期刊文献+

一种基于MB+树的网络共享数据查询和检验方法 被引量:5

Approach of query authentication for data sharing online based on MB + tree
下载PDF
导出
摘要 网络数据共享机制将数据置于远程网络服务商处并通过外部访问接口进行共享,用户无须保存数据副本,网络服务商负责数据的安全保障,因此无副本情况下数据用户对网络服务商处存储数据的查询和安全校验至关重要。分析目前对远程存储数据查询和检验常用的Merkle散列树方法,就其对大规模数据进行检验时存在验证过程冗余、验证辅助数据量大等不足,提出一种基于MB+树的网络共享数据查询和检验方法,帮助数据用户确认位于网络服务商处数据的正确性和完整性。利用MB+树非叶节点包含多出度、叶节点直接映射数据等特性对数据文件进行抽象组织,避免Merkle散列树的节点数和深度随数据文件块的增多而呈线性增长的问题,同时缩短检验过程中的查询认证路径,减少检验所需的辅助认证信息,有效地控制了时间和空间消耗。通过实验分析可知,相较于常用的方法(如Merkle散列树),处理大规模数据时MB+树更易于构建,也能够更加快速地查询和检验数据文件。 Data sharing online is now being wildly used through many applications.In this mode,data is uploaded to network service providers by data owners.So it is shared by network service providers instead of data owners and can be accessed through external interface by any other users.Then there is no need for data owners to keep the copy of their data.Due to the reputation of network service providers,query authentication for data sharing online by data owners becomes important.This paper applied traditional Merkle hash tree to ensure the correctness and integrity of data remotely stored.Considering the disadvantages of Merkle hash tree such as redundant verification procedures,large auxiliary verifications and so on,this paper proposed a new approach of query authentication for these data based on MB+tree.It constructed MB+tree by partitions of data under verification,and its leaf nodes were directly mapped to certain partitions.Tree authentication algorithm through MB+tree could check the validity of any random partition.Compared with Merkle hash tree,experimental results show that this approach has the advantages of less query paths,lower auxiliary verifications,and moderate complexity.
作者 李凌 张蕾 杨洋 李京 Li Ling;Zhang Lei;Yang Yang;Li Jing(School of Computer Science&Technology,Southwest University of Science&Technology,Mianyang Sichuan 621010,China;Sichuan Civil-military Integration Institute,Southwest University of Science&Technology,Mianyang Sichuan 621010,China;School of Computer Science&Technology,University of Science&Technology of China,Hefei 230026,China;School of Economics&Management,Zhejiang University of Science&Technology,Hangzhou 310000,China;Sichuan Institute of Computer Sciences,Chengdu 610041,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第3期782-787,共6页 Application Research of Computers
关键词 数据共享 副本 查询 检验 MB+树 正确性 完整性 data sharing copy query verification MB+tree correctness integrity
  • 相关文献

参考文献3

二级参考文献22

  • 1Cooper B, Garcia-Molina H. Peer to peer data trading to preserve information [J]. ACM Trans on Information Systems, 2002, 20(2): 133-170.
  • 2Goh E, Shacham H, Mndadugu N, et al. SiRiUS: Securing remote untrustcd storage [C]//Proc of the 10th Network and Distributed Systems Security Syrup (NDSS'03). Reston, VA: Internet Society, 2003:131-145.
  • 3Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C] //Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST'03). Berkeley, CA: USENIX, 2003:29-42.
  • 4Tompa M, Woll H. How to share a secret with cheaters [J]. Journal of Cryptography, 1988. 1(2): 133-138.
  • 5Krawczyk H. Distributed fingerprints and secure information dispersal [C] //Proc of the 12th ACM Symp on Principles of Distributed Computing ( PODC' 93). New York: ACM, 1993:207-218.
  • 6Shah M, Baker M, Mogul J, et al. Auditing to keep online storage services honest[C] //Proc of HotOS XL Berkeley, CA: USENIX, 2007.
  • 7Luby M, Rackoff C. How to construct pseudorandom permutations and pseudorandom functions [J]. SIAM Journal on Computing, 1988, 17:373-386.
  • 8Be/lare M, Canetti R, Krawczyk H. Keying hash functions for message authentication [G]//LNCS 1109: Proc of the 16th Annual Int Cryptology Conf (Crypto' 96). Berlin:Springer, 1996:1-19.
  • 9Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security (CCS'07). New York:ACM, 2007:598-609.
  • 10Filho D, Baretto P. Demonstrating data possession and uneheatable data transfer [EB/OL]. [2008-02-10]. http:// eprint. iacr. org/2006/150. pdf.

共引文献33

同被引文献55

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部