计算机科学 ›› 2014, Vol. 41 ›› Issue (6): 108-112.doi: 10.11896/j.issn.1002-137X.2014.06.022
冯贵兰,谭良
FENG Gui-lan and TAN Liang
摘要: 数据确定性删除是云存储安全的研究热点。目前云存储中分散式的数据确定性删除方案在密钥分量存储时没有考虑DHT((Distributed Hash Table)节点可信性,使得用户在授权时间内也存在无法访问自己敏感数据的问题。为此提出了一种基于信任值的云存储数据确定性删除方案,该方案的核心是对DHT节点进行可信度评价,密钥分量的存储选择可信度较高的节点。与已有的确定性删除方案相比,该方案仍然是利用DHT网络的动态特性实现密钥的定期删除,使得用户敏感数据能够在特定的一段时间之后自动销毁。不同的是,该方案在将密钥分量分发到DHT网络中时倾向于选择可信度高的节点进行交互,使得在密钥的过期时间戳之前从DHT网络中得到足够多的密钥分量来恢复出密钥的可能性大大提高,降低了用户在授权时间内无法访问自己敏感数据的概率。实验结果表明,该方案不仅可以有效地抑制恶意节点,还可以提高密钥分量提取成功率,从而增加用户在授权时间内访问自己敏感数据的成功率。
[1] 武永卫,黄小猛.云存储[J].中国计算机学会通讯,2009,5(6):44-52 [2] Kohno G T,Levy A,Levy H M.Vanish:Increasing data privacy with self-destructing data [C]∥Proceedings of the 18th USENIX Seeurity Symposium.2009 [3] Yue Feng-shun,Wang Guo-jun,Liu Qin.A secure self-destructing scheme for electronic data[C]∥Proc of EUC2010.New York:IEEE Press,2010:651-658 [4] Zeng Ling-fang,Shi Zhan,Xu Sheng-jie,et al.Safevanish:An improved data self-destruction for protecting data privacy[C]∥Proc of CloudCom 2010.New York:IEEE Press,2010:521-528 [5] 王丽娜,任正伟,余荣威.一种适于云存储的数据确定性删除方法[J].电子学报,2012(2):266-273 [6] Perlman R.File System Design with Assured Delete[C]∥SISW’05Proceeding of the Third IEEE International Security in Storage Workshop.2005:83-88 [7] Tang Yang,Lee P P C,Lui J C S,et al.FADE:Secure overlay cloud storage with file assure ddeletion[C]∥Proc of the SecureComm’10.New York:ACM Press,2010.380-397 [8] Stoica I,Morris R,Karger D,et al.Chord:A scalable peer-topeer lookup service for internet applications[C]∥Proc of the SIGCOMM 2001.New York:ACM Press,2001:149-160 [9] Dabek F.A Distributed Hash Table [D].Massachusetts:Massachusetts Institute of Technology,2005 [10] Falkner J,Piatek M,John J,et al.Profiling a million user DHT[C]∥Proc of the 7th ACM SIGCOMM Conference on Internet Measurement.New York:ACM Press,2007:129-134 [11] Rhea S,Godfrey B,Karp B,et al.OpenDHT:A public DHTservice and its uses[C]∥Proceedings of ACM SIGCOMM.2005:73-84 [12] Azureus.http://www.vuze.com/ [13] Shamir A.How to share a secret [J].Communications of the ACM,1979,22(11):612-613 [14] Dou W,Wang H M,Jia Y,et al.A recommendation-based Peer-to-Peer trust model[J].Journal of Software,2004,5(4):571-583 [15] The Stanford P2P sociology project.http://p2p.standford.edu/ [16] Vanish.[EB/OL].http://vanish.cs.washington.edu/.2011-07-29 |
No related articles found! |
|