浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院 南京210003
2. 江苏省无线传感网高技术研究重点实验室 南京210003
3. 网络与数据安全四川省重点实验室 成都610054
网络出版日期:2012-09,
纸质出版日期:2012-09-15
移动端阅览
王少辉, 陈丹伟, 王志伟, 等. 一种新的满足隐私性的云存储公共审计方案[J]. 电信科学, 2012,28(9):15-21.
Shaohui Wang, Danwei Chen, Zhiwei Wang, et al. A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security[J]. Telecommunications science, 2012, 28(9): 15-21.
王少辉, 陈丹伟, 王志伟, 等. 一种新的满足隐私性的云存储公共审计方案[J]. 电信科学, 2012,28(9):15-21. DOI: 10.11959/j.issn.1000-0801.2012.09.003.
Shaohui Wang, Danwei Chen, Zhiwei Wang, et al. A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security[J]. Telecommunications science, 2012, 28(9): 15-21. DOI: 10.11959/j.issn.1000-0801.2012.09.003.
在云存储网络环境中,数据的安全性、完整性和隐私性是用户最关心的问题之一。云存储服务中,用户将存储的数据和认证标识信息存储在云服务器中。为了保证存储数据的完整性,云存储服务提供者需要向用户或第三方审计者证明其正确地持有用户存储的数据。公共审计是指由用户以外的第三方代替用户完成审计工作,这对于计算资源比较有限的用户尤其重要。目前多数云存储审计方案没有考虑隐私性问题。本文提出了一种新的可聚合基于签名的广播加密(ASBB)方案,并在此基础上设计了新的满足隐私性的云存储公共审计方案。新方案在随机预言模型下是可证安全的,并且在计算开销方面更具有优势。
When user stores their data in the cloud storage
they most concern about whether the data is complete
privacy and unchanged. To ensure the availability and integrity of usersˊ stored data
cloud server must prove a verifier that it is actually storing all of a clientˊs data unchanged. And
enabling public auditability for cloud storage is of critical importance to users with constrained computing resources
who can resort to a third party auditor to check the integrity of outsourced data. However
most of the existing auditing schemes do not consider data privacy problem. In this paper
after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme
we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.
Einar M , Maithili N , Gene T . Authentication and integrity in outsourced databases . ACM Transactions on Storage , 2006 , 2 ( 2 ): 107 ~ 138
Ateniese G , Burns R , Curtmola R , et al . Provable Data Possession at Untrusted Stores . Cryptology ePrint Archive, Report 2007/202 , 2007
Ateniese G , Pietro R D , Mancini L V , et al . Scalable and efficient provable data possession . Proceedings of the 4th International Conference on Security and Privacy in Communication Networks , Istanbul, Turkey, ACM , 2008
Juels A , Kaliski B . Pors: proofs of retrievability for large files . Proceedings of CCS 2007 , Alexandria, VA, USA , 2007 : 584 ~ 597
Erway C , Kupcu A , Papamanthou C , et al . Dynamic Provable Data Possession . Cryptology ePrint Archive,Report 2008/432 , 2008
Wang Q , Wang C , Li J , et al . Enabling public verifiability and data dynamics for storage security in cloud computing . Lecture Notes in Computer Science , 2009 ( 5789 ): 355 ~ 370
Wang Q , Wang C , Ren K , et al . Enabling public auditability and data dynamics for storage security in cloud computing . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 5 ): 847 ~ 859
Shah M A , Baker M , Mogul J C , et al . Auditing to keep online storage services honest . Proceedings of HotOS'07 , Berkeley, CA, USENIX , 2007 : 1 ~ 6
Cao N , Yang Z Y , Wang C , et al . Privacy-preserving public auditing for data storage security in cloud computing . Proceedings of IEEE INFOCOM 2010 , San Diego,CA , 2010 : 525 ~ 533
Shacham H , Waters B . Compact proofs of retrievability . Proceedings of ASIACRYPT 2008 , Melbourne, Australia , 2008 : 90 ~ 107
Sebe F , Domingo-Ferrer J , Balleste A M , et al . Efficient remote data possession checking in critical information infrastructures . IEEE Transactions on Knowledge and Data English , 2008 : 1034 ~ 1038
Wang C , Wang Q , Ren K , et al . Ensuring data storage security in cloud computing . Proceedings of IW QoS 2009 , Charleston, South Carolina, USA , 2009
Bowers K D , Juels A , Oprea A . Proofs of retrievability: theory and implementation . Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conference , New York , 2009 : 43 ~ 54
Kamara S , Lauter K . Cryptographic cloud storage . Lecture Notes in Computer Science, Financial Cryptography and Data Security , Berlin, Springer , 2010 : 136 ~ 149
Hao Z , Yu N . A multiple-replica remote data possession checking protocol with public verifiability . Proceedings of Second Intˊ1 Data, Privacy and E-Commerce Sympoisum(ISDPE′10) , New York, USA , 2010
Zheng Q , Xu S . Fair and dynamic proofs of retrievability . Proceedings of 1st ACMM Conference on Data and Application Security and Privacy(CODASPY) , San Antonio, TX, USA , 2011
Wu Q , Mu Y , Susilo W , et al .Joux A(ed) Asymmetric group key agreement. EUROCRYPT 2009 , Springer, Heidelberg , 2009 : 153 ~ 170
Goldwasser S , Micali S , Rivest R . A digital signature scheme secure against adaptive chosen-message attacks , SIAM J Computing , 1988 , 17 ( 2 ): 281 ~ 308
Chaum D , Pederson P T .E F Brichell(ed) Wallet databases with observers . Advances in Cryptology-CRYPTO'92,LNCS 740 , 1993 : 89 ~ 105
0
浏览量
413
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构