|
- 2016
代理动态操作的云数据拥有性证明方案
|
Abstract:
传统支持动态操作的云存储系统中,对于云中动态文件的动态操作所产生的计算和通信开销是由用户完全承担的,这给用户带来了相应的计算和通信压力。为了解决该问题,构造了云环境下第三方代理动态操作的数据拥有性证明方案,方案中引入了一个功能强大的第三方审计者,用户不仅能委托其承担审计工作而且能够使其代理完成动态操作的任务,在任务处理的过程,系统能够保证用户的数据在第三方审计者中的隐私性。从安全和性能分析可以看出该方案能高效安全地完成审计任务。
[1] | SCHWARZ T S J, MILLER E L. Store, forget, and check:Using algebraic signatures to check remotely administered storage[C]//Conference on Distributed Computing Systems, 2006.[S.l.]:IEEE, 2006:12. |
[2] | MERKLE R C. Protocols for public key cryptosystems[C]//2012 IEEE Symposium on Security and Privacy.[S.l.]:IEEE Computer Society, 1980:122-122. |
[3] | ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.[S.l.]:ACM, 2007:598-609. |
[4] | JUELS A, KALISKI Jr B S. PORs:Proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.[S.l.]:ACM, 2007:584-597. |
[5] | SHACHAM H, WATERS B. Compact proofs of retrievability[M]//PIEPRZYK J. Advances in Cryptology-ASIACRYPT 2008. Berlin Heidelberg:Springer, 2008:90-107. |
[6] | CHANG E C, XU J. Remote integrity check with dishonest storage server[J]. European Symposium on Research in Computer Security:Computer Security, 2008, 5283:223-237. |
[7] | BOWERS K D, JUELS A, OPREA A. Proofs of retrievability:Theory and implementation[C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security.[S.l.]:ACM, 2009:43-54. |
[8] | ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.[S.l.]:ACM, 2008:9. |
[9] | WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//INFOCOM, 2010 Proceedings IEEE.[S.l.]:IEEE, 2010:1-9.[6] ZHU Y, WANG H, HU Z, et al. Dynamic audit services for integrity verification of outsourced storages in clouds[C]//Proceedings of the 2011 ACM Symposium on Applied Computing.[S.l.]:ACM, 2011:1550-1557. |
[10] | WANG Qian, WANG Cong, LI Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[J]. European Symposium on Computer Security-Esorics, 2009, 22(5):355-370. |
[11] | SHAH M A, SWAMINATHAN R, BAKER M. Privacypreserving audit and extraction of digital contents[R].[S.l.]:Hewlett-Packard Development Company, 2008. |
[12] | ERWAY C, KüP?ü A, PAPAMANTHOU C, et al. Dynamic provable data possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications security.[S.l.]:ACM, 2009:213-222. |
[13] | BOWERS K D, JUELS A, OPREA A. HAIL:a high-availability and integrity layer for cloud storage[C]//Proceedings of the 16th ACM Computer and Communications Security.[S.l.]:ACM, 2009:187-198. |
[14] | BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[J]. Journal of Cryptology, 2004, 17(4):297-319. |