期刊文献+

基于联盟链的云存储完整性审计机制研究 被引量:3

Research on cloud storage integrity auditing mechanism based on consortium blockchains
下载PDF
导出
摘要 针对云存储完整性审计公正性问题,提出一种基于联盟区块链的云存储完整性审计模型(CSACB,Cloud Storage Integrity Auditing Model Based on Consortium Blockchains).首先,该模型以树型结构描述审计联盟(AC,Audit Consortium)构成,同时利用层级证书链(LCC,Layer Certificate Chain)对联盟成员进行身份标识和权限控制.其次,采用完整性审计链与动态操作链的双链形式支持可变云存储审计.最后,利用智能合约(SC,Smart Contract)并结合数据块标签索引机制构建公正的动态操作审计模型,理论分析和实验结果表明该模型在安全性和性能上具备明显优势. Aiming at the issue of fairness in cloud storage integrity audit,a Cloud Storage Integrity Auditing Model Based on Consortium Blockchains(CSACB)is proposed.First of all,the model describes the composition of audit consortium(AC)by a tree structure,and uses the layer certificate chain(LCC)to identify and control the members of the alliance.Second,variable cloud storage auditing is supported by a two-chain form of integrity auditing chain and dynamic operating chain.Finally,the fair dynamic operation audit model is constructed by using the smart contract(SC)and the data block label index mechanism,and the results of theoretical analysis and experimental show that the model has obvious advantages in terms of security and performance.
作者 顾浩 贺寰烨 林果园 GU Hao;HE Huan-ye;LIN Guo-yuan(School of Computer Science and Technology,CUMT,Xuzhou 221116,China;State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China)
出处 《微电子学与计算机》 北大核心 2020年第1期53-58,共6页 Microelectronics & Computer
基金 软件新技术国家重点实验室开放基金项目(KFKT2018B27)
关键词 云存储 联盟区块链 完整性审计 动态操作 cloud storage consortium blockchains integrity audit dynamic operation
  • 相关文献

参考文献2

二级参考文献32

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2Zeng Wenying, Zhao Yuelong, Ou K, et al. Research on cloud storage architecture and key technologies [C] //Proc of the 2nd Int Conf on Interaction Sciences: Information Technology, Culture and Human. New York: ACM, 2009: 1044-1048.
  • 3Mell P, Granee T. The NIST definition of cloud computing [J]. National Institute of Standards and Technology, 2009, 53(6) : 50-57.
  • 4Behl A, Behl K. An analysis of cloud computing security issues [C] //Proc of the 2nd World Congress on Information and Communication Technologies ( WICT 2012 ). Piscatawav, NJ: IEEE, 2012 : 109-114.
  • 5Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:598-609.
  • 6Ateniese G, Di Pietro R, Mancini L V, et al. Scalable and efficient provable data possession [C] //Proc of the 4th Int Conf on Security and Privacy in Communication Networks. New York: ACM, 2008:: Article No. 9.
  • 7Erway C, Kapca A, Papamanthou C, et al. Dynamic provable data possession [C]//Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:213-222.
  • 8Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing [C] //Proc of the 28th IEEE INFOCOM. Piscataway, NJ: IEEE, 2010:1-9.
  • 9Wang Qian, Wang Cong, Li Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing [G] //Computer Security. Berlin: Springer, 2009: 355-370.
  • 10Liu Chang, Cher Jinjun, Yang L T, et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates[J]. IEEE Trans on Parallel and Distributed Systems, 2013, 25(9): 2234-2244.

共引文献38

同被引文献27

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部