Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2014, Vol. 15 Issue (9): 794-804    DOI: 10.1631/jzus.C1400045
    
NaEPASC:一种新颖且高效的云数据公开审计机制
Shuang Tan, Yan Jia
School of Computer, National University of Defense Technology, Changsha 410073, China
NaEPASC: a novel and efficient public auditing scheme for cloud data
Shuang Tan, Yan Jia
School of Computer, National University of Defense Technology, Changsha 410073, China
 全文: PDF 
摘要: 研究目的:随着云计算的广泛深入,越来越多用户选择云来存储数据。由于用户在本地可能不再保存任何数据副本,云中数据的完整性难以有效判定。另外,同一用户可能需要存储多份数据到云中,因此简化密钥管理也成为一个关键问题。本文尝试设计一种满足云存储环境的、基于身份的数据完整性验证机制,以检测云中数据的正确性。
\n创新要点:参考基于身份的签名机制,提出一种基于身份的数据完整性验证模型,包括私钥生成服务器、用户、云存储服务器及第三方审计。该机制不仅能够有效检测数据完整性,而且简化了用户密钥管理,包括密钥恢复和密钥存储。另外,协议采用的公钥为用户公开的信息,如邮件等。
\n重要结论:本文设计的验证机制能够有效检测云中侵犯用户数据完整性的违规行为。通过考虑用户身份信息,简化了用户的密钥管理,也减轻了第三方审计者的审计负担。安全证明和安全试验表明NaEPASC是一种安全、高效的完整性验证机制。
关键词: 云计算基于身份的数据安全完整性公开审计    
Abstract: Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure, which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor (TPA) to check the integrity of outsourced data. Moreover, an identity-based (ID-based) public key cryptosystem would be an efficient key management scheme for certificate-based public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users’ identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme.
Key words: Cloud storage    Public verification    Identity-based aggregate signature
收稿日期: 2014-02-09 出版日期: 2014-09-06
CLC:  TP309.2  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Shuang Tan
Yan Jia

引用本文:

Shuang Tan, Yan Jia. NaEPASC: a novel and efficient public auditing scheme for cloud data. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C1400045        http://www.zjujournals.com/xueshu/fitee/CN/Y2014/V15/I9/794

[1] Aftab Ahmed Chandio, Nikos Tziritas, Fan Zhang, Ling Yin, Cheng-Zhong Xu. 基于云计算的自适应可调节GPS轨迹地图匹配策略[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(12): 1305-1319.
[2] Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou. 基于流近似的移动云计算系统服务可用性分析方法[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(7): 553-567.
[3] Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem. 云计算数据中心网络结构:回顾、分类与研究热点展望[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 776-793.