浏览全部资源
扫码关注微信
1. 北京科技大学计算机与通信工程学院,北京 100083
2. 国网四川省电力公司经济技术研究院,四川 成都 610041
[ "王双星(1996- ),男,北京科技大学计算机与通信工程学院硕士生,主要研究方向为区块链技术与隐私保护。" ]
[ "罗劲瑭(1989- ),男,博士,国网四川省电力公司经济技术研究院研究员,主要研究方向为数据中心网络中的拥塞控制和信息安全。" ]
[ "帅莉莎(1995- ),女,北京科技大学计算机与通信工程学院博士生,主要研究方向为移动人群感知和互联网安全。" ]
[ "张佳敏(1992- ),女,北京科技大学计算机与通信工程学院博士生,主要研究方向为网络和信息安全、隐私保护。" ]
[ "张敏(1972- ),女,北京科技大学计算机与通信工程学院副教授,主要研究方向为新一代互联网技术、内容分发网络、智能电网CPS安全等。" ]
[ "阳小龙(1970- ),男,博士,北京科技大学计算机与通信工程学院教授、博士生导师,主要研究方向为IP路由与交换、云计算数据/内容中心网络、网络安全等。" ]
网络出版日期:2021-03,
纸质出版日期:2021-03-20
移动端阅览
王双星, 罗劲瑭, 帅莉莎, 等. 基于区块链的云数据匿名确定性删除方法[J]. 电信科学, 2021,37(3):90-104.
Shuangxing WANG, Jintang LUO, Lisha SHUAI, et al. Cloud data anonymous assured deletion approach based on blockchain[J]. Telecommunications science, 2021, 37(3): 90-104.
王双星, 罗劲瑭, 帅莉莎, 等. 基于区块链的云数据匿名确定性删除方法[J]. 电信科学, 2021,37(3):90-104. DOI: 10.11959/j.issn.1000-0801.2021049.
Shuangxing WANG, Jintang LUO, Lisha SHUAI, et al. Cloud data anonymous assured deletion approach based on blockchain[J]. Telecommunications science, 2021, 37(3): 90-104. DOI: 10.11959/j.issn.1000-0801.2021049.
现有确定性删除方案忽略了用户数据与用户身份的关联性,使用户的删除行为暴露给攻击者或云服务提供商。为解决此问题,提出一种基于区块链的云数据匿名确定性删除方法。该方法改进了可链接环签名方案,使用户可以通过控制签名中的链接标记在匿名情况下实现确定性删除;同时,它利用区块链记录删除行为,使其具有不可抵赖性。理论分析和实验表明:该方法不仅能满足用户数据的确定性删除要求,而且具有匿名性可以切断用户数据与其身份的关联,从而有效避免攻击者或云服务提供商对用户行为的追踪分析。
The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity
exposing user behavior to the cloud service provider or attackers.Aiming at the above problems
an assured deletion approach based on blockchain was proposed.The improved linkable ring signature scheme was adopted to make user achieve anonymous assured deletion by setting specific link symbol in the signature.Moreover
the blockchain technology was leveraged to guarantee the nonrepudiation of assured deletion.Theoretical analysis and experimental results show that the proposed approach can meet the assured deletion requirements of user data in cloud storage
and its anonymity can effectively prevent attackers from tracking and analyzing user behavior.
熊金波 , 李凤华 , 王彦超 , 等 . 基于密码学的云数据确定性删除研究进展 [J ] . 通信学报 , 2016 , 37 ( 8 ): 167 - 184 .
XIONG J B , LI F H , WANG Y C , et al . Research progress on cloud data assured deletion based on cryptography [J ] . Journal on Communications , 2016 , 37 ( 8 ): 167 - 184 .
NAIR S K , DASHTI M T , CRISPO B , et al . A hybrid PKI-IBC based ephemerizer system [C ] // Proceedings of the International Information Security Conference .[S.l.:s.n. ] , c2007 : 241 - 252 .
TANG Y , LEE P P , LUI J C , et al . FADE:secure overlay cloud storage with file assured deletion [C ] // Proceedings of the Security and Privacy in Communication Networks (SecureComm) .[S.l.:s.n. ] , c2010 : 380 - 397 .
GEAMBASU R , KOHNO T , LEVY A , et al . Vanish:increasing data privacy with self-destructing data [C ] // Proceedings of the 18th USENIX Security Symposium .[S.l.:s.n. ] , c2009 : 299 - 315 .
DABEK F . A distributed hash table [D ] . Massachusetts:Massachusetts Institute of Technology , 2005 .
WOLCHOK S , HOFMANN O S , HENINGER N , et al . Defeating vanish with lowcost sybil attacks against large DHTs [C ] // Proceedings of the 17th Annual Network & Distributed System Security Conference (ISOC NDSS) .[S.l.:s.n. ] , c2010 : 1 - 15 .
ZENG L , SHI Z , XU S , et al . SafeVanish:an improved data self-destruction for protecting data privacy [C ] // Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom) . Piscataway:IEEE Press , 2010 : 521 - 528 .
熊金波 , 沈薇薇 , 黄阳群 , 等 . 云环境下的数据多副本安全共享与关联删除方案 [J ] . 通信学报 , 2015 , 36 ( S1 ): 136 - 140 .
XIONG J B , SHEN W W , HUANG Y Q , et al . Security sharing and associated deleting scheme for multi-replica in cloud [J ] . Journal on Communications , 2015 , 36 ( S1 ): 136 - 140 .
ZHANG M , ZHANG H , YANG Y , et al . PTAD:provable and traceable assured deletion in cloud storage [C ] // Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC) . Piscataway:IEEE Press , 2019 .
杜瑞忠 , 石朋亮 , 何欣枫 . 基于覆写验证的云数据确定性删除方案 [J ] . 通信学报 , 2019 , 40 ( 1 ): 130 - 140 .
DU R Z , SHI P L , HE X F . Cloud data assured deletion scheme based on overwrite verification [J ] . Journal on Communications , 2019 , 40 ( 1 ): 130 - 140 .
余海波 . 基于区块链的数据分布式存储安全机制研究 [D ] . 上海:华东师范大学 , 2020 .
YU H B . Research on security mechanism of data distributed storage based on blockchain [D ] . Shanghai:East China Normal University , 2020 .
SHAMIR A . How to share a secret [J ] . Communications of the ACM , 1979 , 22 ( 11 ): 612 - 613 .
LIU J K , WEI V K , WONG D S . Linkable spontaneous anonymous group signature for Ad Hoc groups [C ] // Proceedings of the Australasian Conference on Information Security and Privacy . Heidelberg:Springer , 2004 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [Z ] . 2008 .
李董 , 魏进武 . 区块链技术原理、应用领域及挑战 [J ] . 电信科学 , 2016 , 32 ( 12 ): 20 - 25 .
LI D , WEI J W . Theory,application fields and challenge of the blockchain technology [J ] . Telecommunications Science , 2016 , 32 ( 12 ): 20 - 25 .
LI G , SATO H . A privacy-preserving and fully decentralized storage and sharing system on blockchain [C ] // Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) . Piscataway:IEEE Press , 2019 .
曹景源 , 李立新 , 李全良 , 等 . 云存储环境下生命周期可控的数据销毁模型 [J ] . 计算机应用 , 2017 , 37 ( 5 ): 1335 - 1340 .
CAO J Y , LI L X , LI Q L , et al . Data destruction model for cloud storage based on lifecycle control [J ] . Journal of Computer Applications , 2017 , 37 ( 5 ): 1335 - 1340 .
周亮 , 王震 , 王冠 . 远程过程调用技术在分布式软件系统中的应用 [J ] . 航空电子技术 , 2020 , 51 ( 4 ): 47 - 52 .
ZHOU L , WANG Z , WANG G . Application of remote procedure calling technology in distributed software system [J ] . Avionics Technology , 2020 , 51 ( 4 ): 47 - 52 .
Carlos-Zen,blockchain-python [S ] . 2018 .
0
浏览量
579
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构