计算机科学 ›› 2019, Vol. 46 ›› Issue (3): 188-196.doi: 10.11896/j.issn.1002-137X.2019.03.028

• 信息安全 • 上一篇    下一篇

基于多分支路径树的云存储大数据完整性证明机制

谢四江1,2,贾倍1,王鹤2,许世聪1   

  1. (西安电子科技大学计算机学院 西安 710071)1
    (北京电子科技学院 北京 100070)2
  • 收稿日期:2018-02-08 出版日期:2019-03-15 发布日期:2019-03-22
  • 通讯作者: 贾倍(1993-),女,硕士,主要研究方向为大数据、云存储安全,E-mail:jiabeibeijia@163.com(通信作者)
  • 作者简介:谢四江(1971-),男,硕士,教授,主要研究方向为密码工程、信息安全;王鹤(1992-),女,硕士,主要研究方向为数字签名、可信计算;许世聪(1994-),男,硕士,主要研究方向为隐私保护、机器学习。
  • 基金资助:
    国家自然科学基金:基于内容的图像光影模板学习与美学质量评价关键技术研究(61402021)资助

Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree

XIE Si-jiang1,2,JIA Bei1,WANG He2,XU Shi-cong1   

  1. (College of Computer Science,Xidian University,Xi’an 710071,China)1
    (Beijing Electronic Science and Technology Institution,Beijing 100070,China)2
  • Received:2018-02-08 Online:2019-03-15 Published:2019-03-22

摘要: 随着互联网和移动电子设备的不断普及,网络化存储将成为未来的主要存储方式,而目前的云存储方式也将会是网络化存储的必然趋势,因此如何确保云存储环境下用户数据的完整性成为人们关注的主要问题。针对该问题,提出了一种基于多分支路径树的云存储大数据完整性证明机制,通过引入第三方代理实现公开验证,加入随机掩码实现数据隐私,基于多分支路径树这一动态数据结构实现动态操作,并针对多分支路径树提出一种新的数据完整性检测算法。实验结果表明,所提方案可以高效地完成大量数据的更新,同时支持多用户的数据完整性验证。

关键词: 多分支路径树, 批量审计, 数据持有性证明, 数据完整性, 云存储

Abstract: With the popularization of the Internet and mobile electronic devices,network storage will become the main way of storage in the future,and the cloud storage also will be the inevitable trend of network storage.How to ensure the integrity of users’ data on cloud storage environment becomes a major problem people concern.Aiming at the problem,this paper presented a cloud big data integrity verification scheme based on multi-branch tree.It realizes public verification with third party auditor and supports privacy-preserving by adding random masking,as well as,it uses a dyna-mic data structure which is multi-branch tree to accomplish dynamic operations.This paper also proposed a new algorithm to get information of data integrity verification from multi-branch tree.Test results show that the scheme can be efficiently applied in the cloud environment to verify data integrity with frequent update operations and multi-users.

Key words: Batch auditing, Cloud storage, Data integrity, Multi-branch tree, Provable data possession

中图分类号: 

  • TP309.2
[1]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:598-609.
[2]THANGAVEL M,VARALAKSHMI P,SINDHUJA R,et al.A survey on provable data possession in cloud storage[C]∥2016 Eighth International Conference on Advanced Computing (ICoAC).IEEE,2017:25-31.
[3]TAN S,JIA Y,HAN W H.Research and Development of Prova-
ble Data Integrity in Cloud Storage[J].Chinese Journal of Comptuers,2015,38(1):164-177.(in Chinese)
谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[4]JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597.
[5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable
and efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:9.
[6]WANG C,WANG Q,REN K,et al.Ensuring Data Storage Security in Cloud Computing[C]∥2009 17th International Workshop on Quality of Service.IEEE,2009:1-9.
[7]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:355-370.
[8]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[9]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession[J].ACM Transactions on Information &System Security,2015,17(4):1-29.
[10]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222.
[11]WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9.
[12]WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[13]ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]∥Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:183-194.
[14]LIN C,LUO F,WANG H,et al.A provable data possession
scheme with data hierarchy in cloud[C]∥International Con-ference on Information Security and Cryptology.Springer International Publishing,2015:301-321.
[15]WANG H.Identity-based distributed provable data possession in multicloudstorage[J].IEEE Transactions on Service Computing,2015,8(2):328-340.
[16]ETEMAD M,KP A.Transparent,distributed,and replicated dynamic provable data possession[C]∥International Con-ference on Applied Cryptography and Network Security.Sprin-ger Berlin Heidelberg,2013:1-18.
[17]ZOU J,SUN Y,LI S.Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree[C]∥2016 International Con-ference on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2016:4-9.
[18]LI L,YANG Y,WU Z.FMR-PDP:Flexible multiple-replica
provable data possession in cloud storage[C]∥2017 IEEE Symposium on Computers and Communications(ISCC).IEEE,2017:1115-1121.
[19]PENG S,ZHOU F,WANG Q,et al.Identity-Based Public
Multi-Replica Provable Data Possession[J].IEEE Access,2017,5:26990-27001
[20]RAJENDRAN A,BALASUBRAMANIAN V,MALA T.Integrity verification using Identity based Provable Data Possession in multi storage cloud[C]∥2017 International Conference on Computational Intelligence in Data Science (ICCIDS).IEEE,2017:1-4.
[21]HUANG D,WAN C.PDPMT:Provable data possession for
multiple cloud tenants[C]∥2017 10th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI).IEEE,2017:1-6.
[1] 徐堃, 付印金, 陈卫卫, 张亚男.
基于区块链的云存储安全研究进展
Research Progress on Blockchain-based Cloud Storage Security Mechanism
计算机科学, 2021, 48(11): 102-115. https://doi.org/10.11896/jsjkx.210600015
[2] 李莹, 于亚新, 张宏宇, 李振国.
基于TBchain区块链的高可信云存储模型
High Trusted Cloud Storage Model Based on TBchain Blockchain
计算机科学, 2020, 47(9): 330-338. https://doi.org/10.11896/jsjkx.190800147
[3] 陈利锋, 朱路平.
一种基于云端加密的FPGA自适应动态配置方法
Encrypted Dynamic Configuration Method of FPGA Based on Cloud
计算机科学, 2020, 47(7): 278-281. https://doi.org/10.11896/jsjkx.190700110
[4] 张茜, 王箭.
用户身份可追踪的云共享数据完整性审计方案
Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking
计算机科学, 2020, 47(6): 303-309. https://doi.org/10.11896/jsjkx.190600079
[5] 李树全,刘磊,朱大勇,熊超,李锐.
一种面向云存储的数据动态验证方案
Protocol of Dynamic Provable Data Integrity for Cloud Storage
计算机科学, 2020, 47(2): 256-261. https://doi.org/10.11896/jsjkx.181202371
[6] 白利芳, 祝跃飞, 芦斌.
云数据存储安全审计研究及进展
Research and Development of Data Storage Security Audit in Cloud
计算机科学, 2020, 47(10): 290-300. https://doi.org/10.11896/jsjkx.191000111
[7] 乔毛,秦岭.
云存储服务中一种高效属性撤销的AB-ACCS方案
AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services
计算机科学, 2019, 46(7): 96-101. https://doi.org/10.11896/j.issn.1002-137X.2019.07.015
[8] 顾晨阳, 付伟, 刘金龙, 孙刚.
云存储中的ORAM研究综述
Survey of ORAM Research in Cloud Storage
计算机科学, 2019, 46(11A): 341-347.
[9] 吴修国, 刘翠.
云存储系统中最小开销的数据副本布局转换策略
Data Replicas Distribution Transition Strategy in Cloud Storage System
计算机科学, 2019, 46(10): 202-208. https://doi.org/10.11896/jsjkx.180901623
[10] 金瑜,蔡超,何亨,李鹏.
BTDA:基于半可信第三方的动态云数据更新审计方案
BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party
计算机科学, 2018, 45(3): 144-150. https://doi.org/10.11896/j.issn.1002-137X.2018.03.023
[11] 刘宴涛, 刘珩.
一种基于网络编码的云存储系统
Cloud Storage System Based on Network Coding
计算机科学, 2018, 45(12): 293-298. https://doi.org/10.11896/j.issn.1002-137X.2018.12.047
[12] 庞晓琼, 任孟琦, 王田琪, 陈文俊, 聂梦飞.
一种支持完美隐私保护的批处理数据拥有性证明方案
Perfect Privacy-preserving Batch Provable Data Possession
计算机科学, 2018, 45(11): 130-137. https://doi.org/10.11896/j.issn.1002-137X.2018.11.019
[13] 张桂鹏, 陈平华.
一种混合云环境下基于Merkle哈希树的数据安全去重方案
Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments
计算机科学, 2018, 45(11): 187-192. https://doi.org/10.11896/j.issn.1002-137X.2018.11.029
[14] 田晖,陈羽翔,黄永峰,卢璥.
云数据持有性审计研究与进展
Research and Development of Auditing Techniques for Cloud Data Possession
计算机科学, 2017, 44(6): 8-16. https://doi.org/10.11896/j.issn.1002-137X.2017.06.002
[15] 徐云云,白光伟,沈航,黄中平.
云存储中基于虚拟用户的数据完整性验证
Virtual-user-based Public Auditing Integrity in Cloud Storage
计算机科学, 2017, 44(5): 95-99. https://doi.org/10.11896/j.issn.1002-137X.2017.05.017
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!