期刊文献+

可证数据持有研究进展

Survey on provabledata possession
下载PDF
导出
摘要 海量远程数据完整性检测是云计算安全领域的一个研究热点,可证数据持有(Provable Data Possession,PDP)是一种轻量级远程数据完整性概率检测模型。从不同的公钥基础架构的角度,综述了PDP的研究进展。首先,针对公钥架构(Public Key Infrastructure,PKI)、身份基公钥密码和无证书公钥密码体制,分别阐述了PDP的研究背景和主要研究进展。其次,给出了结合新型网络技术的PDP方案,如区块链技术、DNA技术等。最后,展望了未来PDP研究的一些重要方向,包括量子计算和抗量子PDP、新型智慧城市和基于我国商用密码标准的PDP、6G和内生安全PDP等。 Massive remote data integrity detection is a research hotspot in the field of cloud computing security.Provable data possession(PDP)is a lightweight remote data integrity probability detection model.This paper reviews the research progress of PDP from the perspective of different public key infrastructure.Firstly,the research background and main progress of PDP are elaborated by focusing on public key infrastructure(PKI),identity based public key cryptography,and certificateless public key cryptography.Secondly,PDP schemes combining new network technologies,such as blockchain technology and DNA technology,are suggested.Finally,some important directions for future PDP research are anticipated,including quantum computation,anti-quantum PDP,new smart cities,6G,Chinese commercial cryptography standard-based PDP and endogenous secure PDP.
作者 王化群 巩冉 WANG Huaqun;GONG Ran(School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)
出处 《南京邮电大学学报(自然科学版)》 北大核心 2024年第1期56-64,共9页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(U23B2002,62272238)资助项目。
关键词 云计算 可证数据持有 公钥密码学 概率检测 中国商用密码标准 cloud computing provable data possession(PDP) public key cryptography probabilistic checking Chinese commercial cryptography standard
  • 相关文献

参考文献10

二级参考文献40

  • 1Juels A, Kaliski-Jr B S. Pors: Proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007. Alexandria: ACM, 2007. 584-597.
  • 2Ateniese G, Burns R C, Curtmola R, et al. Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007. Alexandria: ACM, 2007. 598-609.
  • 3Bowers K D, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009. Chicago: ACM, 2009. 43-54.
  • 4Odis Y, Vadhan S P, Wichs D. Proofs of retrievability via hardness amplification. In: Reingold O, ed. Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009. Lecture Notes in Computer Science, vol. 5444. San Francisco: Springer-Verlag, 2009. 109-127.
  • 5Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009. Saint-Malo: Springer-Verlag, 2009. 355-370.
  • 6Shacham H, Waters B. Compact proofs of retrievability. In: Advances in Cryptology - ASIACRYPT 2008, 14th Interna- tional Conference on the Theory and Application of Cryptology and Information Security. Melbourne: Springer-Verlag, 2008. 90-107.
  • 7Goldreich O. Foundations of Cryptography: Basic Tools. Volume Basic Tools. Cambridge: Cambridge University Press, 2001.
  • 8Christopher Erway C, Kfip~ii A, Papamanthou C, et al. Dynamic provable data possession. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009. Chicago: ACM, 2009. 213-222.
  • 9Boneh D, Boyen X, Shacham H. Short group signatures. In: Proceedings of CRYPTO 2004, LNCS series. Santa Barbara: Springer-Verlag, 2004. 41-55.
  • 10Bowers K D, Juels A, Oprea A. Hail: A high-availability and integrity layer for cloud storage. In: ACM Conference on Computer and Communications Security, CCS 2009. Chicago: ACM, 2009. 187-198.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部