期刊文献+

基于动态bloom filter的云存储安全去重方案 被引量:2

Secure deduplication scheme based on dynamic bloom filter in cloud storage
下载PDF
导出
摘要 现有的所有权证明去重方案容易遭受诚实但好奇服务器的威胁影响,借助可信第三方解决该问题将导致开销过大。基于动态bloom filter提出一种改进的、无须可信第三方的所有权证明安全去重方案,采用收敛加密算法抵抗诚实但好奇的服务器,并通过服务器检查数据块密文和标签的一致性来防止数据污染攻击。此外,采用密钥链机制对收敛密钥进行管理,解决了现有方案中收敛密钥占用过多存储空间的问题。分析与比较表明,该方案具有较小的密钥存储开销和传输开销。 Existing proof of ownership schemes are vulnerable to the threat of honest-but-curious servers.With the help of a trusted third party to solve the problem can lead to high overhead.This paper proposed an improved proof of ownership scheme based on dynamic bloom filter,which did not require a trusted third party.The scheme used convergent encryption against honest-but-curious servers.To resist data poisoning attack,it checked whether the encrypted blocks correspond with the tokens at server side.Moreover,it used a key chaining mechanism to solve the problem that convergent keys require too much storage space in existing schemes.Analyses and comparisons show that the scheme has lower key storage overhead and transferring overhead.
作者 王平雁 柳毅 Wang Pingyan;Liu Yi(School of Computers,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第11期3419-3422,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61572144)
关键词 云存储 数据去重 BLOOM FILTER 收敛加密 所有权证明 cloud storage data deduplication bloom filter convergent encryption(CE) proof of ownership(PoW)
  • 相关文献

参考文献5

二级参考文献54

  • 1徐婧.云存储环境下副本策略研究[D].合肥:中国科学技术大学,2011.
  • 2胡盼盼.在线重复数据删除技术的研究与实现[D].武汉:华中科技大学,2011.
  • 3WU Y, LEE W, LIN C.Cloud storage performance enhancement by real-time feedback control and de-duplication[C]//Proc of Wireless Telecommunications Symposium.London:WTS,2012:1-5.
  • 4NG C, MA Ming-cao, WONG T, et al.Live de-duplication storage of virtual machine images in an open-source cloud[C]//Proc of the 12th ACM/IFIP/USENIX International Conference on Middleware.Berlin:Springer-Verlag,2011:81-100.
  • 5SEETENDRA S, MANOJ I.E-DAID:an efficient distributed architecture for in-line data de-duplication[C]//Proc of International Conference on Communication Systems and Network Technologies.Was-hington DC:IEEE Computer Society,2012:438-442.
  • 6LIU Chuan-yi, LU Ying-ping, SHI Chun-hui, et al.ADMAD:application-driven metadata aware de-duplication archival storage system[C]//Proc of the 5th IEEE International Workshop on Storage Network Architecture and Parallel I/Os.Washington DC:IEEE Compu-ter Society,2008:29-35.
  • 7TRIDGEII A.Efficient algorithms for sorting and synchronization[D].Canberra:Australian National University,1999:190-201.
  • 8FU Yin-jin, JIANG Hong, XIAO Nong, et al.AA-Dedupe:an application-aware source de-duplication approach for cloud backup services in the personal computing environment[C]//Proc of IEEE International Conference on Cluster Computing.Washington DC:IEEE Computer Society,2011:112-120.
  • 9BHAGWAT D.Providing high reliability in a minimum redundancy archival storage system[C]//Proc of the 14th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.Washington DC:IEEE Computer Society,2006:413-421.
  • 10FREY D.Probabilistic de-duplication for cluster-based storage systems[C]//Proc of ACM Symposium on Cloud Computing.New York:ACM Press,2012:315-321.

共引文献50

同被引文献8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部