基于模糊身份的动态数据审计方案
作者:
基金项目:

国家自然科学基金(U1905211,61771140);福建省科技厅高校产学研项目(2017H6005);福州市科技局科技重大项目(榕科(2017)325号);企事业合作项目(DH-1307)


Fuzzy Identity-Based Dynamic Data Auditing Scheme
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [19]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    云存储服务的快速发展,也带来众多安全挑战.针对云存储数据的完整性,已有的基于模糊身份的审计方案仅仅支持静态数据,因此很多情况并不适用.本文提出了一种基于模糊身份的动态数据完整性审计方案,结合默克哈希树的动态数据结构,实现用户对云端数据的完全动态操作.该方案采用基于模糊身份的密码体制,与基于公钥基础设施的数据完整性审计方案相比,避免了对公钥证书颁发、管理、吊销的过程,降低了通信代价.并且该方案能够支持批量验证,提高认证效率.最后,本文从安全性和功能上对新方案进行分析,能够抵抗伪造攻击,也保护了数据隐私安全,并且在功能上较其他方案也有一定的优势.

    Abstract:

    The rapid development of cloud storage services also brings many security challenges. The existing fuzzy identity-based data integrity auditing scheme only focuses on static data, which is obviously not suitable for many practical applications. This study proposes a fuzzy identity-based dynamic data integrity auditing scheme, which combines the dynamic data structure of Merkle hash tree to realize the complete dynamic operations of cloud data. Compared with data integrity auditing schemes based on the public key infrastructure, the scheme avoids the processes of issuing, managing, and revoking public key certificates by using fuzzy identity-based cryptosystem, and reduces the communication cost. Furthermore, the proposed scheme supports batch verification and improves authentication efficiency. Finally, the new scheme is analyzed in terms of security and function, which resists forgery attack and preserves data privacy, and has certain advantages over other schemes in terms of function.

    参考文献
    [1] Siddiqa A, Karim A, Gani A. Big data storage technologies:A survey. Frontiers of Information Technology & Electronic Engineering, 2017, 18(8):1040-1070
    [2] 黄宇, 吴维刚, 赵军平. 分布式云存储:理论、技术、系统专题前言. 软件学报, 2017, 28(8):1927-1928.[doi:10.13328/j.cnki.jos.005205
    [3] 邓晓鹏, 马自堂, 高敏霞. 一种基于双线性对的云数据完整性验证算法. 计算机应用研究, 2013, 30(7):2124-2127.[doi:10.3969/j.issn.1001-3695.2013.07.051
    [4] Deswarte Y, Quisquater JJ, Saidane A. Remote integrity checking:How to trust files stored on untrusted servers. Proceedings of the 6th Working Conference on Integrity and Internal Control in Information Systems. Lausanne, Switzerland. 2004. 1-11.
    [5] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores. Proceedings of the 2007 ACM Conference on Computer and Communications Security. Alexandria, VA, USA. 2007. 598-609.
    [6] Juels A, Kaliski Jr BS. PORs:Proofs of retrievability for large files. Proceedings of the 2007 ACM Conference on Computer and Communications Security. Alexandria, VA, USA. 2007. 584-597.
    [7] Ateniese G, Di Pietro R, Mancini LV, et al. Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. Istanbul, Turkey, 2008:9
    [8] Erway CC, Küpçü A, Papamanthou C, et al. Dynamic provable data possession. Proceedings of the 16th ACM Conference on Computer and Communications Security. Chicago, IL, USA. 2009. 213-222.
    [9] Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of the 14th European Symposium on Research in Computer Security. Saint-Malo, France. 2009. 355-370.
    [10] Fu AM, Yu S, Zhang YQ, et al. NPP:A new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data, 2017.[doi:10.1109/TBDATA.2017.2701347
    [11] Yan H, Li JG, Han JG, et al. A novel efficient remote data possession checking protocol in cloud storage. IEEE Transactions on Information Forensics and Security, 2017, 12(1):78-88.[doi:10.1109/TIFS.2016.2601070
    [12] Li JG, Yan H, Zhang YC. Certificateless public integrity checking of group shared data on cloud storage. IEEE Transactions on Services Computing, 2018:1.[doi:10.1109/TSC.2018.2789893
    [13] Yu Y, Zhang YF, Mu Y, et al. Provably secure identity based provable data possession. In:Au MH, Miyaji A, eds. Provable Security. Cham:Springer, 2015. 310-325.
    [14] Zhang JH, Dong QC. Efficient ID-based public auditing for the outsourced data in cloud storage. Information Sciences, 2016, 343-344:1-14.[doi:10.1016/j.ins.2015.12.043
    [15] Wang F, Xu L, Wang HQ, et al. Identity-based non-repudiable dynamic provable data possession in cloud storage. Computers & Electrical Engineering, 2018, 69:521-533
    [16] 李艳楠. 基于属性的云数据审计协议研究[硕士学位论文]. 成都:电子科技大学, 2017.
    [17] Boneh D, Franklin M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3):586-615.[doi:10.1137/S0097539701398521
    [18] Yang PY, Cao ZF, Dong XL. Fuzzy identity based signature with applications to biometric authentication. Computers & Electrical Engineering, 2011, 37(4):532-540
    [19] Wang HQ. Identity-based distributed provable data possession in multicloud storage. IEEE Transactions on Services Computing, 2015, 8(2):328-340.[doi:10.1109/TSC.2014.1
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

赵陈斌,许力,王峰.基于模糊身份的动态数据审计方案.计算机系统应用,2020,29(2):94-100

复制
分享
文章指标
  • 点击次数:2184
  • 下载次数: 2562
  • HTML阅读次数: 1320
  • 引用次数: 0
历史
  • 收稿日期:2019-07-12
  • 最后修改日期:2019-08-20
  • 在线发布日期: 2020-01-16
  • 出版日期: 2020-02-15
文章二维码
您是第12435858位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号