首页 | 本学科首页   官方微博 | 高级检索  
     

云计算下的数据存储安全可证明性综述
引用本文:梁 彪,曹宇佶,秦中元,张群芳. 云计算下的数据存储安全可证明性综述[J]. 计算机应用研究, 2012, 29(7): 2416-2421
作者姓名:梁 彪  曹宇佶  秦中元  张群芳
作者单位:1. 南京三宝科技股份有限公司,南京210049;信息网络安全公安部重点实验室,上海201204
2. 东南大学信息科学与工程学院,南京,210096
3. 东南大学信息科学与工程学院,南京210096;信息网络安全公安部重点实验室,上海201204
4. 南京炮兵学院计算机教研室,南京,211132
基金项目:国家科技支撑计划资助项目(2011BAF16B00); 信息网络安全公安部重点实验室开放课题基金资助项目(C11605); 江苏省网络与信息安全重点实验室开放课题基金资助项目(BM2003201)
摘    要:云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制。于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题。在全面研究云计算数据存储安全现有成果的基础上,介绍了云计算数据存储的基本架构,并从可检索证明和可证明数据拥有两个角度分析了相关研究方案的发展,从公共认证、同态认证、数据动态化、隐私保护、批审计和多服务器环境得方面讨论了协议的功能设计,并且列表进行了功能和开销对比,在此基础上提出了一个比较完备的云计算环境下的协议框架。最后总结并阐述了后续工作。

关 键 词:云计算  数据存储安全  可检索证明  可证明数据拥有

Survey of proofs on data storage security in cloud computing
LIANG Biao,CAO Yu-ji,QIN Zhong-yuan,ZHANG Qun-fang. Survey of proofs on data storage security in cloud computing[J]. Application Research of Computers, 2012, 29(7): 2416-2421
Authors:LIANG Biao  CAO Yu-ji  QIN Zhong-yuan  ZHANG Qun-fang
Affiliation:1. Nanjing Sample Technology Co. , LTD, Nanjing 210049, China; 2. School of Information Science & Engineering, Southeast University, Nanjing 210096, China; 3. Key Lab of Information Network Security, Ministry of Public Security, Shanghai 201204, China; 4. Computer Department , Nanjing Institute of Artillery Corps, Nanjing, 211132, China
Abstract:In cloud computing, data service outsourcing relieves the data owners of the burden of local data storage and maintenance. However, it also eliminates their physical control of the storage dependability and security, which makes the outsourced data assurances in cloud computing a very challenging and potentially formidable task. Based on the overall study of the recent researches on data storage security, it introduced the architecture of cloud data storage firstly. And studied the state-of-the-art schemes from proofs of retrievability and provable data possession. Then, this paper discussed the function design in protocol based on public verification, homomorphic authenticators, data dynamics, data privacy protection, batch auditing and multiple-server environment. Furthermore, made some comparisons of functions and the complexity in different protocols in tables. At last, summarized and discussed the further direction of research.
Keywords:
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号