Computer Science ›› 2016, Vol. 43 ›› Issue (10): 172-176.doi: 10.11896/j.issn.1002-137X.2016.10.032

Previous Articles     Next Articles

Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment

XU Yang, ZHU Dan, ZHANG Huan-guo and XIE Xiao-yao   

  • Online:2018-12-01 Published:2018-12-01

Abstract: For the issues of the security and dynamic updating of the big data stored in the cloud,a big data storage security scheme based on algebraic signature possession audit was proposed.It builds trusted third party auditor to make data possession audit (DPA) for the big data by using algebraic signature (AS) technology to ensure the integrity of data.In addition,a new type of data structure is built based on the idea of divide and conquer (DC),allowing the data owner to dynamically modify,insert and delete data.At the same time,the computation complexity is reduced by reducing the number of translated data blocks.Experimental results show that the proposed scheme can detect the malicious operation effectively,provide higher data security,and greatly reduce the computation of the server and the audit side.

Key words: Big data,Storage security,Algebraic signature,Possession audit,Data dynamic updating

[1] Li H,Sun W H,Li F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud [J].Journal of Computer Research and Development,2014,51(7):1397-1409(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409
[2] Hong H S,Sun Z X.Big data Storage Security Based on Cloud Computing [J].Journal of Nanjing University of Posts and Te-lecommunications(Natural Science),2014,34(4):26-32(in Chinese) 洪汉舒,孙知信.基于云计算的大数据存储安全的研究[J].南京邮电大学学报(自然科学版),2014,34(4):26-32
[3] Xiao D,Yang L,Liu C,et al.Efficient Data Possession Auditing for Real-World Cloud Storage Environments [J].Ieice Trans.inf.& Syst,2015,98(4):796-806
[4] An B Y,Gong Z,Xiao D,et al.Data Possession Audit with an Implicit Trusted Third-party for Cloud Storage [J].Journal of Harbin Engineering University,2012,33(8):1039-1045(in Chinese) 安宝宇,宫哲,肖达,等.具有隐式可信第三方的云存储数据持有性审计[J].哈尔滨工程大学学报,2012,33(8):1039-1045
[5] Qin Z G,Wang S Y,Zhao Y,et al.An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics [J].Journal of Computer Research and Development,2015,52(10):2192-2199(in Chinese) 秦志光,王士雨,赵洋,等.云存储服务的动态数据完整性审计方案[J].计算机研究与发展,2015,52(10):2192-2199
[6] Li M C,Zhang L,Guo C.Accurate Location in Batch Dynamic Provable Data Possession [J].Applied Mechanics & Materials,2014,51(3):9-12
[7] Li C L,Chen Y,Tan P X,et al.Towards Comprehensive Pro-vable Data Possession in Cloud Computing [J].Wuhan University Journal of Natural Sciences,2013,18(3):265-271
[8] Cash D,Küpü A,Wichs D.Dynamic Proofs of Retrievability via Oblivious RAM [J].Journal of Cryptology,2015,7881:1-36
[9] Wang Q,Wang C,Ren K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2011,22(5):847-859
[10] Yang K,Jia X.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2013,24(9):1717-1726
[11] Jiao W Z,Wang G Q,Zhai Z J,et al.Algebraic Signature based Data Possession Checking for Cloud Storage [J].Journal of Northeast Normal University (Natural Science Edition),2013,45(4):55-61(in Chinese) 焦文喆,王国庆,翟正军,等.云存储下基于代数签名的数据持有性检查方法[J].东北师大学报(自然科学版),2013,45(4):55-61
[12] Sun W,Zhu Z L.Graph Classification Algorithm based on Divide and Conquer Strategy and Hash Linked List [J].Computer Engineering & Science,2013,35(3):145-149(in Chinese) 孙伟,朱正礼.基于分而治之及Hash链表的图分类算法[J].计算机工程与科学,2013,35(3):145-149
[13] Ameen J N,Mohamed J J,Begam N N.Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing [J].Compusoft International Journal of Advanced Computer Technology,2014,3(6):263-272
[14] Ni J B,Yu Y,Mu Y,et al.On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage [J].IEEE Transactions on Parallel & Distributed Systems,2014,25(10):2760-2761
[15] Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing University of Technology(Natural Science),2012,6(8):85-90(in Chinese) 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,6(8):85-90

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .