浏览全部资源
扫码关注微信
1. 西安文理学院信息工程学院,陕西 西安 710065
2. 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
3. 福建师范大学数学与信息学院,福建 福州 350117
4. 福州大学数学与计算机科学学院,福建 福州 350108
5. 英国纽卡斯尔大学计算机学院,纽卡斯尔 NE4 5TG
[ "刘光军(1980− ),男,安徽六安人,博士,西安文理学院副教授,主要研究方向为密码学与编码理论、网络编码、安全编码计算等" ]
[ "郭网媚(1984− ),女,陕西周至人,博士,西安电子科技大学副教授、博士生导师,主要研究方向为网络编码、无线通信等" ]
[ "熊金波(1981− ),男,湖南益阳人,博士,福建师范大学教授,主要研究方向为安全深度学习、移动群智感知、隐私保护技术等" ]
[ "刘西蒙(1988− ),男,陕西西安人,博士,福州大学研究员,主要研究方向为隐私计算、密文数据挖掘、大数据隐私保护、可搜索加密等" ]
[ "董长宇(1977− ),男,黑龙江齐齐哈尔人,博士,纽卡斯尔大学教授、博士生导师,主要研究方向为可搜索加密、隐私保护、人工智能安全等" ]
网络出版日期:2021-07,
纸质出版日期:2021-07-25
移动端阅览
刘光军, 郭网媚, 熊金波, 等. 适用于再生编码分布式存储的轻量型隐私保护审计方案[J]. 通信学报, 2021,42(7):220-230.
Guangjun LIU, Wangmei GUO, Jinbo XIONG, et al. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage[J]. Journal on communications, 2021, 42(7): 220-230.
刘光军, 郭网媚, 熊金波, 等. 适用于再生编码分布式存储的轻量型隐私保护审计方案[J]. 通信学报, 2021,42(7):220-230. DOI: 10.11959/j.issn.1000-436x.2021116.
Guangjun LIU, Wangmei GUO, Jinbo XIONG, et al. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage[J]. Journal on communications, 2021, 42(7): 220-230. DOI: 10.11959/j.issn.1000-436x.2021116.
为了降低面向再生编码分布式存储系统的外包数据审计机制的安全实现开销,提出了一种正交化代数编码方法,以此构造一类基于线性同态认证的轻量型隐私保护审计方案。利用文件编码数据与私有密钥向量的正交化构造外包存储向量的同态认证标签,并提出利用密钥特定分量的正交基向量组的随机化掩码来完成审计响应消息的隐私保护,实现代数编码、隐私保护和安全审计的高效融合。理论分析表明,所提方案在再生编码分布式存储应用中可实现信息理论意义下的安全性。与现有同类工作相比,该方案计算复杂度低,通信开销小,具有更好的性能优势。
To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems
an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector
and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding
privacy protection
and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works
the proposed scheme is of low computational complexity and communication overhead
and better performance advantages.
NACHIAPPAN R , JAVADI B , CALHEIROS R N , et al . Cloud storage reliability for big data applications:a state of the art survey [J ] . Journal of Network and Computer Applications , 2017 , 97 : 35 - 47 .
BALAJI S B , KRISHNAN M N , VAJHA M , et al . Erasure coding for distributed storage:an overview [J ] . Science China Information Sciences , 2018 , 61 ( 10 ): 1 - 45 .
THAKUR N , SINGH A , SANGAL A L . Data integrity authentication techniques in cloud computing:a survey [C ] // Soft Computing:Theories and Applications . Berlin:Springer , 2020 : 1255 - 1267 .
王意洁 , 许方亮 , 裴晓强 . 分布式存储中的纠删码容错技术研究 [J ] . 计算机学报 , 2017 ( 1 ): 236 - 255 .
WANG Y J , XU F L , PEI X Q . Research on error code-based fault-tolerant technology for distributed storage [J ] . Chinese Journal of Computers , 2017 ( 1 ): 236 - 255 .
ZHOU L , FU A M , YU S , et al . Data integrity verification of the outsourced big data in the cloud environment:a survey [J ] . Journal of Network and Computer Applications , 2018 , 122 : 1 - 15 .
ARMKNECHT F , BOHLI J M , KARAME G , et al . Outsourcing proofs of retrievability [J ] . IEEE Transactions on Cloud Computing , 2021 , 9 ( 1 ): 286 - 301 .
WANG H Q , HE D B , FU A M , et al . Provable data possession with outsourced data transfer [J ] . IEEE Transactions on Services Computing , 2019 , PP ( 99 ): 1 .
TAN C B , HIJAZI M H A , LIM Y , et al . A survey on proof of retrievability for cloud data integrity and availability:cloud storage state-of-the-art,issues,solutions and future trends [J ] . Journal of Network and Computer Applications , 2018 , 110 : 75 - 86 .
HAHN C , KWON H , KIM D , et al . Enabling fast public auditing and data dynamics in cloud services [J ] . IEEE Transactions on Services Computing , 2020 , PP ( 99 ): 1 .
WANG C , CHOW S S M , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
CHEN B , CURTMOLA R , ATENIESE G , et al . Remote data checking for network coding-based distributed storage systems [C ] // Proceedings of the 2010 ACM Workshop on Cloud computing Security Workshop . New York:ACM Press , 2010 : 31 - 42 .
CHEN H C H , LEE P P C . Enabling data integrity protection in regenerating-coding-based cloud storage:theory and implementation [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 2 ): 407 - 416 .
BOWERS K D , JUELS A , OPREA A . HAIL:a high-availability and integrity layer for cloud storage [C ] // Proceedings of the 16th ACM Conference on Computer and Communications Security . New York:ACM Press , 2009 : 187 - 198 .
CHEN H C H , HU Y C , LEE P P C , et al . NCCloud:a network-coding-based storage system in a cloud-of-clouds [J ] . IEEE Transactions on Computers , 2014 , 63 ( 1 ): 31 - 44 .
HE K , HUANG C H , SHI J L , et al . Public integrity auditing for dynamic regenerating code based cloud storage [C ] // 2016 IEEE Symposium on Computers and Communication . Piscataway:IEEE Press , 2016 : 581 - 588 .
REN Z W , WANG L N , WANG Q , et al . Dynamic proofs of retrievability for coded cloud storage systems [J ] . IEEE Transactions on Services Computing , 2018 , 11 ( 4 ): 685 - 698 .
LIU J , HUANG K , RONG H , et al . Privacy-preserving public auditing for regenerating-code-based cloud storage [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 7 ): 1513 - 1528 .
LE A , MARKOPOULOU A , DIMAKIS A G . Auditing for distributed storage systems [J ] . IEEE/ACM Transactions on Networking , 2016 , 24 ( 4 ): 2182 - 2195 .
VS L , PP D . A secure regenerating code-based cloud storage with efficient integrity verification [J ] . International Journal of Communication Systems , 2019 , 32 ( 9 ): e3948 .
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 1999 : 223 - 238 .
CHILLOTTI I , GAMA N , GEORGIEVA M , et al . TFHE:fast fully homomorphic encryption over the torus [J ] . Journal of Cryptology , 2020 , 33 ( 1 ): 34 - 91 .
LIU M P , JIANG R , KONG H F . Cryptanalysis and countermeasures on privacy-preserving public auditing for regenerating-code-based cloud storage [C ] // International Conference on Communication and Electronic Information Engineering . Dordrecht:Atlantis Press , 2016 : 275 - 283 .
陈越 , 王龙江 , 严新成 , 等 . 基于再生码的拟态数据存储方案 [J ] . 通信学报 , 2018 , 39 ( 4 ): 21 - 34 .
CHEN Y , WANG L J , YAN X C , et al . Mimic storage scheme based on regenerated code [J ] . Journal on Communications , 2018 , 39 ( 4 ): 21 - 34 .
KRAWCZYK H , . New hash functions for message authentication [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 1995 : 301 - 310 .
LIANG W , FAN Y K , LI K C , et al . Secure data storage and recovery in industrial blockchain network environments [J ] . IEEE Transactions on Industrial Informatics , 2020 , 16 ( 10 ): 6543 - 6552 .
LIU G J , GUO W M , LIU X M , et al . Security analysis and improvements on a remote integrity checking scheme for regenerating-coding-based distributed storage [J ] . Security and Communication Networks , 2021 , 2021 : 1 - 8 .
COHEN A , D’OLIVEIRA R G L ,, SALAMATIAN S , et al . Network coding-based post-quantum cryptography [J ] . IEEE Journal on Selected Areas in Information Theory , 2021 , 2 ( 1 ): 49 - 64 .
KADHE S , SPRINTSON A . Weakly secure regenerating codes for distributed storage [C ] // 2014 International Symposium on Network Coding . Piscataway:IEEE Press , 2014 : 1 - 6 .
0
浏览量
332
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构