期刊文献+

公开云环境中身份基代理远程数据完整性证明

Remote Data Integrity Checking of Identity-based Proxy in Public Cloud Environment
下载PDF
导出
摘要 云计算作为一种传统计算的替代方式,发展迅速。因为它可以提供给和商业环境一种灵活的、动态的、有弹性的架构。在公共云环境中,客户端将其数据上传到公有云服务器PCS中,无法控制其远程数据,因此检查远程数据的完整性是至关重要的工作。在原始数据不需下载的情况下,确保用户能够检测其外包数据完整性。在某些情况下,客户没有能力检查其远程数据的完整性,不得不将远程数据完整性检测任务委托给其代理。基于双线性对和计算Diffie-Hellman问题的困难性,设计了身份基代理远程数据完整性证明协议。在该协议中采用身份基的密码体系,减少了对公钥证书的验证,降低了用户和云服务器的储存、通信开销。通过安全性分析和性能分析,表明该协议是可证安全的和高效的。 Cloud computing as an alternative to conventional computing has a rapid development because it can provide a flexible,dynam- ic and resilient infrastructure for both academy and business. In public cloud environment, the clients move their data to Public Cloud Server (PCS). Since remote data are uncontrollable, checking its integrity is of crucial importance. It enables the clients to check whether their outsourced data have been kept intact without downloading the original data. In some cases, the clients are failed to check the integri- ty of remote data so that they have to delegate their proxy for checking of remote data integrity. Based on the bilinear pairing technique and the hardness of computational Diffie-Hellman problem,a protocol of remote data integrity checking of identity-based proxy is de- signed where identity-based cryptography system is used to reduce authentication of public key certificates and lower the storage and communication costs of user and public cloud server. Through analysis of security and performance,the protocol proposed is provably se- cure and efficient.
作者 王新 秦敬源
出处 《计算机技术与发展》 2017年第12期93-97,共5页 Computer Technology and Development
基金 辽宁省自然科学基金(20102042)
关键词 公开云 身份基 代理 完整性检验 public cloud identity-based proxy integrity checking
  • 相关文献

参考文献5

二级参考文献84

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1362

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部