计算机科学 ›› 2019, Vol. 46 ›› Issue (3): 188-196.doi: 10.11896/j.issn.1002-137X.2019.03.028
谢四江1,2,贾倍1,王鹤2,许世聪1
XIE Si-jiang1,2,JIA Bei1,WANG He2,XU Shi-cong1
摘要: 随着互联网和移动电子设备的不断普及,网络化存储将成为未来的主要存储方式,而目前的云存储方式也将会是网络化存储的必然趋势,因此如何确保云存储环境下用户数据的完整性成为人们关注的主要问题。针对该问题,提出了一种基于多分支路径树的云存储大数据完整性证明机制,通过引入第三方代理实现公开验证,加入随机掩码实现数据隐私,基于多分支路径树这一动态数据结构实现动态操作,并针对多分支路径树提出一种新的数据完整性检测算法。实验结果表明,所提方案可以高效地完成大量数据的更新,同时支持多用户的数据完整性验证。
中图分类号:
[1]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:598-609. [2]THANGAVEL M,VARALAKSHMI P,SINDHUJA R,et al.A survey on provable data possession in cloud storage[C]∥2016 Eighth International Conference on Advanced Computing (ICoAC).IEEE,2017:25-31. [3]TAN S,JIA Y,HAN W H.Research and Development of Prova- ble Data Integrity in Cloud Storage[J].Chinese Journal of Comptuers,2015,38(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [4]JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597. [5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:9. [6]WANG C,WANG Q,REN K,et al.Ensuring Data Storage Security in Cloud Computing[C]∥2009 17th International Workshop on Quality of Service.IEEE,2009:1-9. [7]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:355-370. [8]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [9]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession[J].ACM Transactions on Information &System Security,2015,17(4):1-29. [10]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222. [11]WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9. [12]WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [13]ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]∥Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:183-194. [14]LIN C,LUO F,WANG H,et al.A provable data possession scheme with data hierarchy in cloud[C]∥International Con-ference on Information Security and Cryptology.Springer International Publishing,2015:301-321. [15]WANG H.Identity-based distributed provable data possession in multicloudstorage[J].IEEE Transactions on Service Computing,2015,8(2):328-340. [16]ETEMAD M,KP A.Transparent,distributed,and replicated dynamic provable data possession[C]∥International Con-ference on Applied Cryptography and Network Security.Sprin-ger Berlin Heidelberg,2013:1-18. [17]ZOU J,SUN Y,LI S.Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree[C]∥2016 International Con-ference on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2016:4-9. [18]LI L,YANG Y,WU Z.FMR-PDP:Flexible multiple-replica provable data possession in cloud storage[C]∥2017 IEEE Symposium on Computers and Communications(ISCC).IEEE,2017:1115-1121. [19]PENG S,ZHOU F,WANG Q,et al.Identity-Based Public Multi-Replica Provable Data Possession[J].IEEE Access,2017,5:26990-27001 [20]RAJENDRAN A,BALASUBRAMANIAN V,MALA T.Integrity verification using Identity based Provable Data Possession in multi storage cloud[C]∥2017 International Conference on Computational Intelligence in Data Science (ICCIDS).IEEE,2017:1-4. [21]HUANG D,WAN C.PDPMT:Provable data possession for multiple cloud tenants[C]∥2017 10th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI).IEEE,2017:1-6. |
[1] | 徐堃, 付印金, 陈卫卫, 张亚男. 基于区块链的云存储安全研究进展 Research Progress on Blockchain-based Cloud Storage Security Mechanism 计算机科学, 2021, 48(11): 102-115. https://doi.org/10.11896/jsjkx.210600015 |
[2] | 李莹, 于亚新, 张宏宇, 李振国. 基于TBchain区块链的高可信云存储模型 High Trusted Cloud Storage Model Based on TBchain Blockchain 计算机科学, 2020, 47(9): 330-338. https://doi.org/10.11896/jsjkx.190800147 |
[3] | 陈利锋, 朱路平. 一种基于云端加密的FPGA自适应动态配置方法 Encrypted Dynamic Configuration Method of FPGA Based on Cloud 计算机科学, 2020, 47(7): 278-281. https://doi.org/10.11896/jsjkx.190700110 |
[4] | 张茜, 王箭. 用户身份可追踪的云共享数据完整性审计方案 Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking 计算机科学, 2020, 47(6): 303-309. https://doi.org/10.11896/jsjkx.190600079 |
[5] | 李树全,刘磊,朱大勇,熊超,李锐. 一种面向云存储的数据动态验证方案 Protocol of Dynamic Provable Data Integrity for Cloud Storage 计算机科学, 2020, 47(2): 256-261. https://doi.org/10.11896/jsjkx.181202371 |
[6] | 白利芳, 祝跃飞, 芦斌. 云数据存储安全审计研究及进展 Research and Development of Data Storage Security Audit in Cloud 计算机科学, 2020, 47(10): 290-300. https://doi.org/10.11896/jsjkx.191000111 |
[7] | 乔毛,秦岭. 云存储服务中一种高效属性撤销的AB-ACCS方案 AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services 计算机科学, 2019, 46(7): 96-101. https://doi.org/10.11896/j.issn.1002-137X.2019.07.015 |
[8] | 顾晨阳, 付伟, 刘金龙, 孙刚. 云存储中的ORAM研究综述 Survey of ORAM Research in Cloud Storage 计算机科学, 2019, 46(11A): 341-347. |
[9] | 吴修国, 刘翠. 云存储系统中最小开销的数据副本布局转换策略 Data Replicas Distribution Transition Strategy in Cloud Storage System 计算机科学, 2019, 46(10): 202-208. https://doi.org/10.11896/jsjkx.180901623 |
[10] | 金瑜,蔡超,何亨,李鹏. BTDA:基于半可信第三方的动态云数据更新审计方案 BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party 计算机科学, 2018, 45(3): 144-150. https://doi.org/10.11896/j.issn.1002-137X.2018.03.023 |
[11] | 刘宴涛, 刘珩. 一种基于网络编码的云存储系统 Cloud Storage System Based on Network Coding 计算机科学, 2018, 45(12): 293-298. https://doi.org/10.11896/j.issn.1002-137X.2018.12.047 |
[12] | 庞晓琼, 任孟琦, 王田琪, 陈文俊, 聂梦飞. 一种支持完美隐私保护的批处理数据拥有性证明方案 Perfect Privacy-preserving Batch Provable Data Possession 计算机科学, 2018, 45(11): 130-137. https://doi.org/10.11896/j.issn.1002-137X.2018.11.019 |
[13] | 张桂鹏, 陈平华. 一种混合云环境下基于Merkle哈希树的数据安全去重方案 Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments 计算机科学, 2018, 45(11): 187-192. https://doi.org/10.11896/j.issn.1002-137X.2018.11.029 |
[14] | 田晖,陈羽翔,黄永峰,卢璥. 云数据持有性审计研究与进展 Research and Development of Auditing Techniques for Cloud Data Possession 计算机科学, 2017, 44(6): 8-16. https://doi.org/10.11896/j.issn.1002-137X.2017.06.002 |
[15] | 徐云云,白光伟,沈航,黄中平. 云存储中基于虚拟用户的数据完整性验证 Virtual-user-based Public Auditing Integrity in Cloud Storage 计算机科学, 2017, 44(5): 95-99. https://doi.org/10.11896/j.issn.1002-137X.2017.05.017 |
|