一种改进的云存储数据完整性验证方法
An Improved Data Integrity Verification Method for Cloud Storage
查看参考文献17篇
文摘
|
已有多数云存储数据完整性验证方法效率较低、通信开销较大。为此,提出一种改进的云存储数据完整性验证方法。利用双线性对技术进行数据完整性验证以实现公开验证功能,设计索引表机制进行动态验证,采用随机掩码技术提高方法的安全性。分析与实验结果表明,该方法能有效抵抗服务器的恶意攻击,且具有较低的通信开销与较高的计算效率。 |
其他语种文摘
|
Most existing cloud storage data integrity verification methods have low efficiency and high communication overhead.To solve this problem,an improved data integrity verification method for cloud storage is proposed.The bilinear pairing technique is used to verify the data integrity in order to realize the public verification function.The indexing table mechanism is designed for dynamic verification.The random mask technique is used to improve the security of the method.Analysis and experimental results show that this method can effectively resist malicious attacks on servers,and has lower communication overhead and higher computing efficiency. |
来源
|
计算机工程
,2019,45(3):36-40 【扩展库】
|
DOI
|
10.19678/j.issn.1000-3428.0049086
|
关键词
|
数据完整性
;
动态验证
;
公开验证
;
云存储
;
双线性对
|
地址
|
广东工业大学计算机学院, 广州, 511400
|
语种
|
中文 |
文献类型
|
研究性论文 |
ISSN
|
1000-3428 |
学科
|
自动化技术、计算机技术 |
基金
|
广东省科技计划项目
;
广东省广州市科技计划项目
|
文献收藏号
|
CSCD:6504273
|
参考文献 共
17
共1页
|
1.
Mell P. The nist definition of cloud computing.
National Institute of Standards and Technology,2009,53(6):50-57
|
CSCD被引
13
次
|
|
|
|
2.
王文娟. 云计算安全审计技术研究综述.
计算机科学,2017,44(7):16-20,30
|
CSCD被引
2
次
|
|
|
|
3.
Ateniese G. Provable data possession at untrusted stores.
Proceedings of the 14th ACM Conference on Computer and Communications Security,2007:598-609
|
CSCD被引
70
次
|
|
|
|
4.
Ateniese G. Proofs of storage from homomorphic identification protocols.
Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security,2009:319-333
|
CSCD被引
1
次
|
|
|
|
5.
Erway C C. Dynamic provable data possession.
ACM Transactions on Information and System Security,2009,17(4):213-222
|
CSCD被引
37
次
|
|
|
|
6.
Juels A. Pors: proofs of retrievability for large files.
Proceedings of ACM Conference on Computer and Communications Security,2007:584-597
|
CSCD被引
6
次
|
|
|
|
7.
Wang Q. Enabling public verifiability and data dynamics for storage security in cloud computing.
Proceedings of European Conference on Research in Computer Security,2009:355-370
|
CSCD被引
2
次
|
|
|
|
8.
Zhu Y. Efficient audit service outsourcing for data integrity in clouds.
Journal of Systems and Software,2012,85(5):1083-1095
|
CSCD被引
7
次
|
|
|
|
9.
Zhu Y. Cooperative provable data possession for integrity verification in multicloud storage.
IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244
|
CSCD被引
45
次
|
|
|
|
10.
谭霜. 云存储中的数据完整性证明研究及进展.
计算机学报,2015,38(1):164-177
|
CSCD被引
52
次
|
|
|
|
11.
周锐. 基于同态哈希函数的云数据完整性验证算法.
计算机工程,2014,40(6):64-69
|
CSCD被引
5
次
|
|
|
|
12.
杨小东. 基于代理重签名的云端数据完整性验证方案.
计算机工程,2018,44(9):130-135
|
CSCD被引
2
次
|
|
|
|
13.
Wang H. An efficient provable data possession based on elliptic curves in cloud storage.
International Journal of Security and Its Applications,2014,8(5):97-108
|
CSCD被引
1
次
|
|
|
|
14.
Yang K. An efficient and secure dynamic auditing protocol for data storage in cloud computing.
IEEE Transactions on Parallel and Distributed Systems,2013,24(9):1717-1726
|
CSCD被引
47
次
|
|
|
|
15.
Wang C.
Privacy-preserving public auditing for data storage security in cloud computing,2017
|
CSCD被引
1
次
|
|
|
|
16.
何凯. 云存储中数据完整性的聚合盲审计方法.
通信学报,2015,36(10):119-132
|
CSCD被引
6
次
|
|
|
|
17.
Ateniese G. Provable data possession at untrusted stores.
Proceedings of ACM Conference on Computer and Communications Security,2007:598-609
|
CSCD被引
5
次
|
|
|
|
|