期刊文献+

基于区块链的云数据删除验证协议 被引量:13

Blockchain-Based Verification Scheme for Deletion Operation in Cloud
下载PDF
导出
摘要 云服务器可以为用户提供任何时间、任何地点的服务,并极大地降低用户成本,提高使用的便利性,如今越来越多的用户将自己的数据存储在云服务器.然而,关于云存储中的安全问题不时得到披露,影响到用户对云存储的信任,因此必须足够重视云存储及云服务中的安全问题.例如未经身份验证的用户不可以访问云服务器,云服务器不按用户的要求删除数据应该能被发现并惩罚.为了解决这些问题,提出了一种基于区块链的云数据删除验证协议.首先,用户通过调用智能合约向云服务器证明自己的身份,并且创建数据删除的请求交易,然后云服务器删除数据并生成一条嵌有删除证据的区块链(证据链).无论云服务器是否恶意,用户都可以验证数据删除结果.安全性分析表明:提出的协议可以在没有第三方可信机构的情况下完成数据的公开验证,同时可以抵抗窃听攻击、假冒攻击等. Nowadays,more and more users upload their data to the cloud server,since the cloud can provide the service for users any time and at any place.Therefore,the cloud service facilitates the data usability and reduces the cost.However,the information leakage accidents have been reported frequently over the world,that is to say the cloud server is not fully trusted,and the security issue in cloud service must be paid enough attention.For example,illegal user may want to access the cloud server,and perhaps the cloud server does not delete the data according the user s requirement.In order to address these concerns,a verification scheme for deletion operation in cloud is presented using block-chain technology,which can make the deletion operation more transparent.In our scheme,the user calls the smart contract to prove his identity to the cloud server,and creates the request transaction for data deletion;then the cloud server deletes the data and generates a block chain with the evidence(evidence chain).Even if the cloud server is dishonest,the user can still verify the data deletion result.Moreover,the proposed scheme is analyzed to really achieve the public verification of data without the third-party trusted organization,the impersonation attacks resistance,and the eavesdropping attacks resistance,etc.
作者 刘忆宁 周元健 蓝如师 唐春明 Liu Yining;Zhou Yuanjian;Lan Rushi;Tang Chunming(School of Computer and Information Security,Guilin University of Electronic Technology,Guilin,Guangxi 541004;School of Mathematics and Information Science,Guangzhou University,Guangzhou 510006)
出处 《计算机研究与发展》 EI CSCD 北大核心 2018年第10期2199-2207,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61662016 61772147) 广东自然科学基金基础研究重大项目(2015A030308016) 广东教育厅科研团队项目(2015KCXTD014) 广州市教育局协同创新重大项目(1201610005) 国家密码发展基金(MMJJ20170117) 桂林电子科技大学优秀研究生论文培优计划(16YJPYSS14) 桂林电子科技大学研究生创新项目(2018YJCX50)~~
关键词 云服务器 公开验证 区块链 数据删除 智能合约 cloud server public verification blockchain data deletion smart contract
  • 相关文献

参考文献2

二级参考文献41

  • 1桑穆.90年代世界经济将有大变化[J].国际商务译丛,1990(1):7-12. 被引量:1
  • 2Dan Boneh,Ben Lynn,Hovav Shacham.Short Signatures from the Weil Pairing[J]. Journal of Cryptology . 2004 (4)
  • 3Naor M,Rothblum G N.The complexity of online memory checking. Proc of FOCS’’’’’’’’05 . 2005
  • 4Wang C,Wang Q,Ren K,et al.Ensuring data storage security in cloud computing. Proc of IWQoS’’’’’’’’09 . 2009
  • 5Curtmola R,Khan O,Burns R.Robust remote data checking. Proc of StorageSS’’’’’’’’08 . 2008
  • 6Shah M A,Baker M,Mogul J C,et al.Auditing to keep online storage services honest. Proc of HotOS’’’’’’’’07 . 2007
  • 7Shah M A,Swaminathan R,Baker M.Privacy-preserving audit and extraction of digital contents. http://eprint.iacr.org/2008/186.pdf . 2008
  • 8Heitzmann A,Palazzi B,Papamanthou,et al.Efficient integrity checking of untrusted network storage. Proc of StorageSS’’’’’’’’08 . 2008
  • 9SebéF,Balleste A M,Deswarte Y,et al.Time-bounded remote file integrity checking. Laboratary for Analysis and Architecture of Systems Technical Report04429 . 2004
  • 10Gray J.What Next/A Few Remaining Problems in Information Technology. http://research.microsoft.com/-gray/talks/Gray-Turning-FCRC.pdf . 1999

共引文献34

同被引文献124

引证文献13

二级引证文献184

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部