期刊文献+

基于身份代理离线签名的数据完整性审计协议 被引量:3

Data integrity audit protocol based on identity proxy off-line signature
下载PDF
导出
摘要 为解决移动边缘设备进行数据完整性审计时在计算、存储等方面存在限制的问题,提出一种可降低用户计算量和网络通信开销的数据完整性审计方案(IBPOS-PDP)。在基于身份的密码体制上将数据签名分为轻量级在线签名和复杂离线签名,采用代理方帮助用户完成离线签名。分析当前数据完整性审计的研究方向,提出方案模型,在随机预言机模型下证明方案可靠性,攻击者伪造证书、数据签名、完整性验证证据是困难的。利用PCB库进行仿真实验,在已委托代理方生成离线签名的情况下,IBPOS-PDP方案用户计算代价小于IBPS-PDP方案。实验和性能分析结果表明,IBPOS-PDP方案在整个数据完整性审计过程中使用户计算量和系统通信量达到了较好的平衡。 To solve the problem that the mobile edge device has limitations in computing and storage capacity during data integrity auditing,a data integrity auditing scheme(IBPOS-PDP)was proposed to reduce the amount of user computing and network communication overhead.Data signatures were classified into lightweight online signatures and complex offline signatures in the identity-based cryptosystem,and the agent generated the offline signature for the user.The research direction of current data integrity audit was analyzed,and the scheme model was proposed.The reliability of the scheme was proved under the random oracle model.It is difficult for the attackers to forge the certificate,the data signature,and the integrity verification evidence.The PCB library was used in the simulation experiments,in which the user calculation cost of the IBPOS-PDP scheme is lower than that of the IBPS-PDP scheme on the premise that the agent has been commissioned to generate an offline signature.The results of the experiments and the performance analysis show that the IBPOS-PDP scheme achieves better balance between user computing and system traffic throughout in the data integrity audit process.
作者 黄薛蓉 郭荣佐 HUANG Xue-rong;GUO Rong-zuo(College of Computer Science,Sichuan Normal University,Chengdu 610101,China)
出处 《计算机工程与设计》 北大核心 2020年第6期1553-1561,共9页 Computer Engineering and Design
基金 国家自然科学基金面上基金项目(61373162、61373163) 国家自然科学青年基金项目(61701331) 国家科技支撑计划基金项目(2014BAH11F01、2014BAH11F02) 教育部2018年第一批产学合作协同育人基金项目(华清远见教育集团)(201801082060) 教育部2018年第二批产学合作协同育人基金项目(北京博创智联科技有限公司)(201802027017)。
关键词 移动边缘计算 完整性审计 基于身份的密码体制 可分在线/离线签名 代理签名 moving edge computing integrity audit identity-based cryptosystem separable online/offline signature proxy signature
  • 相关文献

参考文献9

二级参考文献60

  • 1JUELS A, KALISKI JR B S. POlLs: proofs of retrievability for large files[A]. Proceedings of the 14th ACM conference on Computer and Communications Security[C]. ACM, 2007. 584-597.
  • 2ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at unsted stores[J]. Proceedings of CCS, 2007, 10: 598-609.
  • 3SHACHAM H, WATERS B. Compact proofs of retrievabil- ity[A-.Advances ia Cryptology-ASIACRYPT[C]. Springer Berlin Hei- delberg, 2008.90-107.
  • 4ERWAY C, KOPCO A, PAPAMANTHOU C, et al. Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C]. ACM, 2009.213-222.
  • 5WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems,2011, 22(5): 847-859.
  • 6WANG C, CHOW S S M, WANG Q, et at. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Com- puters,2013, 62(2): 362-375.
  • 7ZHENG Q, XU S. Fair and dynamic proofs Of retrievability[A]. Pro- ceedings of the First ACM Conference on Data and Application Secu- rity and Privacy[C]. ACM, 2011. 237-248.
  • 8YANG K, HA X. An efficient and secure dynamic auditing protocol for data storage in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(9): 1717-1726.
  • 9HAO Z, ZHONG S, YU N. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(9): 1432-1437.
  • 10WANG C, WANG Q, REN K, et al. Privacy-preserving public audit- hag for data storage security in cloud computing[A]. Proceedings IEEE INFOCOM[C]. IEEE, 2010. 1-9.

共引文献634

同被引文献21

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部