计算机科学 ›› 2016, Vol. 43 ›› Issue (10): 172-176.doi: 10.11896/j.issn.1002-137X.2016.10.032

• 信息安全 • 上一篇    下一篇

云环境下基于代数签名持有性审计的大数据安全存储方案

徐洋,朱丹,张焕国,谢晓尧   

  1. 贵州师范大学贵州省信息与计算科学重点实验室 贵阳550001;武汉大学计算机学院 武汉430072,贵州师范大学贵州省信息与计算科学重点实验室 贵阳550001,武汉大学计算机学院 武汉430072,贵州师范大学贵州省信息与计算科学重点实验室 贵阳550001
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家重点基础研究发展计划(973)项目(2014CB340600),国家自然科学基金重点项目(61332019),贵州省基础研究重大项目(黔科合 JZ 字[2014]2001号),贵州省科技合作计划重点项目(黔科合LH字[2015]7763号),住房和城乡建设部科学技术计划项目(2016-K3-009),贵州省科技创新人才团队项目(黔科合人才团队(2012)4009)资助

Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment

XU Yang, ZHU Dan, ZHANG Huan-guo and XIE Xiao-yao   

  • Online:2018-12-01 Published:2018-12-01

摘要: 针对存储在云端的大数据的安全性和动态更新问题,提出一种基于代数签名持有性审计的大数据安全存储方案。构建可信第三方审计者,利用代数签名(AS)技术对大数据进行数据持有性审计(DPA)以确保数据的完整性。另外,基于分而治之(DC)思想构建一种新型数据结构,使数据拥有者可以动态地进行修改、插入和删除操作,同时通过减少平移数据块的数量来降低操作的计算复杂度。实验结果表明,该方案能够有效地检测恶意操作,提供了较高的数据安全性,同时大大降低了服务器和审计端的计算量。

关键词: 大数据,安全存储,代数签名,持有性审计,数据动态更新

Abstract: For the issues of the security and dynamic updating of the big data stored in the cloud,a big data storage security scheme based on algebraic signature possession audit was proposed.It builds trusted third party auditor to make data possession audit (DPA) for the big data by using algebraic signature (AS) technology to ensure the integrity of data.In addition,a new type of data structure is built based on the idea of divide and conquer (DC),allowing the data owner to dynamically modify,insert and delete data.At the same time,the computation complexity is reduced by reducing the number of translated data blocks.Experimental results show that the proposed scheme can detect the malicious operation effectively,provide higher data security,and greatly reduce the computation of the server and the audit side.

Key words: Big data,Storage security,Algebraic signature,Possession audit,Data dynamic updating

[1] Li H,Sun W H,Li F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud [J].Journal of Computer Research and Development,2014,51(7):1397-1409(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409
[2] Hong H S,Sun Z X.Big data Storage Security Based on Cloud Computing [J].Journal of Nanjing University of Posts and Te-lecommunications(Natural Science),2014,34(4):26-32(in Chinese) 洪汉舒,孙知信.基于云计算的大数据存储安全的研究[J].南京邮电大学学报(自然科学版),2014,34(4):26-32
[3] Xiao D,Yang L,Liu C,et al.Efficient Data Possession Auditing for Real-World Cloud Storage Environments [J].Ieice Trans.inf.& Syst,2015,98(4):796-806
[4] An B Y,Gong Z,Xiao D,et al.Data Possession Audit with an Implicit Trusted Third-party for Cloud Storage [J].Journal of Harbin Engineering University,2012,33(8):1039-1045(in Chinese) 安宝宇,宫哲,肖达,等.具有隐式可信第三方的云存储数据持有性审计[J].哈尔滨工程大学学报,2012,33(8):1039-1045
[5] Qin Z G,Wang S Y,Zhao Y,et al.An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics [J].Journal of Computer Research and Development,2015,52(10):2192-2199(in Chinese) 秦志光,王士雨,赵洋,等.云存储服务的动态数据完整性审计方案[J].计算机研究与发展,2015,52(10):2192-2199
[6] Li M C,Zhang L,Guo C.Accurate Location in Batch Dynamic Provable Data Possession [J].Applied Mechanics & Materials,2014,51(3):9-12
[7] Li C L,Chen Y,Tan P X,et al.Towards Comprehensive Pro-vable Data Possession in Cloud Computing [J].Wuhan University Journal of Natural Sciences,2013,18(3):265-271
[8] Cash D,Küpü A,Wichs D.Dynamic Proofs of Retrievability via Oblivious RAM [J].Journal of Cryptology,2015,7881:1-36
[9] Wang Q,Wang C,Ren K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2011,22(5):847-859
[10] Yang K,Jia X.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Transactions on Parallel & Distributed Systems,2013,24(9):1717-1726
[11] Jiao W Z,Wang G Q,Zhai Z J,et al.Algebraic Signature based Data Possession Checking for Cloud Storage [J].Journal of Northeast Normal University (Natural Science Edition),2013,45(4):55-61(in Chinese) 焦文喆,王国庆,翟正军,等.云存储下基于代数签名的数据持有性检查方法[J].东北师大学报(自然科学版),2013,45(4):55-61
[12] Sun W,Zhu Z L.Graph Classification Algorithm based on Divide and Conquer Strategy and Hash Linked List [J].Computer Engineering & Science,2013,35(3):145-149(in Chinese) 孙伟,朱正礼.基于分而治之及Hash链表的图分类算法[J].计算机工程与科学,2013,35(3):145-149
[13] Ameen J N,Mohamed J J,Begam N N.Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing [J].Compusoft International Journal of Advanced Computer Technology,2014,3(6):263-272
[14] Ni J B,Yu Y,Mu Y,et al.On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage [J].IEEE Transactions on Parallel & Distributed Systems,2014,25(10):2760-2761
[15] Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing University of Technology(Natural Science),2012,6(8):85-90(in Chinese) 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,6(8):85-90

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!