计算机科学 ›› 2017, Vol. 44 ›› Issue (2): 195-201.doi: 10.11896/j.issn.1002-137X.2017.02.031

• 信息安全 • 上一篇    下一篇

基于MapReduce的云存储数据审计方法研究

金瑜,严冬   

  1. 武汉科技大学计算机科学与技术学院 武汉430065湖北省智能信息处理与实时工业系统重点实验室 武汉430065,武汉科技大学计算机科学与技术学院 武汉430065湖北省智能信息处理与实时工业系统重点实验室 武汉430065
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金:云计算环境下基于行为的动态信任模型研究(61303117)资助

Research on MapReduce-based Data Auditing Method for Cloud Storage

JIN Yu and YAN Dong   

  • Online:2018-11-13 Published:2018-11-13

摘要: 云存储是一种新兴的网络存储技术,它是云计算提供的一个重要服务。云存储因其快速、廉价和方便而广受云用户喜爱。然而,它也给云用户的外包数据带来了许多安全问题。其中一个重要问题就是如何确保半可信云服务器上数据的完整性。因此,云用户和云服务器亟需一个稳定、安全、可信的数据审计方法。随着大数据时代的到来,传统数据审计方案批量处理云环境下海量数据的效率不高;并且,随着移动客户端的流行,传统数据审计方案带给用户的在线负担太过繁重。因此,提出一种基于MapReduce编程框架的云数据审计方案,使用代理签名技术将用户对数据签名计算代理出去,并且并行化处理数据签名和批量审计过程。实验结果表明,所提方法明显提高了批量审计的效率,增强了云存储服务的可用性,并且减轻了用户的在线负担。

关键词: 云存储,数据审计,MapReduce,代理签名

Abstract: Cloud storage is a new network storage technology.It is an important service provided by cloud computing.Cloud storage is very popular in cloud users for its characteristics of speediness,low price and convenience.However,it also brings many security problems towards user’s outsourced data.One major problem is to ensure the integrity of data at semi-trusted cloud server.So cloud users and cloud servers are both in urgent need of a stable,safe and credible data auditing method.With the arrival of the era of big data,the efficiency of dealing with huge amounts of data in cloud by traditional data batch auditing methods is not high.What’s more,with the popularity of mobile clients,the traditional auditing methods bring too much online burden to cloud user.Therefore,this paper proposed a data auditing method based on MapReduce programming framework for cloud storage.It uses the technology of proxy signature,which deals with data signing instead of cloud user.Moreover,it can also complete the work of data signing and batch auditing in parallel.The experiment results show that the proposed method clearly improves the efficiency of batch auditing,enhances the availability of cloud storage service and reduces the online burden towards cloud user.

Key words: Cloud storage,Data auditing,MapReduce,Proxy signature

[1] LIU P.Cloud Computing (Second edition)[M].Beijing:Beijing Electronic Industry Press,2011.
[2] MELL P,GRANCE T.The NIST definition of cloud computing[J].Communications of the ACM,2011,3(6):50 .
[3] HASAN R,YURCIK W,MYAGMAR S.The evolution of sto-rage service providers:techniques and challenges to outsourcing storage[J].ACM Workshop on Storage Security & Survivability ACM,2005:1-8.
[4] MORSY M A,GRUNDY J,MLLER I.An Analysis of theCloud Computing Security Problem[C]∥Proceedings of APSEC 2010 Cloud Workshop.Sydney,Australia,2010.
[5] GIANI A,BITAR E,GARCIA M,et al.Smart Grid Data Integrity Attacks[J].IEEE Transactions on Smart Grid,2013,4(3):1244-1253.
[6] OUALHA N,LENEUTRE J,ROUDIER Y.Verifying remote data integrity in peer-to-peer data storage:A comprehensive survey of protocols[J].Peerto-Peer Networking and Applications,2012,5(3):231-243.
[7] WANG C,REN K,LOU W,et al.Toward publicly auditable secure cloud data storage services[J].Network,IEEE,2010,24(4):19-24.
[8] MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation Of the power to sign messages[J].Ieice Transactions on Fundamentals of Electronics Communications & Computer Scien-ces,1996,79(9):1338-1354.
[9] ATENIESE G,BURNS R C,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Secu-rity.2007:598-609.
[10] JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597.
[11] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:1-10.
[12] ERWAY C.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222.
[13] WANG C,WANG Q,REN K.Ensuring data storage security in cloud computing[C]∥17th International Workshop on Quality of Service,2009.IWQoS.2009.
[14] WANG Q,WANG C,LI J,et al.Enabling public verifiabilityand data dynamics for storage security in cloud computing[M]∥Computer Security(ESORICS 2009).Springer Berlin Heidelberg,2009:355-370.
[15] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥ 2010 Proceedings IEEE INFOCOM.2010:1-9.
[16] WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[17] KIM S,PARK S,WON D.Proxy signatures,Revisited[J].Infor-mation and Communications Security,1997:223-232.
[18] http://wiki.apache.org/hadoop/#MapReduce.
[19] GUO Peng.Cassandra in Action.China Machine Press.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!