浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院、软件学院、网络空间安全学院,江苏 南京 210003
2. 江苏省无线传感网高技术研究重点实验室,江苏 南京 210003
[ "王少辉(1977−),男,山东潍坊人,博士,南京邮电大学副教授,主要研究方向为密码学、信息安全。" ]
[ "潘笑笑(1993−),男,安徽宿州人,南京邮电大学硕士生,主要研究方向为云安全。" ]
[ "王志伟(1976−),男,江苏扬州人,博士,南京邮电大学教授,主要研究方向为信息安全、密码学。" ]
[ "肖甫(1980−),男,湖南邵阳人,博士,南京邮电大学副教授,主要研究方向为无线传感器网络、信息安全等。" ]
[ "王汝传(1943−),男,安徽合肥人,博士,南京邮电大学教授,主要研究方向为信息安全、无线传感器网络等。" ]
网络出版日期:2018-11,
纸质出版日期:2018-11-25
移动端阅览
王少辉, 潘笑笑, 王志伟, 等. 对基于身份云数据完整性验证方案的分析与改进[J]. 通信学报, 2018,39(11):98-105.
Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, et al. Analysis and improvement on identity-based cloud data integrity verification scheme[J]. Journal on communications, 2018, 39(11): 98-105.
王少辉, 潘笑笑, 王志伟, 等. 对基于身份云数据完整性验证方案的分析与改进[J]. 通信学报, 2018,39(11):98-105. DOI: 10.11959/j.issn.1000-436x.2018229.
Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, et al. Analysis and improvement on identity-based cloud data integrity verification scheme[J]. Journal on communications, 2018, 39(11): 98-105. DOI: 10.11959/j.issn.1000-436x.2018229.
个人或企业将数据外包给远程云服务器,在获得运营便利的同时也失去了对数据的本地控制权,无法直接保证数据的完整性和隐私性。分析了Zhang等和Xu等提出的基于身份云数据完整性验证方案的安全性。分析表明Zhang等所提方案易遭受密钥恢复攻击,云服务器利用存储的用户数据可恢复出用户的私钥,而Xu等所提方案不能满足健壮性的安全要求。在Xu等方案的基础上,提出了一个改进的云数据完整性验证方案,分析表明新方案可提供健壮性和隐私性的安全需求,并且可提供与Xu等所提方案相同的通信和计算开销。
Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience
but data owners no longer physically control over the stored data
which introduces new security challenges
such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'s scheme
a modified identity-based cloud data integrity verification scheme is proposed.A comprehensive analysis shows the new scheme can provide the security requirements of soundness and privacy
and has the same communication overhead and computational cost as Xu et al.’s scheme.
DESWARTE Y , QUISQUATER J , SAIDANE A . Remote integrity checking [M ] // Integrity and Internal Control in Information Systems VI . 2004 : 1 - 11 .
OPREA A , REITER M K , YANG K . Space-efficient block storage integrity [C ] // Internet Society,Network and Distributed System Security Symposium . 2005 : 1 - 12 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // ACM Conference on Computer and Communications Security . 2007 : 598 - 609 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Remote data checking using Provable data possession [J ] . ACM Transactions on Information & System Security(TISSEC) , 2011 , 14 ( 1 ): 1 - 34 .
JUELS A , . Pors:proofs of retrievability for large files [C ] // ACM Conference on Computer and Communications Security . 2007 : 584 - 597 .
SHACHAM H , WATERS B . Compact proofs of retrievability [C ] // Asiacrypt LNCS 5350 . 2008 : 90 - 107 .
SHACHAM H , WATERS B . Compact proofs of retrievability [J ] . Journal of Cryptology , 2013 , 26 ( 3 ): 442 - 483 .
SHAMIR A , . Identity-based cryptosystems and signature schemes [C ] // Crypto . 1984 : 47 - 53 .
BONEH D , FRANKLIN M K . Identity based encryption from the weil pairing [J ] . Siam Journal on Computing , 2001 , 32 ( 3 ): 213 - 229 .
ZHANG J , DONG Q . Efficient ID-based public auditing for the outsourced data in cloud storage [J ] . Information Sciences , 2016 , 343-344(C) : 1 - 14 .
YU Y , XUE L , MAN H A , et al . Cloud data integrity checking with an identity-based auditing mechanism from RSA [J ] . Future Generation Computer Systems , 2016 , 62 ( C ): 85 - 91 .
ZHANG J , LI P , SUN Z , et al . ID-based data integrity auditing scheme from RSA with resisting key exposure [C ] // International Conference on Provable Security . 2016 : 83 - 100 .
XU Z , WU L , KHAN M K , et al . A secure and efficient public auditing scheme using RSA algorithm for cloud storage [J ] . Journal of Supercomputing , 2017 ( 4 ): 1 - 25 .
0
浏览量
688
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构