期刊文献+

基于BLS的动态云数据完整性验证方案

A DYNAMIC INTEGRITY VERIFICATION SCHEME OF CLOUD STORAGE BASED ON BLS
下载PDF
导出
摘要 随着云存储技术的发展,更多的用户选择将数据存储在云端,这虽然为用户节约了存储空间,但同时也让用户失去了对数据的控制权,无法确保云端数据的完整性.因此,检验数据的完整性便成为一个亟需解决的问题.当前许多数据完整性验证方案仍存在无法支持全动态更新(插入、修改和删除)的问题.本文提出一种基于BLS(Boneh–Lynn–Shacham signature scheme,BLS)短签名即基于双线性对构造的云数据完整性验证方案,实现了对云端数据的高效动态完整性更新和验证.经过实验分析,本文所提方案在达到同等安全程度上,极大地缩短了签名的长度,并提高了云存储空间的利用率. With the development of the cloud storage technology, more and more users choose to store the data in the cloud, it saves storage space for the user but users also lose control of the data at the same time and cannot ensure the integrity of the cloud data. As a result, solving the integrity verification of the data becomes a necessary.Currently, many data integrity verification schemes are still unable to support the whole dynamic update including inserting, modifying, and deleting.In this paper, a scheme of cloud data integrity verification based on BLS short signature is proposed, and it is one to realize dynamic integrity update and verification of cloud data based on bilinear pair construction.Experimental analysis suggests that the proposed scheme has greatly reduced the length of signature and improved the utilization rate of cloud storage space.
作者 高歌 吴磊 阎允雪 Gao Ge;Wu Lei;Yan Yunxue()School of Information Science and Engineering, Shandong Normal University, 250358, Jinan, China;) Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology ,250358 ,Jinan, China)
出处 《山东师范大学学报(自然科学版)》 CAS 2018年第2期159-165,共7页 Journal of Shandong Normal University(Natural Science)
基金 国家自然科学基金资助项目(61672330) 国家自然科学基金资助项目(61602287)
关键词 云存储 默克尔哈希树 数据完整性 全动态更新 短签名 cloud storage Merkle hash tree data integrity full dynamic update short signature
  • 相关文献

参考文献3

二级参考文献119

  • 1Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 2Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 3Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 4Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 5Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 6Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 7Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 8Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 9Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.
  • 10Canetti R, Hohenherger S. Chosen-ciphertext secure proxy re-encryption [C] //Proc of ACM CCS 2007. New York: ACM, 2007:185-194.

共引文献193

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部