期刊文献+

一种采用签名与哈希技术的云存储去重方案 被引量:4

Cloud Storage Deduplication Scheme Using Signature and Hash Technology
下载PDF
导出
摘要 针对单一云存储服务提供商可能对数据进行垄断控制和现有云存储去重系统采用的收敛加密算法容易遭受暴力攻击等问题,提出了一种采用签名与哈希技术的云存储去重方案,通过在数据去重过程中采用双层校验机制对数据完整性进行审计,能够校验文件的完整性和精确地定位到损坏的数据块;同时构造Merkle哈希树来生成校验值,计算出去重标签,保证重复数据能够被检测;使用Mapbox和Lockbox结合的机制加密数据信息,保证非授权用户无法对文件进行访问。安全性分析及仿真实验结果表明,方案有效抵制暴力攻击,并能够降低去重标签的计算开销和减少存储空间。 To address the problem that data is monopolized by a single cloud storage service provider and convergence encryption adopted for existing cloud storage systems is vulnerable to brute-force attacks,a cloud storage deduplication scheme using signature and Hash technology is proposed.The scheme which uses a two-layer verification mechanism to audit data integrity,can check the integrity of the file and locate the damaged data block accurately.And a merkle Hash tree is constructed to generate the check coefficient and duplicate-lable,so that the duplicate data can be detected.In addition,a combination of Mapbox and Lockbox is used to encrypt data,which ensures that the unauthaorized users can not access the files directly.The security analysis and simulation results show that the scheme can effectively resist the brute-force attacks,reduce the computation cost of duplicate-lable generation and storage space.
作者 张桂鹏 匡振曦 陈平华 ZHANG Guipeng;KUANG Zhenxi;CHEN Pinghua(School of Computer,Guangdong University of Technology,Guangzhou 510006,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第1期76-82,共7页 Computer Engineering and Applications
基金 国家自然科学基金(No.61572144) 广东省科技计划项目(No.2017B030307002)
关键词 数据去重 多云存储 双层校验机制 Merkle哈希树 data deduplication multiple cloud storage two-layer verification mechanism Merkle Hash tree
  • 相关文献

参考文献5

二级参考文献18

  • 1Ateniese G, Betas R, Curtmola R, et al. Provable Data Possession at Untrusted Stores[ C]//Proc of the 14' ACM Conference on Computer and Communications Security. New York : ACM ,2007:598 - 609.
  • 2Ateniese G, Pietro R D, Mancini L V, et al. Scalable and Efficient Prov- able Data Possessin [ C ]//Proc of the 4th International Conference on SecUrity and Privacy in Communication Netowrks Istanbul. Turkey: ACM ,2008:1 - 10.
  • 3Erway C, Papamanthou C, Tamassia R, et al. Dynamic Provable Data Possession[ C ]//Prec of the 16th ACM Conferdnceon Computer and- Communications Security. Chicago, Illinois, USA: ACM, 2009:213 - 222.
  • 4Juels A, Burton S, Kaliski J. Proofs of Retrievability for Large Files [ C ]//Proe of the 14th ACM Conference on Computer and Communica- tions Security. Alexandria, Virginia, USA : ACM ,2007 :584 - 597.
  • 5Shacham H, Waters B. Compact Proofs of Retrievability [ C ]//Advanc- esin Cryptology (ASIACRYPT) : Springer Berlin Heidelberg, 2008 : 90 - 107.
  • 6Zhang Y, Blanton M. Efficient Dynamic Provable Possession of Remote Data via Update Trees[ J]. IACR Cryptology ePrint Arc hive ,2012,28 (3) :291 -291.
  • 7Wang C, Ren K, Lou W, et al. Toward Publicly Auditabte Secure Cloud Data Storage Services[ J]. IEEE Network ,2011,24 : 19 - 24.
  • 8Zhou H,Sheng Z, Nenghai Y. A Privacy Preserving Remote Data Integ-rity Checking Protocol with Data Dynamics and Public Verifiability [J]. IEEE Transactionson Knowledge and Data Engineering,2011,23 (9) :1432 - 1437.
  • 9Wang Q A, Wang C, Ren K, et al. Enabling Public Auditability and Da- m Dynamics for Storage Security in Cloud Computing[ J]. IEEE T Par- di Distr,2011,22 : 847 - 859.
  • 10Wang C, Wang Q, Ran K, et al. Toward Secure and Dependable Storage Services in Cloud Computing[ J]. IEEE Transactions on Services Com- puting,2012,5:220 - 232.

共引文献32

同被引文献48

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部