期刊文献+
共找到66篇文章
< 1 2 4 >
每页显示 20 50 100
Reducing Computational and Communication Complexity for Dynamic Provable Data Possession
1
作者 刘妃妃 谷大武 +2 位作者 陆海宁 龙斌 李晓晖 《China Communications》 SCIE CSCD 2011年第6期67-75,共9页
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files... Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation. 展开更多
关键词 cloud computing proofs of storage dynamic provable data possession file sharing
下载PDF
A Novel Provable Data Possession Scheme Based on Geographic Location Attribute
2
作者 Yaxing Zha Shoushan Luo +1 位作者 Jianchao Bian Wei Li 《China Communications》 SCIE CSCD 2016年第9期139-150,共12页
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve... Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient. 展开更多
关键词 cloud storage security provable data possession geographic location security boundary CDH assumption
下载PDF
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
3
作者 Yining Qi Zhen Yang +2 位作者 Yubo Luo Yongfeng Huang Xing Li 《Computers, Materials & Continua》 SCIE EI 2022年第11期2205-2221,共17页
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe... Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient. 展开更多
关键词 provable data possession outsourced computation blockchain smart contract chameleon hash
下载PDF
Sec-Auditor:A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness
4
作者 Guodong Han Hecheng Li 《Computers, Materials & Continua》 SCIE EI 2024年第8期2121-2137,共17页
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ... Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one. 展开更多
关键词 provable data possession public auditing cloud storage data integrity semantic correctness
下载PDF
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation 被引量:1
5
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期183-199,共17页
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s... Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data security threats,even more complex.When a user quit its group,remaining data block signatures must be re-signed to ensure security.Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side.However,considering the privacy and security need of group auditing,there still lacks a comprehensive solution to implement secure group user revocation,supporting identity privacy preserving and collusion attack resistance.Aiming at this target,we construct a concrete scheme based on ring signature and smart contracts.We introduce linkable ring signature to build a kind of novel meta data for integrity proof enabling anonymous verification.And the new meta data supports secure revocation.Meanwhile,smart contracts are using for resisting possible collusion attack and malicious re-signing computation.Under the combined effectiveness of both signature method and blockchain smart contracts,our proposal supports reliable user revocation and signature re-signing,without revealing any user identity in the whole process.Security and performance analysis compared with previous works prove that the proposed scheme is feasible and efficient. 展开更多
关键词 provable data possession data integrity blockchain ring signature
下载PDF
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data
6
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2603-2618,共16页
Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,wh... Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,which is called group data sharing.As all kinds of cloud service,data group sharing also suffers from hardware/software failures and human errors.Provable Data Posses-sion(PDP)schemes are proposed to check the integrity of data stored in cloud without downloading.However,there are still some unmet needs lying in auditing group shared data.Researchers propose four issues necessary for a secure group shared data auditing:public verification,identity privacy,collusion attack resis-tance and traceability.However,none of the published work has succeeded in achieving all of these properties so far.In this paper,we propose a novel block-chain-based ring signature PDP scheme for group shared data,with an instance deployed on a cloud server.We design a linkable ring signature method called Linkable Homomorphic Authenticable Ring Signature(LHARS)to implement public anonymous auditing for group data.We also build smart contracts to resist collusion attack in group auditing.The security analysis and performance evalua-tion prove that our scheme is both secure and efficient. 展开更多
关键词 provable data possession data integrity blockchain ring signature
下载PDF
Towards Comprehensive Provable Data Possession in Cloud Computing 被引量:1
7
作者 LI Chaoling CHEN Yue +1 位作者 TAN Pengxu YANG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期265-271,共7页
To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data... To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data block update.In this article,we first analyze and test its performance in detail.The result shows that our scheme is efficient with low computation,storage,and communication costs.Then,we discuss how to extend the dynamic scheme to support other features,including public auditability,privacy preservation,fairness,and multiple-replica checking.After being extended,a comprehensive PDP scheme that has high efficiency and satisfies all main requirements is provided. 展开更多
关键词 cloud computing provable data possession data dynamics SN-BN table
原文传递
面向云存储的机载软件持有性证明
8
作者 岳猛 文程 +1 位作者 洪雪婷 严思敏 《计算机科学》 CSCD 北大核心 2024年第S02期884-893,共10页
随着民用航空机载软件数量的不断增长,传统的软件分发方式面临效率低、成本高、安全性差的问题。为了提高机载软件的分发效率,将云存储与机载软件相结合,提出了一种基于Cloud-P2P的机载软件存储架构,实现了机载软件的分布式云存储以及... 随着民用航空机载软件数量的不断增长,传统的软件分发方式面临效率低、成本高、安全性差的问题。为了提高机载软件的分发效率,将云存储与机载软件相结合,提出了一种基于Cloud-P2P的机载软件存储架构,实现了机载软件的分布式云存储以及机载软件共享。在此基础上,提出了一种数据持有性证明协议,通过将标识与公钥绑定,降低了共谋风险,并通过抽样审计完成对云上机载软件的完整性验证,减小了验证成本。安全性分析表明,所提方案具有不可伪造性和抗重放攻击的能力,并且证明了数据持有性证明协议的正确性。与现有的数据完整性审计方案相比,计算开销减少了10%,通信开销减少了20%。该研究对保证机载软件的高效安全分发具有实际意义。 展开更多
关键词 机载软件 云存储 P2P 数据持有性证明 抽样审计
下载PDF
可证数据持有研究进展
9
作者 王化群 巩冉 《南京邮电大学学报(自然科学版)》 北大核心 2024年第1期56-64,共9页
海量远程数据完整性检测是云计算安全领域的一个研究热点,可证数据持有(Provable Data Possession,PDP)是一种轻量级远程数据完整性概率检测模型。从不同的公钥基础架构的角度,综述了PDP的研究进展。首先,针对公钥架构(Public Key Infra... 海量远程数据完整性检测是云计算安全领域的一个研究热点,可证数据持有(Provable Data Possession,PDP)是一种轻量级远程数据完整性概率检测模型。从不同的公钥基础架构的角度,综述了PDP的研究进展。首先,针对公钥架构(Public Key Infrastructure,PKI)、身份基公钥密码和无证书公钥密码体制,分别阐述了PDP的研究背景和主要研究进展。其次,给出了结合新型网络技术的PDP方案,如区块链技术、DNA技术等。最后,展望了未来PDP研究的一些重要方向,包括量子计算和抗量子PDP、新型智慧城市和基于我国商用密码标准的PDP、6G和内生安全PDP等。 展开更多
关键词 云计算 可证数据持有 公钥密码学 概率检测 中国商用密码标准
下载PDF
基于电力系统多用户的数据持有证明计算方法
10
作者 施健 陈克朋 魏训虎 《计算机与数字工程》 2024年第4期1039-1044,共6页
基于云计算的电力系统多用户业务应用将不可避免地规模化发展,为保障电力系统业务应用的数据安全可靠,不被伪造和攻击,论文提出一种多用户的数据持有证明计算方法,通过数据持有证明计算方法,不仅保护业务应用数据不被攻击者伪造,恶意管... 基于云计算的电力系统多用户业务应用将不可避免地规模化发展,为保障电力系统业务应用的数据安全可靠,不被伪造和攻击,论文提出一种多用户的数据持有证明计算方法,通过数据持有证明计算方法,不仅保护业务应用数据不被攻击者伪造,恶意管理员伪造,而且能很好地满足电力智慧物联体系的规模化业务应用;同时,通过对数据持有证明计算方法的安全性进行验证,计算性能进行了评估,使得该计算方法能够很好地应用于智慧物联体系下电力业务系统规模化应用。 展开更多
关键词 数据持有计算 多用户 电力系统
下载PDF
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
11
作者 Junjie Feng Shigong Long 《International Journal of Communications, Network and System Sciences》 2017年第5期274-282,共9页
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work... We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance. 展开更多
关键词 provable data possession (PDP) Cloud Storage data DYNAMICS Public Verifiability data INTEGRITY
下载PDF
基于区块链的公平可验证数据持有方案 被引量:1
12
作者 唐飞 冯卓 黄永洪 《电子学报》 EI CAS CSCD 北大核心 2023年第2期406-415,共10页
针对传统可证明数据持有(Provable Data Possession,PDP)方案中要求客户端是诚实的这一问题,基于区块链技术提出了公平的可证明数据持有方案.在传统PDP方案中,总是假定服务器是半诚实而客户端是可信的,这对服务器而言是不公平的.在基于... 针对传统可证明数据持有(Provable Data Possession,PDP)方案中要求客户端是诚实的这一问题,基于区块链技术提出了公平的可证明数据持有方案.在传统PDP方案中,总是假定服务器是半诚实而客户端是可信的,这对服务器而言是不公平的.在基于区块链的公平PDP方案中,用于检验的元数据不再由客户端生成,而是由区块链节点生成并对其达成共识.因此,借助区块链的分布式信任性质可以实现PDP方案的互信机制,保证客户端和云服务器之间的公平性.同时,利用哈希函数、Pedersen承诺实现高效的公平PDP方案.分析所提方案的安全性、计算开销、通信开销以及冗余率.分析结果表明,在保障安全性的基础上,所提方案比同类方案具有更优的计算开销、通信开销及冗余率. 展开更多
关键词 可证明数据持有方案 互信机制 公平性 区块链
下载PDF
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds
13
作者 Meng Zhao Yong Ding +3 位作者 Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu 《国际计算机前沿大会会议论文集》 2019年第1期342-345,共4页
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ... The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof. 展开更多
关键词 Cloud STORAGE INTEGRITY AUDITING provable data possession PROOFS of STORAGE PROOFS of Retrievability
下载PDF
基于区块链的云数据完整性验证研究综述 被引量:1
14
作者 杨潇 吴黎兵 +1 位作者 张壮壮 霍丽娟 《小型微型计算机系统》 CSCD 北大核心 2023年第11期2369-2376,共8页
云存储服务与传统的内部存储基础设施相比,拥有更高的扩展性以及更低的管理成本,其低成本和可靠性的优势吸引了越来越多的用户选择将数据存储到云存储服务器上.但是云存储服务也给用户带来了额外的安全问题,即用户失去了对数据的控制,... 云存储服务与传统的内部存储基础设施相比,拥有更高的扩展性以及更低的管理成本,其低成本和可靠性的优势吸引了越来越多的用户选择将数据存储到云存储服务器上.但是云存储服务也给用户带来了额外的安全问题,即用户失去了对数据的控制,无法确保云数据的完整性.目前已有很多云数据完整性验证方案来确保用户可以及时发现云上数据的损坏,但是传统方案本质上都是一种中心化的审计服务,面临着单点故障的风险;且存在着数据拥有者与审计者都是可信的安全假设,未能考虑到二者的不诚实行为所带来的安全风险;同时协议运行的透明程度不够,无法在协议运行异常的时候追溯到违反协议规定的一方.区块链技术为解决上述问题提供了新的方向,目前已有很多研究将区块链和传统云数据完整性验证方案相结合,增强了协议的可靠性与运行透明度.该文根据对区块链的不同利用方式对相关文献进行了梳理分类及对比分析,并指出了基于区块链的云数据完整性验证这一研究领域尚需要解决的问题及研究方向. 展开更多
关键词 区块链 云存储 完整性验证 数据持有性证明 数据可恢复证明
下载PDF
云存储中的数据完整性证明研究及进展 被引量:102
15
作者 谭霜 贾焰 韩伟红 《计算机学报》 EI CSCD 北大核心 2015年第1期164-177,共14页
随着云存储模式的出现,越来越多的用户选择将应用和数据移植到云中,但他们在本地可能并没有保存任何数据副本,无法确保存储在云中的数据是完整的.如何确保云存储环境下用户数据的完整性,成为近来学术界研究的一个热点.数据完整性证明(Pr... 随着云存储模式的出现,越来越多的用户选择将应用和数据移植到云中,但他们在本地可能并没有保存任何数据副本,无法确保存储在云中的数据是完整的.如何确保云存储环境下用户数据的完整性,成为近来学术界研究的一个热点.数据完整性证明(Provable Data Integrity,PDI)被认为是解决这一问题的重要手段,该文对此进行了综述.首先,给出了数据完整性证明机制的协议框架,分析了云存储环境下数据完整性证明所具备的特征;其次,对各种数据完整性证明机制加以分类,在此分类基础上,介绍了各种典型的数据完整性验证机制并进行了对比;最后,指出了云存储中数据完整性验证面临的挑战及发展趋势. 展开更多
关键词 云存储 数据完整性证明 数据持有性证明 数据可恢复性证明 大数据 云计算
下载PDF
云存储中数据完整性自适应审计方法 被引量:8
16
作者 王惠峰 李战怀 +2 位作者 张晓 孙鉴 赵晓南 《计算机研究与发展》 EI CSCD 北大核心 2017年第1期172-183,共12页
作为云存储安全的重要问题,数据完整性验证技术受到学术界和工业界的广泛关注.为了验证云端数据完整性,研究者提出了多个数据完整性公开审计模型.然而,现有的数据完整性审计模型采用固定参数审计所有文件,浪费了大量计算资源,导致系统... 作为云存储安全的重要问题,数据完整性验证技术受到学术界和工业界的广泛关注.为了验证云端数据完整性,研究者提出了多个数据完整性公开审计模型.然而,现有的数据完整性审计模型采用固定参数审计所有文件,浪费了大量计算资源,导致系统审计效率不高.为了提高系统的审计效率,提出了一种自适应数据持有性证明方法(self-adaptive provable data possession,SA-PDP),该方法基于文件属性和用户需求动态调整文件的审计方案,使得文件的审计需求和审计方案的执行强度高度匹配.为了增强审计方案更新的灵活性,依据不同的审计需求发起者,设计了2种审计方案动态更新算法.主动更新算法保证了审计系统的覆盖率,而被动更新算法能够及时满足文件的审计需求.实验结果表明:相较于传统方法,SA-PDP的审计总执行时间至少减少了50%,有效增加了系统审计文件的数量.此外,SAPDP方法生成的审计方案的达标率比传统审计方法提高了30%. 展开更多
关键词 数据安全 云存储 数据完整性验证 数据可持有性证明 自适应审计
下载PDF
基于同态hash的数据多副本持有性证明方案 被引量:12
17
作者 李超零 陈越 +1 位作者 谭鹏许 杨刚 《计算机应用研究》 CSCD 北大核心 2013年第1期265-269,共5页
为检查云存储中服务提供商(CSP)是否按协议完整地存储了用户的所有数据副本,在分析并指出一个基于同态hash的数据持有性证明方案安全缺陷的基础上,对其进行了改进和扩展,提出了一个多副本持有性证明方案。为实现多副本检查,将各副本编... 为检查云存储中服务提供商(CSP)是否按协议完整地存储了用户的所有数据副本,在分析并指出一个基于同态hash的数据持有性证明方案安全缺陷的基础上,对其进行了改进和扩展,提出了一个多副本持有性证明方案。为实现多副本检查,将各副本编号与文件连接后利用相同密钥加密以生成副本文件,既有效防止了CSP各服务器的合谋攻击,又简化了用户和文件的授权访问者的密钥管理;为提高检查效率,利用同态hash为数据块生成验证标签,实现了对所有副本的批量检查;为保证方案安全性,将文件标志和块位置信息添加到数据块标签中,有效防止了CSP进行替换和重放攻击。安全性证明和性能分析表明,该方案是正确和完备的,并具有计算、存储和通信负载低,以及支持公开验证等特点,从而为云存储中数据完整性检查提供了一种可行的方法。 展开更多
关键词 云存储 完整性检查 多副本持有性证明 同态哈希
下载PDF
云计算下的数据存储安全可证明性综述 被引量:26
18
作者 梁彪 曹宇佶 +1 位作者 秦中元 张群芳 《计算机应用研究》 CSCD 北大核心 2012年第7期2416-2421,共6页
云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制。于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题。在全面研究云计算数据存储安全现有成果的基础上,介绍... 云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制。于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题。在全面研究云计算数据存储安全现有成果的基础上,介绍了云计算数据存储的基本架构,并从可检索证明和可证明数据拥有两个角度分析了相关研究方案的发展,从公共认证、同态认证、数据动态化、隐私保护、批审计和多服务器环境得方面讨论了协议的功能设计,并且列表进行了功能和开销对比,在此基础上提出了一个比较完备的云计算环境下的协议框架。最后总结并阐述了后续工作。 展开更多
关键词 云计算 数据存储安全 可检索证明 可证明数据拥有
下载PDF
云数据存储安全审计研究及进展 被引量:13
19
作者 白利芳 祝跃飞 芦斌 《计算机科学》 CSCD 北大核心 2020年第10期290-300,共11页
云存储相比传统存储方式可避免存储平台重复建设及维护,其存储容量和性能的可扩展性、地理位置的无约束性及按需付费的服务模式有效优化了存储及社会资源配置。然而,云存储服务中数据所有权和管理权分离的特点,使得用户对保存在云端数... 云存储相比传统存储方式可避免存储平台重复建设及维护,其存储容量和性能的可扩展性、地理位置的无约束性及按需付费的服务模式有效优化了存储及社会资源配置。然而,云存储服务中数据所有权和管理权分离的特点,使得用户对保存在云端数据安全性及可控性的关注日益增长,国内外学者对此进行了大量的研究。文中论述了云数据在其生命周期各阶段的安全风险及其安全审计需求;构建了云存储数据安全审计机制的框架结构,并提出了审计机制的主要评价指标;综述了云数据存储安全审计现有机制,包括数据持有性证明机制、数据可恢复性证明机制、外包存储安全备份审计机制和存储位置审计机制;最后,从不同角度指出现有云数据存储安全审计研究存在的不足及下一步可研究的方向。 展开更多
关键词 云存储 存储安全审计 审计框架 数据持有性证明 数据可恢复性证明 外包存储合规性
下载PDF
移动云计算环境中基于代理的可验证数据存储方案 被引量:8
20
作者 杨健 王剑 +1 位作者 汪海航 杨邓奇 《计算机应用》 CSCD 北大核心 2013年第3期743-747,792,共6页
现有云计算可验证数据存储协议无法直接应用于终端存储和计算能力有限的移动计算环境。针对该问题,提出移动计算环境下基于代理的可验证云存储协议,在终端和云服务器之间引入一个半可信的安全计算代理,利用代理来帮助移动终端用户完成... 现有云计算可验证数据存储协议无法直接应用于终端存储和计算能力有限的移动计算环境。针对该问题,提出移动计算环境下基于代理的可验证云存储协议,在终端和云服务器之间引入一个半可信的安全计算代理,利用代理来帮助移动终端用户完成计算密集的操作,从而使得可验证数据存储方案可用于移动计算环境。提出一个具体的可验证数据存储协议,形式化证明了所提协议满足随机预言机模型下的选择明文攻击(CPA)安全,量化分析结果表明协议设计适用于移动计算环境,符合设计目标。 展开更多
关键词 可验证数据存储 计算代理 移动计算 云存储
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部