期刊文献+

具有私钥可恢复能力的云存储完整性检测方案 被引量:18

Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
下载PDF
导出
摘要 共享数据云存储完整性检测用来验证一个群体共享在云端数据的完整性,是最常见的云存储完整性检测方式之一.在云存储完整性检测中,用户用于生成数据签名的私钥可能会因为存储介质的损坏、故障等原因而无法使用.然而,目前已有的共享数据云存储完整性检测方案均未考虑到这个现实问题.探索了如何解决共享数据云存储完整性检测中私钥不可用的问题,提出了第1个具有私钥可恢复能力的共享数据云存储完整性检测方案.在方案中,当一个群用户的私钥不可用时,可以通过群里的t个或者t个以上的用户帮助其恢复私钥.同时,设计了随机遮掩技术,用于确保参与成员私钥的安全性.用户也可验证被恢复私钥的正确性.最后,给出安全性和实验结果的分析,结果显示所提方案是安全高效的. Verifying the integrity of cloud data shared by a group is one of the most common usage of cloud storage integrity checking. In cloud storage integrity checking, the private key which is used to generate data signatures by user may be unavailable because of the damage or the fault of storage medium. However, currently existing cloud storage integrity checking schemes for shared data do not consider this realistic problem. This paper first explores how to deal with the problem of the private key unavailability in cloud storage integrity checking for shared data. A new scheme that enables cloud storage integrity checking for shared data with private key-recovery ability is proposed. In this scheme, when a group user's private key is unavailable, this user's private key can be recovered with the helpof t or more users in the group. At the same time, a random masking technology is designed to guarantee the security of participating members' private keys. The user can also verify the correctness of the recovered private key. Finally, the analysis of security and experimental results are provided to show that the proposed scheme is secure and efficient.
出处 《软件学报》 EI CSCD 北大核心 2016年第6期1451-1462,共12页 Journal of Software
基金 国家自然科学基金(61572267,61272425,60703089,61402245) 山东省自然科学基金(ZR2014FQ010, ZR2010FQ019) 信息安全国家重点实验室开放课题基金 华为科技基金(YB2013120027) 青岛市建设事业科技发展项目(JK2015-26)
关键词 云存储 数据完整性检测 私钥恢复 秘密共享 安全性 cloud storage data integrity checking private key recovery secret sharing security
  • 相关文献

参考文献26

  • 1Ren K, Wang C, Wang Q, Yu J. Research progress of data security in cloud computing. In: China Cryptography Development Report 2013. Beijing: China Quality Inspection Press, 2014 : 71 -94. 被引量:1
  • 2Armbrust M, Fox A, Griffith R, Joseph A. D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53 (4) :50-58 . [doi:10.1145/1721654.1721672]. 被引量:1
  • 3Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proc. of the ACM CCS. 2007. 598-609. [doi: 10.1145/1315245.1315318. 被引量:1
  • 4Wang BY, Li BC, Li H. Oruta: Privacy-Preserving public auditing for shared data in the cloud. In: Proc. of the IEEE Cloud. 2012. 295-302. [doi: 10.1109/CLOUD.2012.46. 被引量:1
  • 5Ren K, Wang C, Wang Q. Security challenges for the public cloud. IEEE Internet Computing, 2012, 16 (1) :69-73 . [doi:10.1109/MIC.2012.14]. 被引量:1
  • 6Song D, Shi E, Fischer I, Shankar U. Cloud data protection for the masses. IEEE Computer, 2012,45 (1) :39-45 . [doi:10.1109/MC.2012.1]. 被引量:1
  • 7Wang C, Chow SMS, Wang Q, Ren K, Lou WJ. Privacy-Preserving public auditing for secure cloud storage. IEEE Trans. on Computers, 2013, 62 (2) :362-375 . [doi:10.1109/TC.2011.245]. 被引量:1
  • 8Wang Q, Wang C, Ren K, Lou WJ, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. on Parallel and Distributed Systems, 2011, 22 (5) :847-859 . [doi:10.1109/TPDS.2010.183]. 被引量:1
  • 9Singh R, Kumar S, Agrahari SK. Ensuring data storage security in cloud computing. Int'l Journal of Engineering and Computer Science, 2012 :2319-7242 . 被引量:1
  • 10Wang Q, Wang C, Li J, Ren K, Lou WJ. Enabling public verifiability and data dynamic for storage security in cloud computing. In: Proc. of the ESORICS. 2009. 355-370. [doi: 10.1007/978-3-642-04444-1_22. 被引量:1

同被引文献88

引证文献18

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部