计算机科学 ›› 2017, Vol. 44 ›› Issue (6): 8-16.doi: 10.11896/j.issn.1002-137X.2017.06.002

• 2016 年全国信息存储技术学术年会 • 上一篇    下一篇

云数据持有性审计研究与进展

田晖,陈羽翔,黄永峰,卢璥   

  1. 华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,清华大学电子工程系 北京100084,华侨大学网络技术中心 厦门361021
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(U1405254,U1536115,4),福建省高校新世纪人才支持计划(MJK2016-23),福建省高校杰出青年科研人才培育计划(MJK2015-54),福建省自然科学基金项目(2014J01238),国家留学基金(201507540001),华侨大学中青年教师科研提升资助

Research and Development of Auditing Techniques for Cloud Data Possession

TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing   

  • Online:2018-11-13 Published:2018-11-13

摘要: 作为云计算的重要分支,云存储以高性能和低成本等优势吸引了越来越多的组织和个人将大规模数据托管于其上。然而,云数据的外包特性和近年来频繁爆出的安全事件,使得用户对云存储服务的信心不足,其关键问题是如何确保存储在云端的数据的完整性。为应对该挑战,云数据持有性审计在最近几年被提出并受到了广泛的关注,文中对此进行了综述。首先,回顾了云数据持有性审计的一般模型和审计系统的设计目标;其次,按照实现的审计功能,对近年来的研究成果进行了分类介绍及对比分析;最后,指出了云数据持有性审计研究中存在的开放问题及发展趋势。

关键词: 云存储,数据持有性,公开审计,云安全

Abstract: As an important branch of cloud computing,cloud storage possesses the advantages of low-cost and high-performance,and has attracted a growing number of organizations and individuals to outsource their data.However,due to the outsourcing characteristic of cloud data and frequent security accidents for cloud storage providers,users are lacking of confidence in the cloud storage server,of which the main problem is how to effectively check the integrity of cloud data.To overcome this challenge,the auditing for cloud data possession has been proposed and gotten widespread attention in recent years,and a comprehensive survey was provided in this paper.First,general models and design goals of the auditing for cloud data possession were reviewed.Second,the existing auditing schemes for cloud data possession were classified according to their auditing functions,their principles were analyzed,and their performances were compared.Finally,the open problems in the auditing for cloud data possession were identified,and the trends of future development were discussed.

Key words: Cloud storage,Provable data possession,Public auditing,Cloud security

[1] DEWAN H,HANSDAH R C.A Survey of Cloud Storage Facilities[C]∥Proceedings of the 7th IEEE World Congress on Servi-ces.2011:224-231.
[2] WANG C,WANG Q,REN K,et al.Toward Secure and Depen- dable Storage Services in Cloud Computing [J].IEEE Transactions on Services Computing,2012,5(2):220-232.
[3] Digital in 2008.Amazon S3 Availability Event .http://status.aws.amazon.com/s3-20080720.html.
[4] Digital in 2006.Reports of Mass Email Deletions .http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-ma-ssemail-deletions.
[5] Digital in 2014.iCloud被黑客攻击而泄密 引发“公有云”恐慌 .http://www.chinacloud.cn/show.aspx?id=17748&cid=29.
[6] FENG C S,QIN Z G,YUAN D.Techniques of Secure Storage for Cloud Data [J].Chinese Journal of Computers,2015,8(1):150-163(in Chinese) 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,8(1):150-163.
[7] TAN S,JIA Y,HAN W H.Research and Development of Prova-ble Data Integrity of Cloud Storage[J].Chinese Journal of Computers,2015,8(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展 [J].计算机学报,2015,8(1):164-177.
[8] CHEN L X,XU L.Research on Provable Data Possession and Recovery Technology in Cloud Storage [J].Journal of Computer Research and Development,2012,9(S1):19-25.(in Chinese) 陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,9(S1):19-25.
[9] WANG C,REN K,LOU W J,et al.Toward Publicly Auditable Secure Cloud Data Storage Services [J].IEEE Network,2010,4(4):19-24.
[10] YANG K,JIA X H.Data Storage Auditing Service in CloudComputing:Challenges,Methods and Opportunities [J].World Wide Web-internet & Web Information Systems,2012,5(4):409-428.
[11] SOOKHAK M,GANI A,TALEBAIN H,et al.Remote DataAuditing in Cloud Computing Environments:A Survey, Taxono-my,and Open Issues [J].ACM Computing Surveys,2015,7(4):65.
[12] SOOKHAK M,TALEBAIN H,AHMED E,et al.A Review on Remote Data Auditing in Single Cloud Server:Taxonomy and Open Issues [J].Journal of Network & Computer Applications,2014,3(5):121-141.
[13] RYOO J,RIZVI S,AIKEN W,et al.Cloud Security Auditing:Challenges and Emerging Approaches [J].IEEE Security & Privacy,2014,2(6):68-74.
[14] SEB F,DOMINGO-FERRER J,M ARTNEZ-BALLEST A,et al.Efficient Remote Data Possession Checking in Critical Information Infrastructures [J].IEEE Transactions on Knowledge and Data Engeering,2008,0(8):1034-1038.
[15] JUELS A,KALISKI J R B S.PoRs:Proofs of Retrievability for Large Files [C]∥Proceedings of the 14th ACM Conference Computer and Communications Security.2007:584-597.
[16] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of the 14th Theory and Application of Cryptology and Information Security:Advances in Cryptology.2008:90-107.
[17] ATENIESE G,PIETRO R D,MANCINI L V,et al.Scalable and efficient provable data possession [C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.2008:1-10.
[18] ATENIESE G,JOHNS R B,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥Proceedings of the 14th Computer and Communications Security.2007:598-609.
[19] WANG H.Proxy Provable Data Possession in Public Clouds[J].IEEE Transactions on Services Computing,2013,6(4):551-559.
[20] WANG B Y,LI B C,LI H,et al.Certificateless Public Auditing for Data Integrity in the Cloud [C]∥Proceedings of the IEEE Conference on Communications and Network Security.2013:136-144.
[21] WANG H K,WU Q H,QIN Bo,et al.Identity-based Remote Data Possession Checking in Public Clouds [J].IET Information Security,2014,8(2):114-121.
[22] YU J,REN K,WANG C,et al.Enabling Cloud Storage Auditingwith Key-Exposure Resistance [J].IEEE Transactions on Information Forensics and Security,2015,0(6):1167-1180.
[23] LIU C,RAJIV R,ZHANG X Y,et al.Public Auditing for Big Data Storage in Cloud Computing--A Survey [C]∥Proceedings of the 16th IEEE International Conference on Computational Science and Engineering.2013:1128-1135.
[24] WANG C,WANG Q,REN K,et al.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing [C]∥Proceedings of the 29th IEEE International Conference on Computer Communications.2010:1-9.
[25] WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage [J].IEEE Transactions on Computers,2013,2(2):362-375.
[26] ZHU Y,HU H X,GAIL-JOON A,et al.Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Sto-rage[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(12):2231-2244.
[27] YANG K,JIA X H.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,4(9):1717-1726.
[28] CURTMOLA R,KHAN O,BURNS R C,et al.MR-PDP:Multiple-Replica Provable Data Possession [C]∥Proceedings of the 28th IEEE International Conference on Distributed Computing Systems.2008:411-420.
[29] HAO Z,YU N H.A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability[C]∥Proceedings of the 2nd IEEE International Symposium on Data,Privacy and E-Commerce.2010:84-89.
[30] XIAO D,YANG Y,YAO W B,et al.Multiple-File Remote Data Checking for Cloud Storage [J].Computers & Security,2012,1(2):192-205.
[31] BARSOUM A F,HASAN M A.On Verifying Dynamic Multiple Data Copies over Cloud Servers .http:/cacr.uwaterloo.ca/techreports/2011/cacr2011-28.pdf.
[32] CHEN H F,LIN B G,YANG Y,et al.Public Batch Auditing for 2M-PDP Based on BLS in Cloud Storage [J].Journal of Cryptologic Research,2014,1(4):368-378.
[33] ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession [C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.2009:213-222.
[34] WANG Q,WANG C,REN K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel and Distributed Systems,2011,2(5):847-859.
[35] LIU C,ZHANG X,CHI Y,et al.Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].IEEE Transactions on Parallel and Distributed Systems,2014,5(9):2234-2244.
[36] ZHU Y,AHN G J,HU H X,et al.Dynamic Audit Services for Outsourced Storage in Clouds [J].IEEE Transactions on Servi-ces Computing,2013,6(2):227-238.
[37] JIN H,JIANG H,ZHOU K.Dynamic and Public Auditing with Fair Arbitration for Cloud Data [C]∥IEEE Transactions on Cloud Computing.2016:1.
[38] TIAN H,CHEN Y X,CHANG C C,et al.Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage[C]∥IEEE Transactions on Services Computing.2016:1.
[39] LIU C,RAJIV R J,YANG C,et al.MuR-DPA:Top-down Leve- led Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud [J].IEEE Transactions on Computers,2015,4(9):2609-2622.
[40] BARSOUM A F,HASAN M A.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].IEEE Transactions on Information Forensics & Security,2015,0(3):485-496.
[41] WANG B Y,LI H,LI M.Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics [C]∥Procee-dings of the IEEE International Conference Communication.2013:539-543.
[42] WANG B Y,CHOW S,LI M,et al.Storing Shared Data on the Cloud via Security-Mediator [C]∥Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems.2013:124-133.
[43] WANG B Y,LI B C,LI H.Knox:Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud [C]∥Procee-dings of the 10th International Conference on Applied Cryptography and Network Security.2012:507-525.
[44] WANG B Y,LI B C,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud [J].IEEE Transactions on Cloud Computing,2014,2(1):43-56.
[45] WANG B Y,LI B C,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106.
[46] YU Y,LI Y N.Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification [J].IEEE Transactions on Information Forensics & Security,2015,0(8):1717-1726.
[47] LUO Y C.Efficient Integrity Auditing for Shared Data in theCloud with Secure User Revocation [C]∥Proceedings of the IEEE Trustcom /BigDataSE/ISPA.2015:434-442.
[48] JOHNSON R,MOLNAR D,SONG D,et al.Homomorphic Signature Schemes [C]∥Proceedings of the Cryptographers’ Track at the RSA Conference.2002:244-262.
[49] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [C]∥ Procee-dings of the 22nd Theory and Applications of Cryptographic Techniques.2003:416-423.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .