计算机科学 ›› 2018, Vol. 45 ›› Issue (11): 130-137.doi: 10.11896/j.issn.1002-137X.2018.11.019
庞晓琼, 任孟琦, 王田琪, 陈文俊, 聂梦飞
PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei
摘要: 数据拥有性证明技术是当前云存储安全领域中的一项重要研究内容,可使用户无须下载所有文件就能高效地远程校验用户数据是否完整存储于云服务器。现实中,用户趋向于委托第三方验证机构TPA代替自己来验证数据的完整性;然而,多数支持第三方公开审计的数据拥有性证明方案通常只考虑恶意服务器是否能够伪造标签或证明的问题,鲜有考虑恶意TPA可能会窃取用户隐私的情况。近几年,一些既针对服务器保证数据的安全性又针对TPA实现数据隐私保护的数据拥有性证明方案逐渐被提出,但多应用于单云服务器环境下;个别应用在多云服务器环境下可支持批量审计的方案,或者不能有效抵抗恶意云服务器的攻击,或者无法实现针对TPA的零知识隐私保护。因此,文中在Yu等工作的基础上,提出了一个多云服务器环境下支持批量审计的数据拥有性证明方案。所提方案既可保证针对恶意云服务器的安全性,还可实现针对TPA的完美零知识隐私保护。性能分析及仿真实验表明所提方案是高效且可行的。
中图分类号:
[1]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥ACM Conference on Computer and Communications Security.ACM,2007:598-609. [2]ATENIESE G,PIETRO R D,MANCINI L V,et al.Scalable and efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:1-10. [3]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥ European Conference on Research in Computer Security.Sprin-ger-Verlag,2009:355-370. [4]ZHANG J,TANG W,MAO J.Efficient public verification proof of retrievability scheme in cloud[M].Kluwer Academic Publi-shers,2014. [5]YU Y,NI J,MAN H A,et al.Comments on a Public Auditing Mechanism for Shared Cloud Data Service[J].IEEE Transactions on Services Computing,2015,8(6):998-999. [6]YU Y,LI Y,NI J,et al.Comments on “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”[J].IEEE Transactions on Information Forensics & Security,2016,11(3):658-659. [7]YU Y,XUE L,MAN H A,et al.Cloud data integrity checking with an identity-based auditing mechanism from RSA[J].Future Generation Computer Systems,2016,62(C):85-91. [8]WANG C,WANG Q,REN K,et al.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing[C]∥Infocom,2010 Proceedings IEEE.IEEE,2010:1-9. [9]HAO Z,ZHONG S,YU N.A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability[J].IEEE Transactions on Knowledge & Data Engineering,2011,23(9):1432-1437. [10]YU Y,AU M H,MU Y,et al.Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage[J].International Journal of Information Security,2015,14(4):307-318. [11]YU Y,MAN H A A,ATENIESE G,et al.Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage[J].IEEE Transactions on Information Forensics & Security,2017,PP(99):1-1. [12]ZHU Y,HU H,AHN G J,et al.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J].IEEE Transactions on Parallel & Distributed Systems,2012,23(12):2231-2244. [13]HE K,HUANG C,WANG J,et al.An efficient public batch auditing protocol for data security in multi-cloud storage[C]∥2013 8th ChinaGrid Annual Conference.IEEE,2013:51-56. [14]WANG H.Identity-Based Distributed Provable Data Possession in Multicloud Storage[J].IEEE Transactions on Services Computing,2015,8(2):328-340. [15]ATENIESE G,BURNS R,CURTMOLA R,et al.Remote data checking using provable data possession[J].Acm Transactions on Information & System Security,2011,14(1):1-34. |
[1] | 徐堃, 付印金, 陈卫卫, 张亚男. 基于区块链的云存储安全研究进展 Research Progress on Blockchain-based Cloud Storage Security Mechanism 计算机科学, 2021, 48(11): 102-115. https://doi.org/10.11896/jsjkx.210600015 |
[2] | 陈利锋, 朱路平. 一种基于云端加密的FPGA自适应动态配置方法 Encrypted Dynamic Configuration Method of FPGA Based on Cloud 计算机科学, 2020, 47(7): 278-281. https://doi.org/10.11896/jsjkx.190700110 |
[3] | 伍琦,万常选,李国林. 一个改进型云存储共享方案 Improved Data Sharing Scheme over Cloud Storage 计算机科学, 2012, 39(8): 99-103. |
|