浏览全部资源
扫码关注微信
1. 解放军信息工程大学数据与目标工程学院,河南 郑州 450001
2. 解放军61660部队,北京 100089
[ "陈越(1965-),男,河南开封人,博士,解放军信息工程大学教授、博士生导师,主要研究方向为网络与信息安全。" ]
[ "王龙江(1991-),男,陕西商洛人,解放军信息工程大学硕士生,解放军61660部队助理工程师,主要研究方向为网络信息安全、云存储安全等。" ]
[ "严新成(1991-),男,河南信阳人,解放军信息工程大学博士生,主要研究方向为网络信息安全、云存储安全、云数据访问控制。" ]
[ "张馨月(1994-),女,满族,吉林通化人,解放军信息工程大学硕士生,主要研究方向为云数据访问控制。" ]
网络出版日期:2018-04,
纸质出版日期:2018-04-25
移动端阅览
陈越, 王龙江, 严新成, 等. 基于再生码的拟态数据存储方案[J]. 通信学报, 2018,39(4):21-34.
Yue CHEN, Longjiang WANG, Xincheng YAN, et al. Mimic storage scheme based on regenerated code[J]. Journal on communications, 2018, 39(4): 21-34.
陈越, 王龙江, 严新成, 等. 基于再生码的拟态数据存储方案[J]. 通信学报, 2018,39(4):21-34. DOI: 10.11959/j.issn.1000-436x.2018066.
Yue CHEN, Longjiang WANG, Xincheng YAN, et al. Mimic storage scheme based on regenerated code[J]. Journal on communications, 2018, 39(4): 21-34. DOI: 10.11959/j.issn.1000-436x.2018066.
针对云存储系统由于静态的存储架构和存储模式而带来的安全威胁,提出一种基于再生码的拟态化存储方案。该方案利用网络编码方案将数据存储在云端数据节点上,采用一种基于再生码的拟态变换机制,可根据随机时变因素动态地改变数据的存储状态,且能够保证数据完整性和数据持续可用性。拟态变换机制具有随机性、时变性和动态性,通过增加存储系统的不确定性,可阻断和干扰攻击链,增加了攻击者实施攻击的难度和成本,提高了系统的安全性和可靠性。
Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode
a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node
and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors
which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random
time-varying and dynamic scheme
which increases the uncertainty of storage system.It blocks and interferes with the attack chain
increases the difficulty and cost of the attack operation
and improves the security and reliability of the system.
PALANKAR M R , IAMNITCHI A , RIPEANU M , et al . Amazon S3 for science grids:a viable solution? [C ] // The 2008 International Workshop on Data-aware Distributed Computing . 2008 : 55 - 64 .
CALDER B , WANG J , OGUS A , et al . Windows azure storage:a highly available cloud storage service with strong consistency [C ] // The Twenty-Third ACM Symposium on Operating Systems Principles . 2011 : 143 - 157 .
MCKUSICK K , QUINLAN S . GFS:evolution on fast-forward [J ] . Communications of the ACM , 2010 , 53 ( 3 ): 42 - 49 .
SHVACHKO K , KUANG H , RADIA S , et al . The Hadoop distributed file system [C ] // MASS Storage Systems and Technologies . 2010 : 1 - 10 .
罗象宏 , 舒继武 . 存储系统中的纠删码研究综述 [J ] . 计算机研究与发展 , 2012 , 49 ( 1 ): 1 - 11 .
LUO X H , SHU J W . Summary of research for erasure code in storage system [J ] . Journal of Computer Research and Development , 2012 , 49 ( 1 ): 1 - 11 .
邬江兴 . 网络空间拟态安全防御 [J ] . 保密科学技术 , 2014 ( 10 ): 4 - 10 .
WU J X . Cyber minic security defense [J ] . Secrecy Science and Technology , 2014 ( 10 ): 4 - 10 .
邬江兴 , 张帆 , 罗兴国 , 等 . 拟态计算与拟态安全防御 [J ] . 计算机学会通讯 , 2015 , 11 ( 1 ): 8 - 14 .
WU J X , ZHANG F , LUO X G , et al . The meaning and vision of minic computing and minic security defense [J ] . Communications of CCF , 2015 , 11 ( 1 ): 8 - 14 .
邬江兴 . 网络空间拟态防御研究 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 1 - 10 .
WU J X . Research on cyber mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
罗兴国 , 仝青 , 张铮 , 等 . 拟态防御技术 [J ] . 中国工程科学 , 2016 , 18 ( 6 ): 69 - 73 .
LUO X G , TONG Q , ZHANG Z , et al . Mimic defense technology [J ] . Engineering Sciences , 2016 , 18 ( 6 ): 69 - 73 .
斯雪明 , 王伟 , 曾俊杰 , 等 . 拟态防御基础理论研究综述 [J ] . 中国工程科学 , 2016 , 18 ( 6 ): 62 - 68 .
SI X M , WANG W , ZENG J J , et al . A review of the basic theory of mimic defense [J ] . Engineering Sciences , 2016 , 18 ( 6 ): 62 - 68 .
庞建民 , 张宇嘉 , 张铮 , 等 . 拟态防御技术结合软件多样化在软件安全产业中的应用 [J ] . 中国工程科学 , 2016 , 18 ( 6 ): 74 - 78 .
PANG J M , ZHANG Y J , ZHANG Z , et al . Applying a combination of mimic defense and software diversity in the software security industry [J ] . Engineering Sciences , 2016 , 18 ( 6 ): 74 - 78 .
邬江兴 . 专题导读—拟态计算与拟态安全防御的原意和愿景 [J ] . 电信科学 , 2014 , 30 ( 7 ): 1 - 7 .
WU J X . Meaning and vision of mimic computing and mimic security defense [J ] . Telecommunications Science , 2014 , 30 ( 7 ): 1 - 7 .
吴春明 . 动态网络主动安全防御的若干思考 [J ] . 中兴通讯技术 , 2016 ( 1 ): 34 - 37 .
WU C M . Proactive security defense of dynamic network [J ] . ZTE Technology Journal , 2016 ( 1 ): 34 - 37 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御 Web 服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
张铮 , 马博林 , 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 13 - 28 .
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in web servers [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 13 - 28 .
HU Y , LEE P P C , SHUM K W . Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems [C ] // IEEE INFOCOM . 2012 : 2355 - 2363 .
TRACEY H , MURIEL M . On randomized network coding [C ] // The Annual Allerton Conference on Communication Control and Computing . 2003 ( 3 ): 11 - 20 .
MOSHKOVITZ D . An alternative proof of the schwartz-zippel lemma [J ] . Electronic Colloquium on Computational Complexity , 2010 ,17.
PLANK J . S.Jerasure:a libraryin C/C++ facilitating erasure coding for storage applications-version 1.2,UT-CS-08-627 [R ] . Department of Computer Science,University of Tennessee , 2008 .
0
浏览量
1279
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构