浏览全部资源
扫码关注微信
1. 河北大学网络空间安全与计算机学院,河北 保定 071002
2. 河北省高可信信息系统重点实验室,河北 保定 071002
[ "田俊峰(1965- ),男,河北保定人,博士,河北大学教授、博士生导师,主要研究方向为信息安全与分布式计算。" ]
[ "柴梦佳(1993- ),女,河北保定人,河北大学硕士生,主要研究方向为信息安全与分布式计算。" ]
[ "齐鎏岭(1992- ),男,河北保定人,河北大学硕士生,主要研究方向为信息安全与分布式计算。" ]
网络出版日期:2019-03,
纸质出版日期:2019-03-25
移动端阅览
田俊峰, 柴梦佳, 齐鎏岭. 基于公有验证和私有验证的数据持有性验证方案[J]. 通信学报, 2019,40(3):48-59.
Junfeng TIAN, Mengjia CHAI, Liuling QI. Provable data possession scheme based on public verification and private verification[J]. Journal on communications, 2019, 40(3): 48-59.
田俊峰, 柴梦佳, 齐鎏岭. 基于公有验证和私有验证的数据持有性验证方案[J]. 通信学报, 2019,40(3):48-59. DOI: 10.11959/j.issn.1000-436x.2019053.
Junfeng TIAN, Mengjia CHAI, Liuling QI. Provable data possession scheme based on public verification and private verification[J]. Journal on communications, 2019, 40(3): 48-59. DOI: 10.11959/j.issn.1000-436x.2019053.
越来越多的用户愿意把数据存储在云存储系统中,数据安全是云存储系统面临的关键问题,为了保证存储在云中数据的完整性、有效性,数据持有性验证(PDP)就显得尤为重要。为了验证云存储服务提供商是否完整地存储了用户的数据,基于不可否认PDP(NRPDP)方案提出了一种新的数据持有性验证方案。该方案基于公有验证和私有验证,可以同时对云存储中服务提供商与用户的可信性进行验证,满足了验证的不可否认性。理论证明了该方案的不可否认性,实验验证了各阶段运行时间效率比现有的单一的公有验证方法或私有验证方法更优。
More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud
provable data possession (PDP) scheme is particularly important.In order to verify whether the cloud storage service provider had stored the data of the user completely
a scheme on the basis of NRPDP (non-repudiable PDP) was improved and extended
and a data retention scheme based on public authentication and private authentication was proposed.The scheme can verify the trustworthiness of the service provider and the user in the cloud storage at the same time
which satisfies the non-repudiation of the verification.The theory proves the non-repudiation of the proposed scheme.The experiment proves that the efficiency of each stage is better than that of the existing single public verification method or private authentication method.
王宏远 , 祝烈煌 , 李龙一佳 . 云存储中支持数据去重的群组数据持有性证明 [J ] . 软件学报 , 2016 , 27 ( 6 ): 1417 - 1431 .
WANG H Y , ZHU L H , LI L Y J . Group provable data possession with deduplication in cloud storage [J ] . Journal of Software , 2016 , 27 ( 6 ): 1417 - 1431 .
查雅行 , 罗守山 , 卞建超 , 等 . 基于多分支认证树的多用户多副本数据持有性证明方案 [J ] . 通信学报 , 2015 , 36 ( 11 ): 80 - 91 .
ZHA Y X , LUO S S , BIAN J C , et al . Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree [J ] . Journal on Communications , 2015 , 36 ( 11 ): 80 - 91 .
何凯 , 黄传河 , 王小毛 , 等 . 云存储中数据完整性的聚合盲审计方法 [J ] . 通信学报 , 2015 , 36 ( 10 ): 119 - 132 .
HE K , HUANG C H , WANG X M , et al . Aggregated privacy-preserving auditing for cloud data integrity [J ] . Journal on Communications , 2015 , 36 ( 10 ): 119 - 132 .
谭霜 , 贾焰 , 韩伟红 . 云存储中的数据完整性证明研究及进展 [J ] . 计算机学报 , 2015 , 38 ( 1 ): 164 - 177 .
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage [J ] . Chinese Journal of Computers , 2015 , 38 ( 1 ): 164 - 177 .
YUAN J , YU S . Efficient public integrity checking for cloud data sharing with multi-user modification [C ] // IEEE International Conference on Computer Communications . 2014 : 2121 - 2129 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Remote data checking using provable data possession [J ] . ACM Transactions on Information & System Security , 2011 , 14 ( 1 ):12.
JUELS A , KALISKI B S , BOWERS K D , et al . Proof of retrievability for archived files,US 8381062 B1 [P ] . 2013 .
ARMKNECHT F , BOHLI J M , KARAME G O , et al . Outsourced proofs of retrievability [C ] // SIGSAC Conference on Computer and Communications Security . 2014 : 831 - 843 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // ACM Conference on Computer and Communications Security . 2007 : 598 - 609 .
DAN B , LYNN B , SHACHAM H . Short signatures from the weil pairing [J ] . Journal of Cryptology , 2004 , 17 ( 4 ): 297 - 319 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamics for storage security in cloud computing [C ] // European Conference on Research in Computer Security . 2009 : 355 - 370 .
WANG C , CHOW S S M , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
CURTMOLA R , KHAN O , BURNS R . Robust remote data checking [C ] // ACM Workshop on Storage Security and Survivability . 2008 : 63 - 68 .
WANG H , ZHU L , XU C , et al . A universal method for realizing non-repudiable provable data possession in cloud storage [J ] . Security& Communication Networks , 2016 , 9 ( 14 ): 2291 - 2301 .
HANSER C , SLAMANIG D . Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves [C ] // International Conference on Security and Cryptography . 2015 : 15 - 26 .
赵曼 , 徐和根 , 马峰 . 基于椭圆曲线密码(ECC)算法的图像加密技术的硬件设计 [C ] // 中国通信学会学术年会 . 2012 : 18 - 21 .
ZHAO M , XU H G , MA F . Hardware design based on elliptic curve cryptography (ECC) algorithm for image encryption technology [C ] // Annual Meeting of China Institute of Communications . 2012 : 18 - 21 .
PEDERSEN T P , . Non-interactive and information-theoretic secure verifiable secret sharing [C ] // International Cryptology Conference on Advances in Cryptology . 1991 : 129 - 140 .
PEDERSEN T P , . Non-interactive and information theoretic secure verifiable secret sharing [C ] // International Cryptology Conference on Advances in Cryptology . 1991 .
DENT A W . The hardness of the DHK problem in the generic group model [J ] . IACR Cryptology ePrint Archive , 2006 :156.
MO Z , ZHOU Y , CHEN S , et al . Enabling non-repudiable data possession verification in cloud storage systems [C ] // IEEE International Conference on Cloud Computing . 2014 : 232 - 239 .
MCCURLEY K S , . The discrete logarithm problem [C ] // Symposium in Applied Math . 1990 : 49 - 74 .
0
浏览量
944
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构