期刊文献+

用户可实时撤销的云存储数据完整性验证方案 被引量:1

Cloud storage data integrity verification scheme that users revoke in real time
下载PDF
导出
摘要 为解决现存数据完整性验证方案中用户难以实时撤销且撤销成本大的问题,提出用户可实时撤销的云存储数据验证方案,为用户设计一个管理员属性,实现用户实时撤销;利用代理重签名技术实现用户撤销过程中的签名替换,避免新用户重新从云端下载数据进行签名并上传;利用代理服务器的可信执行环境保证重签名阶段的信息安全,保护签名信息不被篡改或泄露;在审计挑战中采用随机掩码隐藏关键信息,避免好奇的第三方审计者通过验证信息获取到用户的真实数据。安全分析和性能分析进一步表明,方案是安全且高效的。 To solve the problem that it is difficult for users to revoke in real time and the cost of revocation is high in the existing data integrity verification schemes,a cloud storage data integrity verification scheme that realized the user’s real-time revocation was proposed,and an administrator attribute was designed for the user to realize the user’s real-time revocation.An administrator attribute for users was designed to realize real-time revocation of users.The proxy re-signature technology was used to realize the signature replacement in the process of user revocation,so as to avoid new users downloading data from the cloud again for signing and uploading.The trusted execution environment of proxy server was used to ensure the information security in the re-signature stage and protect the signature information from tampering or disclosure.In the audit challenge,the random mask was used to hide the key information,so as to avoid the curious third-party audit and obtain the user’s real data through the verification information.Security analysis and performance analysis further show that the scheme is safe and efficient.
作者 马海峰 王俊华 薛庆水 时雪磊 张继 杨家海 MA Hai-feng;WANG Jun-hua;XUE Qing-shui;SHI Xue-lei;ZHANG Ji;YANG Jia-hai(School of Computer Science and Information Engineering,Shanghai Institute of Technology,Shanghai 201418,China;Institute for Network Sciences and Cyberspace,Tsinghua University,Beijing 100084,China)
出处 《计算机工程与设计》 北大核心 2023年第10期2943-2949,共7页 Computer Engineering and Design
基金 国家“十三五”重点研发计划基金项目(2017YFB0803004) 国家重点研发计划基金项目(2018YFB1800200) 上海应用技术大学引进人才项目启动基金项目(39120K196002-A06)。
关键词 云存储 用户实时撤销 数据完整性 代理重签名 可信执行环境 数据验证 隐私保护 cloud storage users revoke in real time data integrity proxy re-signature trusted execution environment data verification privacy protection
  • 相关文献

参考文献6

二级参考文献33

  • 1韩静,李艳平,禹勇,丁勇.用户可动态撤销及数据可实时更新的云审计方案[J].软件学报,2020,31(2):578-596. 被引量:19
  • 2陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 3HUBBARD D, SUTTON M. Top threats to cloud computing vl. 0 [ EB/OL]. [ 2015- 09- 10]. https://cloudsecurityalliance, org/ topthreats/csathreats, vl. 0. pdf.
  • 4YU S, WANG C, REN K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [ C ]// INFOCOM' 10: Proceedings of the 29th Conference on Information Communications. Piscataway, NJ: IEEE, 2010:534-542.
  • 5LI M, YU S, REN K, et al. Securing personal health records in cloud computing: patient-centric and fine-grained data access con- trol in multi-owner settings [ C]// SecureComm 2010: Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Networks. Berlin: Springer, 2010: 89-106.
  • 6RAJU M, LANITHA B. Survey about cloud computing threats [ J]. International Journal of Computer Science and Information Technolo- gies, 2014, 5(1): 384-389.
  • 7JUELS A, KALISKI B S, Jr. PORs: proofs of retrievability for large files [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007:584-597.
  • 8ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [ C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007:598-609.
  • 9SHACHAM H, WATERS B. Compact proofs of retrievability [ C]// ASIACRYPT' 08: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securi- ty: Advances in Cryptology. Berlin: Springer, 2008: 90-107.
  • 10WANG C, WANG Q, REN K, et al. Privacy-preserving public au- diting for data storage security in cloud computing [ C ]// INFOCOM' 10: Proceedings of the 29th Conference on Information Communications. Piscataway, NJ: IEEE, 2010:525-533.

共引文献46

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部