Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240400040-10.doi: 10.11896/jsjkx.240400040

• Information Security • Previous Articles     Next Articles

Airborne Software Provable Data Possession for Cloud Storage

YUE Meng1, WEN Cheng1, HONG Xueting2, YAN Simin1   

  1. 1 School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China
    2 China Mobile Group Anhui Company Limited Wuhu Branch,Wuhu,Anhui 241100,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:YUE Meng,born in 1984,Ph.D,professor,Ph.D supervisor,is a member of CCF(No.I8925M).His main research interests include network intrusion detection and defense and civil aviation information security.
  • Supported by:
    National Natural Science Foundation of China(621724183) and Tianjin Natural Science Foundation(21JCZDJC00830).

Abstract: With the increasing number of civil aviation airborne software,the traditional software distribution methods face the problems of low efficiency,high cost and poor security.In order to improve the distribution efficiency of airborne software,we combine cloud storage with airborne software and propose an airborne software storage architecture based on Cloud-P2P,which realizes distributed cloud storage of airborne software and airborne software sharing.On this basis,a provable data possession is proposed,which reduces the risk of complicity by binding the logo to the public key,and completes the integrity verification of the airborne software through sampling audit,reducing the verification cost.Security analysis shows that this scheme is unforgeable and resistant to replay attacks,and proves the correctness of the data-holding proof protocol.Compared with existing data integrity auditing schemes,the computational overhead is reduced by 10% and the communication overhead is reduced by 20%.This research has practical implications for ensuring efficient and secure distribution of airborne software.

Key words: Airborne software, Cloud storage, P2P, Provable data possession, Sampling audit

CLC Number: 

  • V328.3
[1]Best Practices for Loadable Software Management and Configuration Control[R].International Air Transport Association Engineering and Maintenance Group,2013:1-3.
[2]QUAN Y Q.Research on Architecture Design and Safety Ana-lysis of Avionics Architecture Databus Network for Commercial Aircraft[C]//Proceedings of 2018 3rd International Workshop on Materials Engineering and Computer Sciences(IWMECS 2018).2018:39-45.
[3]AMARNATH J,SURYA M,BHARGAV P,et al.Cloud com-puting in Aircraft Data Network[C]//2011 Integrated Communications,Navigation,and Surveillance Conference Proceedings.Herndon:IEEE Press,2011:E7-1-E7-8.
[4]FAN C,HAN Z,ZHAO L.Research on Cloud Storage Techno-logy of Avionics System[J].Electronics Optics & Control,2022,29(3):69-74,80.
[5]Arinc Report 835-1:Guidance for Security of Loadable Software Parts Using Digital Signatures[S].ARINC Airlines Electronic Engineering Committee.2014:10-29.
[6]LIU J,HUANG K,RONG H,et al.Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage[J].IEEE Transactions on Information Forensics and Security,2015,10(7):1513-1528.
[7]BARSOUM A F,HASAN M A.Provable Multicopy DynamicData Possession in Cloud Computing Systems[J].IEEE Transactions on Information Forensics and Security,2015,10(3):485-497.
[8]YU J,REN K,WANG C,et al.Enabling Cloud Storage Auditing with Key-Exposure Resistance[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1167-1179.
[9]YANG K,JIA X.An Efficient and Secure Dynamic AuditingProtocol for Data Storage in Cloud Computing[J].IEEE Transactions onParallel and Distributed Systems,2013,24(9):1717-1726.
[10]ZHU Y,HU H,AHN G J,et al.Efficient Audit Service Outsourcing for Data Integrity in Clouds[J].Journal of Systems and Software,2012,865(5):1083-1095.
[11]WANG J,CHEN X,HUANG X,et al.Verifiable Auditing for Outsourced Database in Cloud Computing[J].IEEE Transactions on Computers,2015,64(11):3293-3303.
[12]LIU C,RANJAN R,YANG C,et al.MuRDPA:Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud[J].IEEE Transactions on Computers,2015,64(9):2609-2622.
[13]WANG H Q.Identity-Based Distributed Provable Data Possession in Multicloud Storage[J].IEEE Transactions on Services Computing,2015,8(2):328-340.
[14]WANG H Q,WU Q H,QIN B,et al.Identity-Based RemoteData Possession Checking in Public Clouds[J].IET Information Security,2014,8(2):114-121.
[15]GUDEME J R,PASUPULETI S K,KANDUKURI R.Attribute-Based Public Integrity Auditing for Shared Data with Efficient User Revocation in Cloud Storage[J].Journal of Ambient Intelligence and Humanized Computing,2020,12(2):2019-2032.
[16]YU Y,LI Y N,YANG B,et al.Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage[J].IEEE Transactions on Emerging Topics in Computing,2020,8(2):377-390.
[17]ZHANG Y,YU J,HAO R,et al.Enabling Efficient User Revocation inIdentity-Based Cloud Storage Auditing for Shared Big Data[J].IEEE Transactions on Dependable and Secure Computing,2020,17(3):608-619.
[18]REHMAN A,LIU J,YASIN M Q,et al.Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation[J].Chinese Journal of Electronics,2021,30(3):489-499.
[19]YOOSUF M S,ANITHA R.LDuAP:lightweight dual auditing protocol to verify dataintegrity in cloud storage servers[J].Journal of Ambient Intelligence and Humanized Computing,2022,13:3787-3805.
[20]LI WH,HAN C,ZHAO Y K,et al.Distributed Integrated Modular Avionics System Architecture Design[C]//Proceedings of the Ninth China Aviation Society Youth Science and Technology Forum.Beijing:China Aviation Publishing & Media CO.2020:971-977.
[21]LIU Y,JIN X,WEI X H.System Management Function Design Based on Distributed Avionics System[J].Electronics Optics & Control,2022,29(9):74-77,95.
[22]Arinc Report 667-2:Guidance for Management of Field Loadable Software[S].ARINC Airlines Electronic Engineering Committee.2017:9-23.
[23]Arinc Report 665-3:Loadable Software Standards[S].ARINC Airlines Electronic Engineering Committee.2005:6-26.
[1] YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6.
[2] WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370.
[3] WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307.
[4] SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21.
[5] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[6] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[7] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[8] ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309.
[9] LI Long-fei,ZHANG Jing-zhou,WANG Peng-de,GUO Peng-jun. P2P Network Search Mechanism Based on Node Interest and Q-learning [J]. Computer Science, 2020, 47(2): 221-226.
[10] LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261.
[11] BAI Li-fang, ZHU Yue-fei, LU Bin. Research and Development of Data Storage Security Audit in Cloud [J]. Computer Science, 2020, 47(10): 290-300.
[12] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[13] WU Dan-dan, LYU Xin. Location Anonymous Algorithm Based on User Collaboration under Distributed Structure [J]. Computer Science, 2019, 46(4): 158-163.
[14] XIE Si-jiang,JIA Bei,WANG He,XU Shi-cong. Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree [J]. Computer Science, 2019, 46(3): 188-196.
[15] GU Chen-yang, FU Wei, LIU Jin-long, SUN Gang. Survey of ORAM Research in Cloud Storage [J]. Computer Science, 2019, 46(11A): 341-347.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!