首页 | 本学科首页   官方微博 | 高级检索  
     

基于响应模糊化的抗附加块攻击云数据安全去重方法
引用本文:唐鑫,周琳娜. 基于响应模糊化的抗附加块攻击云数据安全去重方法[J]. 计算机应用, 2020, 40(4): 1085-1090. DOI: 10.11772/j.issn.1001-9081.2019081468
作者姓名:唐鑫  周琳娜
作者单位:国际关系学院 信息科技学院, 北京 100091
基金项目:国际关系学院中央高校基本科研业务费专项资金资助项目(3262019T68);国家自然科学基金资助项目(U1536207);国家重点研发计划项目(2016QY04W0803);国际关系学院教师发展中心青年教师培育专项。
摘    要:附加块攻击是威胁云数据跨用户去重安全性的一种重要攻击手段,它通过将随机数量的非命中块附加在待检测文件上,使得云服务商无法判断所检测文件的真实存在性,从而难以通过常规的响应模糊化方法保护云数据的存在性隐私。针对这个问题,提出一种基于响应模糊化的新型抗附加块攻击的云数据安全去重方法。该方法通过计算附加块数量,统计未命中块数,并比较二者以确定响应中包含的最少冗余块数,实现响应模糊化,从而只需付出少量的额外通信开销就可确保攻击者难以根据响应判断所检测文件的存在性。安全性分析和实验结果表明,相比该领域的最新工作,所提方法更高的安全性只需更低的开销,或在开销相当或少量增加的情况下显著提高安全性。

关 键 词:附加块攻击  边信道攻击  跨用户去重  云存储  响应模糊化  
收稿时间:2019-08-22
修稿时间:2019-11-04

Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack
TANG Xin,ZHOU Linna. Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack[J]. Journal of Computer Applications, 2020, 40(4): 1085-1090. DOI: 10.11772/j.issn.1001-9081.2019081468
Authors:TANG Xin  ZHOU Linna
Affiliation:School of Information Science and Technology, University of International Relations, Beijing 100091, China
Abstract:Appending chunk attack is an important attack to threaten the security of cross-user deduplication for cloud data,which works by appending a random number of non-duplicate chunks to the file to be detected,making it impossible for cloud service providers to determine the true existence of the file. Therefore,the existence privacy of cloud data cannot be protected by general ways of response obfuscation methods. To deal with this problem,a new response obfuscation based secure deduplication method with resistance against appending chunk attack was proposed. By calculating the number of appending chunks,counting the number of non-duplicate chunks and comparing these two to determine the minimum number of redundant chunks involved in the response,so as to achieve the obfuscation. As a result,the existence of the checking file was not able to be judged by the attacker according to the response with little extra communication overhead. Security analysis and experimental results show that,compared with the state-of-the-art in this field,the proposed method achieves higher level of security with smaller amount of overhead required,or improves security significantly with comparable or slightly increased overhead.
Keywords:appending chunk attack   side channel attack   cross-user deduplication   cloud storage   response obfuscation
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号