期刊文献+

云存储系统中数据完整性验证协议 被引量:20

Data integrity verification protocol in cloud storage system
下载PDF
导出
摘要 在云存储网络环境中,数据的安全性和完整性是用户最关心的问题之一。综合考虑云存储网络环境中的安全需求,设计了云存储数据完整性验证(CS-DIV)协议。客户端把数据文件和校验标签上传到云存储服务器后随机抽查,服务器返回验证证据并由客户端判断文件的完整性。协议可以有效地验证云存储数据的完整性,并抵抗恶意服务器欺骗和恶意客户端攻击,从而提高整个云存储系统的可靠性和稳定性。仿真实验数据表明,所提协议以较低的存储、通信及时间开销实现了数据的完整性保护。 In the cloud storage network,the security and integrity of data are the major concerns of clients.Taking full consideration of the security requirements for cloud storage network,a new Cloud Storage-Data Integrity Verification(CS-DIV) protocol was proposed.The clients uploaded files and tags to the servers and then did random check;the servers returned proofs and the clients judged the result.This protocol could not only ensure the integrity of data in the cloud storage effectively,but also resist the cheat from the un-trusted servers and the attack from the malicious clients,and then improved the reliability and stability of the whole cloud storage system.The simulation experimental results show that the proposed protocol realizes the protection of data integrity at low cost of storage,communication and delay.
出处 《计算机应用》 CSCD 北大核心 2012年第1期8-12,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61072080) 福建省自然科学基金资助项目(2011J05148) 福建省教育厅科技项目(JA10079 JB10041)
关键词 云存储 数据完整性 同态标签 安全协议 数据存储安全 cloud storage data integrity homomorphic tag security protocol data storage security
  • 相关文献

参考文献18

  • 1YUMEREFENDI A R, CHASE J S. Strong accountability for network storage [J]. ACM Transactions on Storage, 2007, 3(3): 6-6. 被引量:1
  • 2KUBIATOWICZ J, BINDEL D, CHEN Y, et al. OceanStore: An architecture for global-scale persistent storage [ C]// Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems. New York: ACM Press, 2000:190-201. 被引量:1
  • 3菅间城之助.日中酿酒技术交流的先躯者山崎百治教授[A]..′94国际酒文化学术研讨会论文集[C].杭州:浙江大学出版社,1994.. 被引量:2
  • 4ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [C]// CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007:598 -609. 被引量:1
  • 5ATENIESE G, PIETRO R D, MANCINI L V, et al. Scalable and efficient provable data possession [C]// SecureComm'08: Proceedings of the dth International Conference on Security and Privacy in Communication Networks. New York: ACM Press, 2008:1-10. 被引量:1
  • 6ATENIESE G, KAMARA S, KATZ J. Proofs of storage from homomorphic identification protocols [C]//ASIACRYPT'09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer-Verlag, 2009:319 -333. 被引量:1
  • 7CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP: Multiplereplica provable data possession [C]//The 28th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2008:411 -420. 被引量:1
  • 8SHAH M A, BAKER M, MOGUL J C, et al. Auditing to keep online storage services honest [C]// HOTOS'07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems. Berkeley, CA: USENIX Association, 2007:1-6. 被引量:1
  • 9ZHU Y, WANG H, HU Z, et al. Efficient provable data possession for hybrid clouds [C]//CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010:756-758. 被引量:1
  • 10GHEMAWAT S, GOBIOFF H, LEUNG S-T. The Google file system [C]// Proceedings of the 19th ACM Symposium on Operating Systems Principles. New York: ACM Press, 2003:29-45. 被引量:1

二级参考文献1

  • 1Klaus Gaarder,Einar Snekkenes. Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol[J] 1991,Journal of Cryptology(2):81~98 被引量:1

共引文献4

同被引文献176

引证文献20

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部