浏览全部资源
扫码关注微信
1. 西安电子科技大学综合业务网理论与关键技术国家重点实验室,陕西 西安 710071
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
3. 北京电子科技学院信息安全研究所,北京 100070
[ "李昊星(1982-),男,满族,河南方城人,西安电子科技大学博士生,主要研究方向为网络与系统安全、云数据安全。" ]
[ "李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工、研究员、博士生导师,主要研究方向为网络与系统安全、信息保护、隐私计算。" ]
[ "宋承根(1987-),男,贵州锦屏人,博士,北京电子科技学院讲师,主要研究方向为信息安全、密码学。" ]
[ "阎亚龙(1976-),男,山西兴县人,北京电子科技学院高级工程师,主要研究方向为信息安全工程。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
李昊星, 李凤华, 宋承根, 等. 支持身份认证的数据持有性证明方案[J]. 通信学报, 2016,37(10):117-127.
Hao-xing LI, Feng-hua LI, Cheng-gen SONG, et al. Provable data possession scheme with authentication[J]. Journal on communications, 2016, 37(10): 117-127.
李昊星, 李凤华, 宋承根, 等. 支持身份认证的数据持有性证明方案[J]. 通信学报, 2016,37(10):117-127. DOI: 10.11959/j.issn.1000-436x.2016203.
Hao-xing LI, Feng-hua LI, Cheng-gen SONG, et al. Provable data possession scheme with authentication[J]. Journal on communications, 2016, 37(10): 117-127. DOI: 10.11959/j.issn.1000-436x.2016203.
针对云应用场景中身份认证和数据持有性证明的双重需求,提出一种支持身份认证的数据持有性证明方案。基于数据标签签名和随机数复用,新方案通过3次交互即可实现用户对云持有数据的完整性验证、用户与云服务器之间的双向身份认证以及会话密钥协商与确认。与使用认证密钥协商和数据持有性证明的组合方案相比,新方案具有较少的运算量和交互轮次以及可证明的安全性。在随机预言机模型下,基于计算性 Diffie-Hellman 问题假设,给出方案的安全性证明。
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios
a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing
the proposed scheme could accomplish several issues with three interactions
including the possession proof of cloud data
the mutual authentication between user and cloud computing server
the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes
the proposed scheme has less computation and interactions
and better provable securities.In the random oracle model
the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.
BUYYA R , YEO C S , VENUGOPAL S , et al . Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility [J ] . Future Generation Computer Systems , 2009 , 25 ( 6 ): 599 - 616 .
WU J , SHEN Q , WANG T , et al . Recent advances in cloud security [J ] . Journal of Computers , 2014 , 5 ( 10 ): 2156 - 2163 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . ACM , 2007 : 598 - 609 .
BOWERS K D , JUELS A , OPREA A . Proofs of retrievability:theory and implementation [C ] // ACM Cloud Computing Security Workshop,CCSW 2009 . Chicago,Il,USA , 2009 : 43 - 54 .
CHOUDHURY A J , KUMAR P , SAIN M , et al . A strong user authentication framework for cloud computing [C ] // IEEE Asia-Pacific Services Computing Conference . Jeju,Korea , 2011 : 110 - 115 .
LIU C , CHEN J , YANG L T , et al . Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates [J ] . IEEE Transactions on Parallel & Distributed Systems , 2014 , 25 ( 9 ): 2234 - 2244 .
GRITTI C , SUSILO W , PLANTARD T . Efficient dynamic provable data possession with public verifiability and data privacy [M ] // Information Security and Privacy . Springer International Publishing , 2015 : 395 - 412 .
WANG B , LI B , LI H . Panda:public auditing for shared data with efficient user revocation in the cloud [J ] . IEEE Transactions on Services Computing , 2015 ( 1 ): 92 - 106 .
SHEN S T , ZENG W G . Delegable provable data possession for remote data in the clouds [M ] // Information and Communications Security . Springer Berlin Heidelberg , 2011 : 93 - 111 .
WANG H . Proxy provable data possession in public clouds [J ] . IEEE Transactions on Services Computing , 2013 , 6 ( 4 ): 551 - 559 .
RUAN H M , LEI C L . Fine-grained audit privilege control for integrity audit on cloud storage [C ] // 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS) . IEEE , 2014 : 156 - 163 .
XU J , CHEN W , JI S , et al . A novel preserving client privacy and designate verifier auditing scheme for cloud storage [J ] . International Journal of Security and Its Applications , 2015 , 9 ( 1 ): 295 - 304 .
NIMMY K , SETHUMADHAVAN M . Novel mutual authentication protocol for cloud computing using secret sharing and steganography [C ] // Applications of Digital Information and Web Technologies . IEEE , 2014 : 101 - 106 .
HAO Z , ZHONG S , YU N , et al . A time-bound ticket-based mutual authentication scheme for cloud computing [J ] . International Journal of Computers Communications & Control , 2011 ,( VI2 ): 227 - 235 .
HUANG J J , JUANG W S , FAN C I , et al . Robust and privacy protection authentication in cloud computing [J ] . International Journal of Innovative Computing,Information and Control , 2013 , 9 ( 11 ): 4247 - 4261 .
NAGARAJU S , PARTHIBAN L . SecAuthn:provably secure multifactor authentication for the cloud computing systems [J ] . Indian Journal of Science and Technology , 2016 , 9 ( 9 ).
HAHN C , KWON H , KIM D , et al . Enhanced authentication for outsourced educational contents through provable block possession [J ] . Multimedia Tools & Applications , 2015 , 23 : 1 - 20 .
CREMERS C , FELTZ M . Beyond eCK:perfect forward secrecy under actor compromise and ephemeral-key reveal [J ] . Designs,Codes and Cryptography , 2015 , 74 ( 1 ): 183 - 218 .
KRAWCZYK H , . HMQV:a high-performance secure Diffie-Hellman protocol [C ] // Advances in Cryptology–CRYPTO 2005 . Springer Berlin Heidelberg , 2005 : 546 - 566 .
SCOTT M , . MIRACL-multiprecision integer and rational arithmetic C/C++ library(1988-2007) [EB/OL ] . http://www3.cs.stonybrook.edu/~algorith/implement/shamus/distrib/ miracl3.zip http://www3.cs.stonybrook.edu/~algorith/implement/shamus/distrib/ miracl3.zip .
0
浏览量
714
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构