the change of the verification process in order to meet the needs of each category,and pointed out the challenges and the trend of the third party audit data integrity of cloud storage in the face.
作者 刘华楠
出处 《河南科技》 2017年第20期50-53,共4页 Henan Science and Technology
关键词 云存储 可信第三方 第三方审计 数据完整性 cloud storage trusted third party third party audit data integrity
  • 相关文献

参考文献2

二级参考文献20

  • 1DESWARTE Y, QUISQUATER J J, SAIDANE A. Remote integrity checking[ C]//Proc of Integrity and Internal Control in Information Svstems. Berlin : SDrinzer-Verlaa. 2003 : 1 - 11.
  • 2ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data pos- session at untrusted stores[ C ]//Proc of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
  • 3JULES A, KALISKI B S. Pors: proofs of retrievability for large files [ C ]//Proc of the 14th ACM Conference on Computer and Communi-cations Security ( ACM-CCS' 07 ), New York : ACM,2007:584-597.
  • 4DODIS Y, VADHAN S, WICHS D. P'oofs of retrievability via hard- ness amplificationl C]//Proe of the 6th Theory of Cryptography Con- ference on Theory of Cryptography. Berlin : Springer-Vedag, 2009 : 109-127.
  • 5BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: theory and implementation [ C ]//Proc of ACM Workshop on Cloud Compu- ting Security. New York:ACM,2009:43-54.
  • 6ZHU Yan, WANG Huai-xi, HU Ze-xing, et al. Dynamic audit serv- ices for integrity verification of outsourced storage in clouds[ C ]//Proc of ACM Symposium on Applied Computing. New York : ACM, 2011 : 1550-1557.
  • 7ZHENG Qing-ji, XU Shou-huai. Fair and dynamic proofs of retriev- ability[ C]//Proc of the 1st ACM Conference on Data and Application Security and Privacy. New York:AGM,2011:237-248.
  • 8LIU Fei-fei, GU Da-wu, LU Hai-ning. An improved dynamic prov- able data possession model [ C ]//Proc of IEEE International Confer- ence on Cloud Computing and Intelligences Systems. Washington DC : IEEE Computer Society, 2011:290- 295.
  • 9WANG Qian, WANG Cong, REN Kui, et al. Enabling public audit- ability and data dynamics for storage security in cloud computing[ J]. IEEE Yrans on Parallel and Distributed Systems, 2011,22(5) : 847- 859.
  • 10ZHUO Hao, SHENG Zhong, NENG Hai-yu. A privacy-preserving re- mote data integrity checking protocol with data dynamics and public verifiability[ J]. IEEE Xrans on Knowledge and Data Engineer- ing,2011,23(9) :1432-1437.

共引文献13

同被引文献2

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部