浏览全部资源
扫码关注微信
1. 武汉大学 计算机学院,湖北 武汉 430072
2. 地球空间信息技术协同创新中心,湖北 武汉 430072
[ "何凯(1987-),男,湖北黄冈人,武汉大学博士生,主要研究方向为云存储安全等。" ]
[ "黄传河(1963-),男,湖北随州人,武汉大学教授、博士生导师,主要研究方向为云计算、移动互联网、移动ad hoc网络、无线传感器网络、无线mesh网络、物联网、网络安全、分布并行处理。" ]
[ "王小毛(1984-),男,湖北天门人,武汉大学博士生,主要研究方向为移动ad hoc网络、计算机图形学等。" ]
[ "王晶(1986-),女,广西桂林人,武汉大学博士生,主要研究方向为云计算与物联网中的安全与隐私保护。" ]
[ "史姣丽(1979-),女,山西运城人,武汉大学博士生,主要研究方向为访问控制等。" ]
网络出版日期:2015-10,
纸质出版日期:2015-10-25
移动端阅览
何凯, 黄传河, 王小毛, 等. 云存储中数据完整性的聚合盲审计方法[J]. 通信学报, 2015,36(10):119-132.
Kai HE, Chuan-he HUANG, Xiao-mao WANG, et al. Aggregated privacy-preserving auditing for cloud data integrity[J]. Journal on communications, 2015, 36(10): 119-132.
何凯, 黄传河, 王小毛, 等. 云存储中数据完整性的聚合盲审计方法[J]. 通信学报, 2015,36(10):119-132. DOI: 10.11959/j.issn.1000-436x.2015267.
Kai HE, Chuan-he HUANG, Xiao-mao WANG, et al. Aggregated privacy-preserving auditing for cloud data integrity[J]. Journal on communications, 2015, 36(10): 119-132. DOI: 10.11959/j.issn.1000-436x.2015267.
针对云存储中数据完整性问题,提出了一种聚合盲审计方法。利用双线性对映射的性质,在云服务器端将数据证据和标签证据加密后再合并,实现审计者在不知数据内容的情况下进行盲审计。在此基础上,设计高效的索引机制支持数据更新,使数据更新操作不会导致大量额外的计算和通信开销,实现了动态审计。同时,针对多个审计请求,设计将不同的证据聚合的方法,以支持对多所有者多云服务器多文件的批量审计,使批量审计的通信开销与审计请求的数量无关。理论分析和实验结果表明,该方法是可证明安全的,与现有的其他审计方案相比,所提的单审计和批量审计的效率分别提高了21.5%和31.8%。
To solve the problem of data integrity in cloud storage
an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor
data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore
an efficient index mechanism was designed to support dynamic auditing
which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile
an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme
the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.
ARMBRUST M , FOX A , GRIFFITH A , et al . A view of cloud computing [J ] . Commun ACM , 2010 , 53 ( 4 ): 50 - 58 .
冯登国 , 张敏 , 张妍 , 等 . 云计算安全研究 [J ] . 软件学报 , 2011 , 22 ( 1 ): 71 - 83 .
FENG D G , ZHANG M , ZHANG Y , et al . Study on cloud computing security [J ] . Journal of Software , 2011 , 22 ( 1 ): 71 - 83 .
BAIRAVASUNDARAM L N , GOODSON G R , PASUPATHY S , et al . An analysis of latent sector errors in disk drives [A ] . Proc of ACM SIGMETRICS Int’l Conf Measurement and Modeling of Computer Systems [C ] . 2007 . 289 - 300 .
SCHROEDER B , GIBSON G A . disk failures in the real world:what does an MTTF of 1 000 000 hours mean to you [A ] . Proc of USENIX Conf File and Storage Technologies [C ] . 2007 . 1 - 16 .
WANG H , ZHANG Y . On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 1 ): 264 - 267 .
NI J , YU Y , Mu Y , et al . On the security of an efficient dynamic auditing protocol in cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 10 ): 2760 - 2761 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [A ] . Proc of the 14th ACM Conference on Computer and Communications Security [C ] . 2007 . 598 - 609 .
JUELS KALISKI B S . PORs:Proofs of retrievability for large files [A ] . Proc of ACM CCS [C ] . 2007 . 584 - 597 .
SHACHAM H , WATERS B . Compact proofs of retrievability [A ] . Proc of the 14th International Conference on the Theory and Application of Cryptology and Information Security,Advances in Cryptology,ASIACRYPT’08 [C ] . Berlin,Heidelberg , 2008 . 90 - 107 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public auditing for data storage security in cloud computing [A ] . Proc of IEEE INFOCOM [C ] . 2010 . 525 - 533 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
WANG C , WANG Q , REN K , et al . Toward secure and dependable storage services in cloud computing [J ] . IEEE Transactions on Services Computing , 2012 , 5 ( 2 ): 220 - 232 .
ZHU Y , HU H , AHN G J , et al . Cooperative provable data possession for integrity verification in multi-cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 12 ): 1 - 14 .
HE K , HUANG C H , WANG J H , et al . An efficient public batch auditing protocol for data security in multi-cloud storage [A ] . Proc of China Grid [C ] . 2013 . 51 - 56 .
YANG K , JIA X . An efficient and secure dynamic auditing protocol for data storage in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 24 ( 9 ): 1717 - 1726 .
ATENIESE G , PIETRO R D , MANCINI L V , et al . Scalable and efficient provable data possession [A ] . Proc of the 4th International Conference on Security and Privacy in Communication Networks [C ] . 2008 . 1 - 10 .
ERWAY C , KUPCCU A , PAPAMANTHOU C , et al . Dynamic provable data possession [A ] . Proc of the 16th ACM Conference on Computer and Communications Security [C ] . 2009 . 213 - 222 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamics for storage security in cloud computing [A ] . Proc of ESORICS [C ] . 2009 . 355 - 370 .
WANG Q , REN K , Yu S , et al . Dependable and secure sensor data storage with dynamic integrity assurance [J ] . ACM Transactions on Senor Networks(ToSN) , 2011 , 8 ( 1 ): 1 - 24 .
WANG C , WANG Q , REN K , et al . Enabling public verifiability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 5 ): 847 - 859 .
ZHU Y , WANG H , HU Z , et al . Dynamic audit services for integrity verification of outsourced storage in clouds [A ] . Proc of ACM Symposium on Applied Computing [C ] . 2011 . 1550 - 1557 .
ZHU Y , HU Z , AHN G J , et al . Dynamic audit services for outsourced storages in clouds [J ] . IEEE Transactions on Services Computing , 2013 , 6 ( 2 ): 227 - 238 .
BARSOUM A , HASAN A . Enabling dynamic data and indirect mutual trust for cloud computing storage systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2013 , 24 ( 12 ): 2375 - 2385 .
LIU C , CHEN J , YANG L , et al . Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 9 ): 2234 - 2244 .
WANG B , LI B , LI H . Panda:Public auditing for shared data with efficient user revocation in the cloud [J ] . IEEE Transactions on Services Computing , 2014 .
YUAN J , YU S . Efficient public integrity checking for cloud data sharing with multi-user modification [A ] . Proc of IEEE INFOCOM [C ] . 2014 . 2121 - 2129 .
0
浏览量
931
下载量
6
CSCD
关联资源
相关文章
相关作者
相关机构