浏览全部资源
扫码关注微信
1. 国防科技大学计算机学院,湖南 长沙 410073
2. 密码科学技术国家重点实验室,北京100878
[ "刘云飞(1985-),男,河南睢县人,国防科技大学硕士生,主要研究方向为网络安全。" ]
[ "王勇军(1971-),男,江西高安人,博士,国防科技大学教授,主要研究方向为网络安全、系统安全等。" ]
[ "付绍静(1984-),男,江西玉山人,博士,国防科技大学副教授,主要研究方向为密码学。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
刘云飞, 王勇军, 付绍静. 面向云端群组数据的轻量级完整性验证方案[J]. 通信学报, 2016,37(Z1):140-146.
Yun-fei LIU, Yong-jun WANG, UShao-jing F. Lightweight integrity verification scheme for cloud based group data[J]. Journal on communications, 2016, 37(Z1): 140-146.
刘云飞, 王勇军, 付绍静. 面向云端群组数据的轻量级完整性验证方案[J]. 通信学报, 2016,37(Z1):140-146. DOI: 10.11959/j.issn.1000-436x.2016260.
Yun-fei LIU, Yong-jun WANG, UShao-jing F. Lightweight integrity verification scheme for cloud based group data[J]. Journal on communications, 2016, 37(Z1): 140-146. DOI: 10.11959/j.issn.1000-436x.2016260.
为保护群组用户存储在云中的数据安全,设计了一个可以保护群组用户隐私的数据完整性验证方案。该方案可以高效地检测存储在云中的群组共享数据,并支持数据的动态更新,利用环签名的特性来隐藏数据块所对应的签名者的身份。也就是说,第三方验证者无法在验证时窥探到用户身份等隐私信息。通过使用聚合的方法生成数据标签,减少了标签的存储开销,同时支持群组数据的动态操作,使群组中的用户可以轻松的修改云中的群组数据。
In order to protect the security of the data stored in the cloud by group users
a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data
and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is
the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels
which reduces the storage cost of labels and supports the dynamic operation of group data
so that the users in the group can easily modify the cloud group data.
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data pos-session at untrusted stores[C]//ACM CCS . 2007 : 598 - 610 .
ATENIESE G , KAMARA S , KATZ J . Proofs of storage from homomorphic identification protocols[C]//ASIACRYPT 2009 : 319 - 333 .
BONEH D , LYNN B , SHACHAM H . Short signature from the weil pairing[C]//ASIACRYPT 2001 . 2001 : 514 - 532 .
SHACHAM H , WATERS B . Compact proofs of retrievability[C]//ASIACRYPT 2008 . 2008 : 90 - 107 .
ATENIESE G , PIETRO R D , MANCINI L V , et al . Scalable and efficient provable data possession[C]//4th ICST SecureComm . 2008 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamic for storage security in cloud computing[C]//ESORICS 2009 . 2009 : 355 - 370 .
ERWAY C , KUPCU A , PAPAMANTHOU C , et al . Dynamic provable data possession[C]//Proceedings of ACM CCS . 2009 : 213 - 222 .
ZHU Y , WANG H , HU Z , et al . Dynamic audit services for integrity verification of outsourced storage in cloud[C]//ACM SAC . 2011 : 1550 - 1557 .
ZHU Y , AHN G J , HU H , et al . Dynamic audit services for outsourced storage in clouds[C]//IEEE Transactions on Services Computing , 2013 , 6 ( 99 ): 1 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public audit-ing for data storage security in cloud computing[C]//IEEE INFOCOM . 2010 : 525 - 533 .
WANG C , CHOW S S , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
BONEH D , GENTRY C , LYNN B , et al . Aggregate and verifiably encrypted signatures from bilinear maps[C]//EUROCRYPT 2003 . 2003 : 416 - 432 .
ZHU Y , WANG H , HU Z , et al . Poster:efficient provable data posses-sion for hybird clouds[C]//ACM CCS . 2010 .
TATE S R , VISHWANATHAN R , EVERHART L . Multi-user dy-namic proofs of data possession using trusted hardware[C]//ACM CODASPY . 2013 : 353 - 364 .
WANG B , LI B , LI H . Oruta:privacy-preserving public auditing for shared data in the cloud[C]//IEEE 5th International Conference on Cloud Computing (CLOUD'12) . Piscataway , NJ:IEEE , 2012 : 295 - 302 .
WANG B , LI B , LI H . Knox:privacy-preserving auditing for shared data with large groups in the cloud[C]//10th International Conference on Applied Cryptography and Network Security (ACNS'12) . 2012 : 507 - 525 .
WANG B , LI B , LI H . Public auditing for shared data with efficient user revocation in the cloud[C]//2013 IEEE International Conference on Computer Communication (INFOCOM'13) . Los Alamitos , 2013 : 2904 - 2912 .
0
浏览量
514
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构