期刊文献+

云环境下基于改进AONT的安全存储方案 被引量:1

Secure Storage Scheme Based on Improved AONT in Cloud Environment
下载PDF
导出
摘要 传统的加密方案仅依赖密钥管理来确保数据隐私,一旦密钥泄露,密文数据便无法抵抗被破解的风险.为增强外包数据的安全性,避免攻击者通过窃取密钥来获取可用信息,本文首次提出了利用基于Hash算法改进的全有或全无转换(All-or-Nothing Transformation,AONT)机制(H-AONT)对数据进行预处理,再结合传统的加密算法隐藏数据信息.通过H-AONT算法将明文消息转换成伪消息数据块,显著提升了外包数据的安全性.因此,用户能够将支持公开验证的数据持有性验证操作迁移到可信的第三方执行,而不必担心泄露隐私信息.经过分析和实验证明,该系统具有可靠的安全性和较高的审计效率. The traditional encryption schemes only rely on key management to ensure data privacy.Once the key is leaked,the encrypted data cannot resist the risk of being cracked.In order to enhance the security of outsourcing data and prevent attackers from stealing the key to obtain the available information,this paper proposes for the first time to use the improved All-or-Nothing Transformation(AONT)mechanism based on hash algorithm(H-AONT)to preprocess the data,and then combine with the traditional encryption algorithm to hide the data information.The plaintext is converted into pseudo-message data blocks by H-AONT algorithm,which significantly improves the security of outsourced data.Therefore,users can migrate the prove of data possess operations that support public verification to a trusted third-party agent(TPA)without fear of disclosing privacy information.The analysis and experiments show that the system has reliable security and high audit efficiency.
作者 边根庆 李欣妍 BIAN Gen-qing;LI Xin-yan(School of Information and Control Engineering,Xi′an University of Architecture and Technology,Xi′an 710055,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2022年第10期2219-2225,共7页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61872284)资助.
关键词 云存储 H-AONT转换机制 伪消息数据块 可信第三方 持有性证明 cloud storage H-AONT pseudo-message data blocks TPA prove of possession
  • 相关文献

参考文献14

二级参考文献92

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2刘田甜,李超,胡庆成,张桂刚.云环境下多副本管理综述[J].计算机研究与发展,2011,48(S3):254-260. 被引量:20
  • 3王红霞,陆塞群.基于HMAC-SHA1算法的消息认证机制[J].山西师范大学学报(自然科学版),2005,19(1):30-33. 被引量:9
  • 4Deswarte Y, Quisquater J J, and Saidane A. Remote integrity checking. Proceedings of IICIS'03, Switzerland, Nov. 13-14, 2003: 1-11.
  • 5Ateniese G, Burns R, Curtmola R, et al.. Provable data possession at untrusted stores. Proceedings of ACM-CCS '07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 598-609.
  • 6Ateniese G. Kamara S, and Katz J. Proofs of Storage from homomorphic identification protocols. Proceedings of ASIACRYPT '09, Tokyo, Japan, Dec. 6-10, 2009: 319-333.
  • 7Ateniese G, Pietro R D, Mancini L V, et al.. Scalable and efficient provable data possession. Proceedings of SecureComm'08, Istanbul, Turkey, Sept. 22-26, 2008: 1-10.
  • 8Curtmola R, Khan O, Burns R, and Ateniese G. MR-PDP: multiple-replica provable data possession. Proceedings of ICDCS '08, Beijing, China, June 19, 2008: 411-420.
  • 9Erway C, Kttpcu A, Papamanthou C, et al.. Dynaxnic provable data possession. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 213-222.
  • 10Juels A and Kaliski B S. Pors: proofs of retrievability for large files. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 584-597.

共引文献97

同被引文献16

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部