首页 | 本学科首页   官方微博 | 高级检索  
     

一个改进的云存储数据完整性验证方案
引用本文:周恩光,李舟军,郭华,贾仰理.一个改进的云存储数据完整性验证方案[J].电子学报,2014,42(1):150-154.
作者姓名:周恩光  李舟军  郭华  贾仰理
作者单位:1. 北京航空航天大学软件开发环境国家重点实验室, 北京 100191;2. 北京航空航天大学网络技术北京市重点实验室, 北京 100191;3. 中国科学院信息工程研究所信息安全国家重点实验室, 北京 100093;4. 聊城大学计算机学院, 山东聊城 252059
基金项目:国家自然科学基金(No.60973105,No.61170189,No.61300172,No.61370126);博士点基金(No.20111102130003,No.20121102120017);软件开发环境国家重点实验室自主课题(No.SKLSDE-2013ZX-19,No.SKLSDE-2012ZX-11);中央高校基本科研业务费专项资金(No.YWF-13-A02-13)
摘    要:在云计算环境中,客户将数据存储在不可信的云存储服务器上.如何在本地没有数据副本的情况下,高效地对客户存储的远程数据进行完整性验证是一个亟待解决的问题,针对此问题已相继提出一系列解决方案.提出已知证据伪造攻击的概念,即拥有一定数量证据的敌手可以伪造新的合法证据.指出已有的一些数据完整性验证方案无法抵抗已知证据伪造攻击.利用基于等级的认证跳表提出一个改进方案,该方案支持完全数据更新和公开审计.

关 键 词:云存储  完整性验证  公开审计  数据更新
收稿时间:2012-11-12

An Improved Data Integrity Verification Scheme in Cloud Storage System
ZHOU En-guang,LI Zhou-jun,GUO Hua,JIA Yang-li.An Improved Data Integrity Verification Scheme in Cloud Storage System[J].Acta Electronica Sinica,2014,42(1):150-154.
Authors:ZHOU En-guang  LI Zhou-jun  GUO Hua  JIA Yang-li
Affiliation:1. State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China;2. Key Laboratory of Beijing Network Technology, Beihang University, Beijing 100191, China;3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;4. School of Computer, Liaocheng University, Liaocheng, Shandong 252059, China
Abstract:In cloud computing,clients put the large data files on the untrusted cloud storage server.As clients no longer physically possess the storage of their data,how to efficiently verify the correctness of outsourced cloud data becomes a big challenge for data storage security in cloud computing.In order to solve the problem of data integrity checking,many schemes are proposed.We first propose the notion of the known-proofs forgery attack,i.e.,the adversary who has a certain number of proofs can forge a new legal proof.We point out that some known schemes cannot resist the known-proofs forgery attack.After that we propose an improved data integrity checking protocol with full data dynamics and public verifiability for cloud storage by manipulating rank-based authenticated skip list.
Keywords:cloud storage  integrity authentication  public auditability  data dynamics
本文献已被 CNKI 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号