期刊文献+

一种基于区块链的云镜像完整性监测方法

A blockchain based integrity monitoring method for cloud images
下载PDF
导出
摘要 针对云环境中镜像文件遭到篡改攻击这一问题,结合区块链技术提出了一种云镜像完整性监测方法.首先,每隔一段时间计算所有云镜像的哈希信息,并将哈希信息记录在Merkel树数据结构中;然后,将这一Merkel树打包成为区块并构成区块链;最后,周期性地对当前区块中Merkel树根节点的验证以实现对全部云镜像的完整性验证,并在发现篡改后定位被篡改的镜像文件.经过实验验证,所提出的方法相比之前的方法有3%的效率提升,同时经过理论分析,方法具有安全性、可追溯性以及可扩展性等特点. Aiming at the problem of the image files being tampered with in cloud environment,an integrity monitoring method based on blockchain technology for cloud images is proposed.Firstly,hash values of all cloud images are calculated periodically and recorded in a Merkel Tree data structure.Next,the Merkel Tree is packed in a block and then a blockchain would be constructed.And finally,the root node of Merkel Tree in the current block is verified periodically to implement the overall verification for the integrity of all cloud images,and the tampered image file would be located when tampering attack is detected.According to experiments,the method proposed in this paper outperforms former methods for about 3%,and the theoretical analysis indicate that the method in this paper is secure,traceable,and expandable.
作者 马威 曹刘洋 菅朋朋 Ma Wei;Cao Liuyang;Jian Pengpeng(School of Information Engineering,North China University of Water Resources and Electric Power,Zhengzhou 450046,China;School of Artificial Intelligence,Chongqing University of Technology,Chongqing 401135,China)
出处 《河南师范大学学报(自然科学版)》 CAS 北大核心 2023年第4期93-99,151,共8页 Journal of Henan Normal University(Natural Science Edition)
基金 国家自然科学基金青年基金(62107014) 河南省科技攻关项目(212102210100) 河南省高等学校重点科研项目(20A413008,21B520022,20B520040) 河南省高等教育教学改革研究与实践项目(2021SJGLX581).
关键词 云计算 完整性监测 区块链 cloud computing integrity monitoring blockchain
  • 相关文献

参考文献7

二级参考文献159

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:236
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 3王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 4EC2:Amazon elastic compute clond[EB/OL].http://aws.amazon com/ec2/.
  • 5Barbara P,Dragovic B,Fraser K.Xen and the art of virtoaiization[C] //Proceedings of the 19th ACM Symposium on Operating Systems Principles,2003.
  • 6Lagar-Cavilla H A,Whitney J A,Scannell A,et al.SnowFlock:Rapid virtual machine cloning for cloud computing[C] //Proceedings of EuroSys 2009,Nuremberg,Germany,2009.
  • 7Vrable M,Ma J,Chen J,et al.Scalabibility,fidelity and containmeat in the Potemkin virtual honeyfarm[C] //Proc 20th Sympoaium on Operating Systems Principles(SOSP),Brighton,UK,2005.
  • 8Cully B,Lefebvre G,Meyer D,et al.Remus:High availability via asynchronous virtual machine replication[C] //Proc 5th Symposium on Networked Systems Design and Implemontation(NSDI),2008.
  • 9Dunlap G W,King S T,Cinar S,et al.Revirt:Enabling intrusion analysis through virtualmachine logging and replay[C] //Proceedings of the 5th Symposium on Operating Systems Design & Implementation(OSDI),Boston,Massachusetts,USA,2002.
  • 10Zayas E.Attacking the process migration bottleneck[C] //Proc 11th Symposium on Operating System Principles(SOSP),Austin,TX,1987.

共引文献3653

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部