Data integrity verification based on model cloud federation of TPA
Papers|更新时间:2024-06-05
|
Data integrity verification based on model cloud federation of TPA
Journal on CommunicationsVol. 39, Issue 8, Pages: 113-124(2018)
作者机构:
1. 河北大学网络空间安全与计算机学院,河北 保定 071002
2. 河北省高可信信息系统重点实验室,河北 保定 071002
作者简介:
基金信息:
The National Natural Science Foundation of China(61170254);The National Natural Science Foundation of China(60873203);The Natural Science Foundation of Hebei Province(F2016201244)
Junfeng TIAN, Tianle LI. Data integrity verification based on model cloud federation of TPA[J]. Journal on Communications, 2018, 39(8): 113-124.
DOI:
Junfeng TIAN, Tianle LI. Data integrity verification based on model cloud federation of TPA[J]. Journal on Communications, 2018, 39(8): 113-124. DOI: 10.11959/j.issn.1000-436x.2018144.
Data integrity verification based on model cloud federation of TPA
Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model
a data integrity verification model based on the cloud federation of TPA was proposed.Firstly
the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly
TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally
the data integrity verification model was built by using cloud federation of TPA.The correctness
security and effectiveness of the model were analyzed theoretically and experimentally.
关键词
Keywords
references
WU J , PING L , GE X , et al . Cloud storage as the infrastructure of cloud computing [C ] // IEEE International Conference on Intelligent Computing and Cognitive Informatics (ICICCI) . 2010 : 380 - 383 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // The 14th ACM Conference on Computer and Communications Security . 2007 : 598 - 609 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamics for storage security in cloud computing [C ] // European Conference on Research in Computer Security . 2009 : 355 - 370 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public auditing for data storage security in cloud computing [J ] . 2010 , 62 ( 2 ): 525 - 533 .
ERWAY C , PAPAMANTHOU C , TAMASSIA R . Dynamic provable data possession [C ] // ACM Conference on Computer and Communications Security . 2009 : 213 - 222 .
WANG Q , WANG C , REN K , et al . Enabling public auditability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel & Distributed Systems , 2011 , 22 ( 5 ): 847 - 859 .
XU J , . Auditing the auditor:secure delegation of auditing operation over cloud storage [C ] // IACR Cryptology ePrint Archive . 2011 :304.
HUANG K , XIAN M , FU S , et al . Securing the cloud storage audit service:defending against frame and collude attacks of third party auditor [J ] . IEEE Transactions on Communication , 2011 .
WU Y L , LIN X , LU X C , et al . A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor [J ] . IEICE Transactions on Information & Systems , 2016 ( 10 ): 2638 - 2642 .
XIAO D , YANG L Y , SUN B , et al . Provable data possession system for realistic cloud storage environments [J ] . Journal of Software , 2016 , 27 ( 9 ): 2400 - 2413 .
FRANCESCO P S , VLADIMIRO S , LUCA N I , et al . FaaS:Federation-as-a-Service [J ] . 2016 .
FAN J , YI L T , SHU J W . Research on the technologies of Byzantine system [J ] . Journal of Software , 2013 , 24 ( 6 ): 1346 - 1360 .
WANG Q , WANG C , REN K , et al . Enabling public auditability and data dynamics for storage security in cloud computing [J ] . IEEE Transactions on Parallel & Distributed Systems , 2011 , 22 ( 5 ): 847 - 859 .
ZHOU Z J , WU L F , HONG Z , et al . Trustworthiness measurement model of virtual machine for cloud computing [J ] . Journal of Southeast University(Natural Science Edition) , 2014 , 44 ( 1 ): 45 - 50 .