计算机科学 ›› 2026, Vol. 53 ›› Issue (3): 459-468.doi: 10.11896/jsjkx.241200102
• 信息安全 • 上一篇
张宇航1, 常金勇1,2, 杨璐瑶1, 徐茂智3
ZHANG Yuhang1, CHANG Jinyong1,2, YANG Luyao1, XU Maozhi3
摘要: 随着云存储技术的普及,其安全性问题也越来越突出:云服务器可能因故障或外部攻击导致用户的存储数据丢失;同时,基于云存储的数据共享过程还可能面临恶意用户的非法访问风险。现有研究多聚焦于云存储环境下单一安全性功能的实现。对此,在对云存储数据完整性进行安全审计的基础上,完成了数据共享过程的安全访问控制。在数据完整性审计过程中,采用基于身份的同态认证技术为存储数据生成标签,用户通过验证云服务器返回的聚合标签可以获知其存储数据的完整性,从而解决云存储数据意外丢失的问题;在数据共享阶段,采用基于属性加密与对称加密结合的混合形式,不仅可以降低外包数据的计算、通信和存储开销,还可以实现对未授权用户的控制权限管理,从而解决数据共享过程中的高效性与权限管理的平衡问题。性能分析表明,所设计的系统在数据完整性审计和共享过程中均具有较低的计算、通信开销以及存储冗余,为云存储环境下的数据安全存储与高效共享提供了新的研究思路。
中图分类号:
| [1]LYU Z,LOU R,LI J,et al.Big Data Analytics for 6G-enabledMassive Internet of Things[J].IEEE Internet of Things Journal,2021,8(7):5350-5359. [2]GE C,SUSILO W,LIU Z,et al.Secure Keyword Search and Data Sharing Mechanism for Cloud Computing[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2787-2800. [3]HUANG P,FAN K,YANG H,et al.A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage system[J].IEEE Access,2020,8:94780-94794. [4]GE C,SUSILO W,BAEK J,et al.Revocable Attribute-BasedEncryption with Data Integrity in Clouds[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):2864-2872. [5]SHEN W,YU J,YANG M,et al.Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage[J].IEEE Transactions on Dependable and Secure Computing,2022,20(6):4593-4606. [6]LIU Z,WANG S,LIU Y.Block-Based Integrity Auditing forShared Data in Storage with File Prediction[J].Computer Networks,2023,236:110040. [7]DING R,XU Y,ZHONG H,et al.An Efficient Integrity Che-cking Scheme with Full Identity Anonymity for Cloud Data Sharing[J].IEEE Transactions on Cloud Computing,2023,11(3):2922-2935. [8]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:598-609. [9]JUELS A,KALISKI B S.PORs:Proofs of Retrievability forLarge Files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:584-597. [10]WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [11]TIAN H,GAN N,PENG F,et al.Smart Contract-Based Public Integrity Auditing for Cloud Storage Against Malicious Auditiors[J].Future Generation Computer Systems.2025,166:107709. [12]PENG W,LU T,WANG Z,et al.An Efficient Blockchain-Based Framework for File Sharing[J].Scientific Reports,2024,14:18009. [13]SHEN W,QIN J,YU J,et al.Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage[J].IEEE Transactions on Information Forensics and Security,2018,14(2):331-345. [14]LIU Z,REN L,LI R,et al,ID-based Sanitizable Signature Data Integrity Auditing Scheme with Privacy-Preserving[J].Compu-ters & Security,2022,121:102858. [15]SINGH P,SAGAR S,SINGH S,et al.Blockchain-Enabled Verification of Medical Records Using Soul-Bound Tokens and Cloud Computing[J].Scientific Reports,2024,14:24830. [16]FENG S,DENG L,GAO Y,et al.Blockchain-Based Remote Data Integrity Auditing Scheme with Deduplication Mechanism[J].Cluster Computing-The Journal of Networks Software Tools and Applications,2025,28(1):33-47. [17]ZHANG X,SU Y,QIN J.A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security[J].Security and Communication Networks,2020,1:1-13. [18]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2006:89-98. [19]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Eealization[C]//International Workshop on Public Key Cryptography.Berlin:Springer,2011:53-70. [20]LI H,PEI L,LIAO D,et al.FADE:A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain[J].IEEE Access,2020,8:85190-85203. [21]DUAN X,LI Y,XU Y,et al.An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things[C]//Proceedings of the 2024 3rd International Conference on Networks,Communications and Information Technology.New York:ACM,2024:161-165. [22]QIAO J,WANG N,FU J,et al.A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi-Party Computation[J].Transactions on Emerging Telecommunications Technologies,2025,36:70053. [23]XIONG H,WANG H,MENG W,et al.Attribute-Based dataSharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System[J].IEEE Transactions on Industrial Informatics,2023,19(11):10977-10986. [24]GUO Z,WANG G,LI Y,et al.Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network[J].IEEE Internet of Things Journal,2023,10(8):7011-7026. [25]SONG C,CHEN L,WU X,et al.A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology[J].Sensors.2025,25:160. [26]ZHANG W X,YAN Y X,WU Y H,et al.Certificateless Sanitizable Signature Scheme in Cloud Storage[J].Computer Systems &Applications,2023,32(1):281-287. [27]KIM H,JEON Y,KIM G,et al.PIPO:A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations[C]//Information Conference on Information Security & Cryptology.Cham:Springer,2020:99-122. |
|
||