您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2020, Vol. 55 ›› Issue (5): 81-87.doi: 10.6040/j.issn.1671-9352.2.2019.146

• • 上一篇    

一种非同频远程数据持有检测方法

马海峰1,杨家海2,薛庆水1*,鞠兴忠1,朱浩之1,林涛1,原鑫鑫1   

  1. 1.上海应用技术大学计算机科学与信息工程学院, 上海 201418;2.清华大学网络科学与网络空间研究院, 北京 100084
  • 发布日期:2020-05-06
  • 作者简介:马海峰(1977— ), 男, 博士, 副教授, 硕士生导师, 研究方向为云计算安全和大数据安全. E-mail:mahf@sit.edu.cn*通信作者简介:薛庆水(1971— ), 男, 博士, 教授, 硕士生导师, 研究方向为计算机网络安全. E-mail:xue-qsh@sit.edu.cn
  • 基金资助:
    国家重点研发计划项目(2017YFB0803004);上海应用技术大学引进人才项目启动基金(39120K196002-A06)

A not-same frequency remote data possession checking method

MA Hai-feng1, YANG Jia-hai2, XUE Qing-shui1*, JU Xing-zhong1, ZHU Hao-zhi1, LIN Tao1, YUAN Xin-xin1   

  1. 1. School of Computer Science and Information Engineering, Shanghai Institute of Technology, Shanghai 201418, China;
    2. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
  • Published:2020-05-06

摘要: 提出非同频认证模式,可大幅降低发生文件损坏后的检测延迟,进而提出非同频增强型远程数据持有检测方法,在降低损坏数据检测延迟同时可防范替换攻击等攻击。安全证明和实验表明,提出的认证方法是安全的,在实验样本下与E-RDPC相比性能平均提升19.3%。

关键词: 云存储, 数据完整性, 数据持有性检测, 同态标签, 哈希树

Abstract: The proposed not-same frequency verification mode can significantly reduce the detection delay after the occurrence of file corruption. Furthermore, the proposed not-same frequency enhanced remote data possession checking method can reduce the delay of corrupt data detection and prevent replace attack and so on. Security proof and experiments show that the proposed method is secure. And under the experimental samples, NE-RDPC has 19.3% performance improvement in average than E-RDPC.

Key words: cloud storage, data integrity, data possession checking, homomorphic tag, Hash tree

中图分类号: 

  • TP309
[1] REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73.
[2] 姚克, 杨海宁, 秦静. 云存储中可验证完整性的可搜索加密协议[J]. 山东大学学报(理学版), 2019, 54(1):67-78. YAO Ke, YANG Haining, QIN Jing. Searchable encryption with data integrity verification in cloud storage[J]. Journal of Shandong University(Natural Science), 2019, 54(1):67-78.
[3] ATENIESE G, BUMS R, CURTMOL A, et al. Provable data possession at untrusted stores[C] //14th ACM CCS,[S.l.] :[s.n.] , 2007: 598-609.
[4] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015, 38(1):164-177. TAN Shuang, JIA Yan, HAN Weihong. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015, 38(1):164-177.
[5] 李晖, 孙文海, 李凤华,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014, 51(7):1397-1409. LI Hui, SUN Wenhai, LI Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7):1397-1409.
[6] JUELS A, Jr KALISKI B S. Pors: proofs of retrievability for large files[C] //Proceedings of the 14th ACM conference on Computer and Communications Security(CCS '07). New York: ACM Press, 2007: 584-597.
[7] WANG Y J, WU Q H, QIN B, et al. Identity-based data outsourcing with comprehensive auditing in clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):940-952.
[8] 韩盼盼, 秦静. 云计算中可验证的外包数据库加密搜索方案[J]. 山东大学学报(理学版), 2017, 52(9):41-53. HAN Panpan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing[J]. Journal of Shandong University(Natural Science), 2017, 52(9):41-53.
[9] ERWAY C, KUPCU A, PAPAMANTHOU C, et al. Dynamic provable data possession[C] //16th ACM CCS.[S.l.] :[s.n.] , 2009: 213-222.
[10] SHACHAM H, WATERS B. Compact proofs of retrievability[J]. Journal of Cryptology, 2013, 26(3):442-483.
[11] BOWERS K, JUELS A, OPERA A. Proofs of retrievability: theory and implementation[C] //Proceedings of ACM Workshop on Cloud Computing Security. Chicago:[s.n.] , 2009: 43-53.
[12] CHEN L X, ZHOU S M, HUANG X Y, et al. Data dynamics for remote data possession checking in cloud storage[J]. Computers & Electrical Engineering, 2013, 39(7):2413-2424.
[13] YU Y, NI J B, AU M H, et al. Improved security of a dynamic remote data possession checking protocol for cloud storage[J]. Expert Systems with Applications, 2014, 41(17):7789-7796.
[14] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C] //2010 Proceedings IEEE INFOCOM. San Diego: IEEE, 2010: 525-533.
[15] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):767-778.
[16] SHEN W T, QIN J, YU J, et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(2):331-346.
[17] ZHANG J H, DONG Q C. Efficient ID-based public auditing for the outsourced data in cloud storage[J]. Information Sciences, 2016, 343/344:1-14.
[1] 姚克,杨海宁,秦静. 云存储中可验证完整性的可搜索加密协议[J]. 《山东大学学报(理学版)》, 2019, 54(1): 67-78.
[2] 刘文卓, 曹天杰, 黄石. 一种高效的多副本数据持有性证明方案[J]. 山东大学学报(理学版), 2014, 49(09): 160-165.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!