浏览全部资源
扫码关注微信
1. 西安工业大学理学院,陕西 西安 710021
2. 西安电子科技大学数学与统计学院,陕西 西安 710071
[ "张襄松(1980- ),女,河南南阳人,博士,西安工业大学副教授,主要研究方向为信息科学中的安全与优化问题。" ]
[ "李晨(1992- ),女,河北石家庄人,西安电子科技大学硕士生,主要研究方向为密态数据去重与审计。" ]
[ "刘振华(1978- ),男,河南信阳人,博士,西安电子科技大学教授、硕士生导师,主要研究方向为密态数据的计算。" ]
网络出版日期:2019-04,
纸质出版日期:2019-04-25
移动端阅览
张襄松, 李晨, 刘振华. 抗密钥泄露的支持密态数据去重的完整性审计方案[J]. 通信学报, 2019,40(4):95-106.
Xiangsong ZHANG, Chen LI, Zhenhua LIU. Key-exposure resilient integrity auditing scheme with encrypted data deduplication[J]. Journal on communications, 2019, 40(4): 95-106.
张襄松, 李晨, 刘振华. 抗密钥泄露的支持密态数据去重的完整性审计方案[J]. 通信学报, 2019,40(4):95-106. DOI: 10.11959/j.issn.1000-436x.2019076.
Xiangsong ZHANG, Chen LI, Zhenhua LIU. Key-exposure resilient integrity auditing scheme with encrypted data deduplication[J]. Journal on communications, 2019, 40(4): 95-106. DOI: 10.11959/j.issn.1000-436x.2019076.
针对云存储环境中密钥泄露、数据重复和完整性检验的问题,提出了一种支持密钥更新和密文数据去重的完整性审计方案。所提方案利用布隆过滤器实现了密态数据的客户端去重,且每一次密钥更新能保证更新结果不能由其余时间周期的密钥猜测得到。该方案首次解决了在支持密态数据去重的审计方案中密钥更新困难的问题。安全性分析表明,所提方案在随机预言机模型下基于计算性Diffie-Hellman困难问题假设具有强抗密钥泄露、机密性、可检测性以及认证标签和证明值的不可伪造性。
For the problems of key-exposure
encrypted data duplication and integrity auditing in cloud data storage
a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters
the proposed scheme could achieve client-side deduplication
and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient
confidentiality
detectability
and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.
谭霜 , 贾焰 , 韩伟红 . 云存储中的数据完整性证明研究及进展 [J ] . 计算机学报 , 2015 , 38 ( 1 ): 164 - 177 .
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage [J ] . Chinese Journal of Computers , 2015 , 38 ( 1 ): 164 - 177 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamics for storage security in cloud computing [C ] // The 14th European Symposium on Research in Computer Security . 2009 : 355 - 370 .
冯登国 , 张敏 , 张妍 , 等 . 云计算安全研究 [J ] . 软件学报 , 2011 , 22 ( 1 ): 71 - 83 .
FENG D G , ZHANG M , ZHANG Y , et al . Study on cloud computing security [J ] . Journal of Software , 2011 , 22 ( 1 ): 71 - 83 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // The ACM Conference on Computer and Communications Security . ACM , 2007 : 598 - 609 .
JUELS A , KALISKI B S . Pors:proofs of retrievability for large files [C ] // The 14th ACM Conference on Computer and Communications Security . ACM , 2007 : 584 - 597 .
熊金波 , 张媛媛 , 李凤华 , 等 . 云环境中数据安全去重研究进展 [J ] . 通信学报 , 2016 , 37 ( 11 ): 169 - 180 .
XIONG J B , ZHANG Y Y , LI F H , et al . Research progress on secure data deduplication in cloud [J ] . Journal on Communications , 2016 , 37 ( 11 ): 169 - 180 .
熊金波 , 张媛媛 , 田有亮 , 等 . 基于角色对称加密的云数据安全去重 [J ] . 通信学报 , 2018 , 39 ( 5 ): 59 - 73 .
XIONG J B , ZHANG Y Y , TIAN Y L , et al . Cloud data secure deduplication scheme via role-based symmetric encryption [J ] . Journal on Communications , 2018 , 39 ( 5 ): 59 - 73 .
郭晓勇 , 付安民 , 况博裕 , 等 . 基于收敛加密的云安全去重与完整性审计系统 [J ] . 通信学报 , 2017 , 38 ( Z2 ): 156 - 163 .
GUO X Y , FU A M , KUANG B Y , et al . Secure deduplication and integrity audit system based on convergent encryption for cloud storage [J ] . Journal on Communications , 2017 , 38 ( Z2 ): 156 - 163 .
熊金波 , 李素萍 , 张媛媛 , 等 . 共享所有权证明:协作云数据安全去重新方法 [J ] . 通信学报 , 2017 , 38 ( 7 ): 18 - 27 .
XIONG J B , LI S P , ZHANG Y Y , et al . PoSW:novel secure deduplication scheme for collaborative cloud applications [J ] . Journal on Communications , 2017 , 38 ( 7 ): 18 - 27 .
杨超 , 纪倩 , 熊思纯 , 等 . 新的云存储文件去重复删除方法 [J ] . 通信学报 , 2017 , 38 ( 3 ): 25 - 33 .
YANG C , JI Q , XIONG S C , et al . New method for file deduplication in cloud storage [J ] . Journal on Communications , 2017 , 38 ( 3 ): 25 - 33 .
YUAN J , YU S . Secure and constant cost public cloud storage auditing with deduplication [C ] // The 1st IEEE Conference on Communications and Network Security . IEEE , 2013 : 145 - 153 .
LI J , LI J , XIE D , et al . Secure auditing and deduplicating data in cloud [J ] . IEEE Transactions on Computers , 2016 , 65 ( 8 ): 2386 - 2396 .
KIRAZ M S . Solving the secure storage dilemma:an efficient scheme for secure deduplication with privacy-preserving public auditing [J ] . IACR Cryptology ePrint Archive , 2016 :696.
YU J , REN K , WANG C , et al . Enabling cloud storage auditing with key-exposure resistance [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 10 ( 6 ): 1167 - 1179 .
YU J , WANG H . Strong key-exposure resilient auditing for secure cloud storage [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 8 ): 1931 - 1940 .
CHATTERJEE S , SARKAR P . Identity-based encryption [M ] . Boston : Springer Science & Business MediaPress , 2011 : 29 - 48 .
BLOOM B H . Space/time trade-offs in hash coding with allowable errors [J ] . Communications of the ACM , 1970 , 13 ( 7 ): 422 - 426 .
BLASCO J , PIETRO R D , ORFILA A , et al . A tunable proof of ownership scheme for deduplication using Bloom filters [C ] // The IEEE Conference on Communications and Network Security . IEEE , 2014 : 481 - 489 .
WANG C , CHOW S S , WANG Q , et al . Privacy-preserving publicauditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
0
浏览量
976
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构