计算机科学 ›› 2017, Vol. 44 ›› Issue (2): 195-201.doi: 10.11896/j.issn.1002-137X.2017.02.031
金瑜,严冬
JIN Yu and YAN Dong
摘要: 云存储是一种新兴的网络存储技术,它是云计算提供的一个重要服务。云存储因其快速、廉价和方便而广受云用户喜爱。然而,它也给云用户的外包数据带来了许多安全问题。其中一个重要问题就是如何确保半可信云服务器上数据的完整性。因此,云用户和云服务器亟需一个稳定、安全、可信的数据审计方法。随着大数据时代的到来,传统数据审计方案批量处理云环境下海量数据的效率不高;并且,随着移动客户端的流行,传统数据审计方案带给用户的在线负担太过繁重。因此,提出一种基于MapReduce编程框架的云数据审计方案,使用代理签名技术将用户对数据签名计算代理出去,并且并行化处理数据签名和批量审计过程。实验结果表明,所提方法明显提高了批量审计的效率,增强了云存储服务的可用性,并且减轻了用户的在线负担。
[1] LIU P.Cloud Computing (Second edition)[M].Beijing:Beijing Electronic Industry Press,2011. [2] MELL P,GRANCE T.The NIST definition of cloud computing[J].Communications of the ACM,2011,3(6):50 . [3] HASAN R,YURCIK W,MYAGMAR S.The evolution of sto-rage service providers:techniques and challenges to outsourcing storage[J].ACM Workshop on Storage Security & Survivability ACM,2005:1-8. [4] MORSY M A,GRUNDY J,MLLER I.An Analysis of theCloud Computing Security Problem[C]∥Proceedings of APSEC 2010 Cloud Workshop.Sydney,Australia,2010. [5] GIANI A,BITAR E,GARCIA M,et al.Smart Grid Data Integrity Attacks[J].IEEE Transactions on Smart Grid,2013,4(3):1244-1253. [6] OUALHA N,LENEUTRE J,ROUDIER Y.Verifying remote data integrity in peer-to-peer data storage:A comprehensive survey of protocols[J].Peerto-Peer Networking and Applications,2012,5(3):231-243. [7] WANG C,REN K,LOU W,et al.Toward publicly auditable secure cloud data storage services[J].Network,IEEE,2010,24(4):19-24. [8] MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation Of the power to sign messages[J].Ieice Transactions on Fundamentals of Electronics Communications & Computer Scien-ces,1996,79(9):1338-1354. [9] ATENIESE G,BURNS R C,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Secu-rity.2007:598-609. [10] JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597. [11] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:1-10. [12] ERWAY C.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222. [13] WANG C,WANG Q,REN K.Ensuring data storage security in cloud computing[C]∥17th International Workshop on Quality of Service,2009.IWQoS.2009. [14] WANG Q,WANG C,LI J,et al.Enabling public verifiabilityand data dynamics for storage security in cloud computing[M]∥Computer Security(ESORICS 2009).Springer Berlin Heidelberg,2009:355-370. [15] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥ 2010 Proceedings IEEE INFOCOM.2010:1-9. [16] WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [17] KIM S,PARK S,WON D.Proxy signatures,Revisited[J].Infor-mation and Communications Security,1997:223-232. [18] http://wiki.apache.org/hadoop/#MapReduce. [19] GUO Peng.Cassandra in Action.China Machine Press. |
No related articles found! |
|