计算机科学 ›› 2017, Vol. 44 ›› Issue (5): 95-99.doi: 10.11896/j.issn.1002-137X.2017.05.017

• 信息安全 • 上一篇    下一篇

云存储中基于虚拟用户的数据完整性验证

徐云云,白光伟,沈航,黄中平   

  1. 南京工业大学计算机科学与技术学院 南京211800,南京工业大学计算机科学与技术学院 南京211800,南京工业大学计算机科学与技术学院 南京211800,南京工业大学计算机科学与技术学院 南京211800
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(61502230,7),江苏省自然科学基金项目(BK20150960),江苏省普通高校自然科学研究项目(15KJB520015),中美计算机科学研究中心开放课题(KJR16078),江苏省六大高峰人才基金资助

Virtual-user-based Public Auditing Integrity in Cloud Storage

XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping   

  • Online:2018-11-13 Published:2018-11-13

摘要: 针对验证数据完整性过程中被撤销用户与云服务器存在共谋的问题,提出基于虚拟用户的数据完整性校验方案。在管理群组用户的过程中,管理员让云服务器作为代理,通过重签名方法将被撤销用户的签名转换为虚拟用户签名,以防止攻击者获取群组用户身份隐私信息。另一方面,管理员在本地存储所有用户的身份隐私信息,用户在访问共享数据之前需要通过管理员的验证,这样既能保证校验者可以正确验证共享数据的完整性,又能保护群组用户的隐私和共享数据的安全。分析证明结果表明,所提方案在用户撤销时不仅能够验证共享数据的完整性,还能降低攻击者精确获取用户身份隐私信息和共享数据内容的概率。

关键词: 云存储,隐私保护,代理重签名,用户撤销,虚拟用户

Abstract: A public auditing integrity mechanism based on the virtual user was proposed,addressing collusion issue between the revoked user and cloud.After the user is revoked from the group,the manager lets the proxy resign the blocks with the virtual user’s signature,which utilizes proxy re-signature to protect user’s privacy.In addition,the manager verifies the user who want to access the shared data via a local list consisting of all users’ identity,with objective of auditing data integrity and protecting user’s privacy.Theoretical analysis shows that our framework achieves significant performance improvement in security and privacy,and it can decrease the probability of an adversary to get the users’ identity privacy and the data in the cloud.

Key words: Cloud storage,Preserve privacy,Proxy re-signature,User revocation,Virtual user

[1] LING C,SU W B,MENG K,et al.Cloud computing security:Architecture,Mechanism and Modeling[J].Journal of compu-ter,2013,36(9):1765-1784.(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,6(9):1765-1784.
[2] LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.
[3] ARMBRUST M,FOX A,GRIFFITH R A,et al.A View ofCloud Computing[J].Communications of the ACM,2010,53(4):50-58.
[4] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥The Proceedings of ACM CCS 2007.2007:598-610.
[5] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of ASIAC RYPT 2008,LNCS.Springer,Heidelberg,2008,5350:90-107.
[6] WANG C,WANG Q,REN K,et al.Privacy-preserving PublicAuditing for Data Storage Security in Cloud Computing [C]∥Proceedings of IEEE INFOCOM.2010:525-533.
[7] ZHU Y,WANG H,HU Z,et al.Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds [C]∥the Proceedings of ACM SAC 2011.2011:1550-1557.
[8] WANG C,WANG Q,REN K,et al.Towards Secure and Dependable Storage Services in Cloud Computing [J].IEEE Tran-sactions on Services Computing,2011,5(2):220-232.
[9] CAO N,YU S,YANG Z,et al.LT Codes-based Secure and Relia-ble Cloud Storage Service [C]∥The Proceedings of IEEE INFOCOM 2012.2012:693-701.
[10] WANG B,LI B,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106.
[11] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocolsand atomic proxy cryptography [C]∥Advance in Cryptology- EUROCRYPT 98.1998:127-144.
[12] ATENIESE G,HOHENBERGER S.Proxy Re-signatures:New Definitions,Algorithms and Applications [C]∥Proceeding of ACM CCS 2005.2005:310-319.
[13] WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage [J].IEEE Transactions on Computers,2013,62(2):362-375.
[14] ZHANG J,TANG W,MAO J.Efficient public verification proof of retrievability scheme in cloud [J].Cluster Computing,2014,17(17):1401-1411.
[15] WANG B,LI B,LI H.Oruta:Privacy-preserving public auditing for shared data in the cloud [C]∥Proc.of IEEE 5th Internatio-nal Conference on Cloud Computing (CLOUD).2012:295-302.
[16] YU Y,NI J,AU M,et al.On the security of a public auditing mechanism for shared cloud data service[J].IEEE Transaction Services Computing,1939,8(6):1.
[17] YUAN J,YU S.Public integrity auditing for dynamic data sharing with multiuser modification [J].IEEE Trans.Inf.Forensics and Secur,2015,10(8):1717-1726.
[18] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [M]∥The Proceedings of EUROCRYPT 2003.Springer-Verlag,2003:416-432.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!