Data outsourcing authentication model based on authenticated data structures for cloud computing
|更新时间:2024-10-14
|
Data outsourcing authentication model based on authenticated data structures for cloud computing
Vol. 32, Issue 7, Pages: 153-160(2011)
作者机构:
1. 东北大学软件学院
2. 东北大学信息科学与工程学院
作者简介:
基金信息:
DOI:
CLC:TP309
Published:2011
稿件说明:
移动端阅览
XU Jian1, ZHOU Fu-cai1, CHEN Xu1, et al. Data outsourcing authentication model based on authenticated data structures for cloud computing[J]. 2011, 32(7): 153-160.
DOI:
XU Jian1, ZHOU Fu-cai1, CHEN Xu1, et al. Data outsourcing authentication model based on authenticated data structures for cloud computing[J]. 2011, 32(7): 153-160.DOI:
Data outsourcing authentication model based on authenticated data structures for cloud computing
The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion
data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm
authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency
the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.