期刊文献+

面向云存储安全的可自愈拜占庭Quorum系统 被引量:3

A Self-healing Byzantine Quorum System for Cloud Storage Security
下载PDF
导出
摘要 针对云存储系统中的数据安全问题,提出了一种面向云存储安全的可自愈拜占庭Quorum系统.该系统以虚拟机作为后端存储设备构建虚拟存储节点,利用虚拟机多样化操作系统,以及动态迁移、快速部署等机制构建动态异构的存储系统架构.在拜占庭容错门限的基础上,提出自愈门限的概念,并设计相应系统安全协议,实现存储节点的自动化异常检测和状态复原.实验结果表明,提出的云存储系统具有较高的鲁棒性,能有效提高存储数据的安全性. For the problem of data security in the cloud storage system,a self-healing Byzantine Quorum system for the cloud storage security is proposed.In this system,the virtual machines are used as back-end storage devices to construct the virtual storage node.The diverse operating systems,dynamic migration and rapid generation mechanism of virtual machines are introduced to build dynamic and heterogeneous storage system architecture.On the basis of the Byzantine fault tolerance threshold,the concept of self-healing threshold is presented and several security protocols are devised to achieve automated anomaly detection and storage node recovery.The experimental results show that the proposed cloud storage system is greatly robust and can effectively improve the security of stored data.
作者 王亚文 郭云飞 刘文彦 霍树民 杨超 WANG Ya-wen;GUO Yun-fei;LIU Wen-yan;HUO Shu-min;YANG Chao(National Digital Switching System Engineering R&D Center,Zhengzhou,Henan 450002,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2020年第4期675-681,共7页 Acta Electronica Sinica
基金 国家重点研发计划(No.2018YFB0804004) 国家自然科学基金创新群体(No.61521003)。
关键词 云存储 数据安全 拜占庭Quorum系统 自愈机制 cloud storage data security Byzantine Quorum system self-healing mechanism
  • 相关文献

参考文献3

二级参考文献28

  • 1LIU Gang ZHOU Jingli SUN Yufen QIN Leihua.A Fault Detection Mechanism in Erasure-Code Byzantine Fault-Tolerance Quorum[J].Wuhan University Journal of Natural Sciences,2006,11(6):1453-1456. 被引量:1
  • 2Dan Boneh,Ben Lynn,Hovav Shacham.Short Signatures from the Weil Pairing[J].Journal of Cryptology.2004(4) 被引量:1
  • 3Juels A, Kaliski Jr B S. PORs: Proofs of retrievability for large files [ A ]. Proceedings of the 14th ACM Conference on Computer and Communications Security [ C ]. USA: ACM ,2007. 584 - 597. 被引量:1
  • 4Erway C, KiipiJ A, Papamanthou C, et al. Dynamic prov- able data possession [ A]. Proceedings of the 16th ACM Conference on Computer and Communications Security [ C]. USA:ACM ,2009. 213 -222. 被引量:1
  • 5Bowers K D,van Dijk M,Juels A,et al. How to tell if your cloud files are vulnerable to drive crashes [ A ]. Proceedings of the 18th ACM Conference on Computer and Communi- cations Security [C]. USA:ACM ,2011. 501 -514. 被引量:1
  • 6Benson K, Dowsley R, Shacham H. Do you know where your cloud files are? [ A ]. Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop [ C ]. USA : ACM,2011.73 - 82. 被引量:1
  • 7Watson G J, Safavi-Naini R, Alimomeni M, et al. LoSt : lo- cation based storage [ A ]. Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop [ C ]. USA : ACM ,2012. 59 - 70. 被引量:1
  • 8Gondree M, Peterson Z N J. Geolocation of data in the cloud[ A]. Proceedings of the Third ACM Conference on Data and Application Security and Privacy [C]. USA: ACM ,2013,25 - 36. 被引量:1
  • 9Wang Z,Sun K,Jajodia S, et al. Disk storage isolation and verification in cloud [ A]. IEEE Global Communications Conference (GLOBECOM) [ C]. USA: IEEE, 2012. 771 - 776. 被引量:1
  • 10Wang Z, Sun K,Jing J ,et al. Verification of data redundan- cy in cloud storage[ A]. Proceedings of the 2013 Interna- tional Workshop on Security in Cloud Computing [ C ]. USA:ACM,2013. 1 1 - 18. 被引量:1

共引文献121

同被引文献29

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部