|
广西师范大学学报(自然科学版) ›› 2020, Vol. 38 ›› Issue (2): 1-7.doi: 10.16088/j.issn.1001-6600.2020.02.001
• CTCIS2019 • 下一篇
王涵1,2, 王绪安1,2*, 周能1,2, 柳玉东1,2
WANG Han1,2, WANG Xu’an1,2*, ZHOU Neng1,2, LIU Yudong1,2
摘要: 为避免存储在云端的用户数据可能被恶意损坏或者篡改,需要对云端的数据进行完整性审查。针对此问题,本文提出了一种基于区块链和默克尔哈希树的公共审计的数据共享方案,以达到对管理员权限的控制和数据的动态修改;在实现隐私保护、批量审计和降低系统资源消耗的同时,保证方案的安全性;允许用户通过第三方机构向云服务器发起数据完整性审查,然后向用户返回结果,过程中不向第三方机构泄露任何有关用户和文件的信息。安全性证明和实验结果表明,该方案在保证安全性的基础上具备较好的性能。
中图分类号:
[1] ARMBRUST M, FOX A, GRIFFITH R,et al. A view of cloud computing[J]. Commun ACM, 2010, 53(4): 50-58. [2] CAI H, XU B, JIANG L. Vasilakos AV IoT-based big data storage systems in cloud computing: per-spectives and challenges[J]. IEEE Internet of Things Journal, 2017, 4(1): 75-87. [3] NACHIAPPAN R, JAVADI B, CALHEIROS R, et al. Cloud storage reliability for big data applications: a state of the art survey[J]. Journal of Network and Computer Applications, 2017, 97: 35-47. [4] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, NY:ACM, 2007: 598-609. [5] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 767-778. [6] CHEN F, XIANG T, YANG Y, et al. Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure[C]//2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE Press, 2015: 2389-2397. [7] WANG B, LI B, LI H. Oruta: privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43-56. [8] LIU X, ZHANG Y, WANG B, et al. Mona: secure multi-owner data sharing for dynamic groups in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191. [9] TIAN H, NAN F L, JIANG H, et al. Public auditing for shared cloud data with efficient and secure group management[J]. Information Sciences, 2019, 472: 107-125. [10]NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL].(2009-03-25)[2019-10-08]. https://bitcoin.org/bitcoin.pdf. [11]NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and cryptocurrency technologies[M]. Princeton, NJ: Princeton University Press, 2016. [12]STANEK J, KENCL L. Enhanced secure thresholded data deduplication scheme for cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(4):694-707. [13]BHASKARAN K, ILFRICH P, LIFFMAN D, et al. Double-blind consent-driven data sharing on block-chain[C]// IEEE International Conference on Cloud Engineering. Piscataway, NJ:IEEE Press, 2018: 385-391. [14]ZHENG B K, ZHU L H, SHEN M, et al, Scalable and privacy-preserving data sharing based on block-chain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. [15]HUANG L, ZHANG G, YU S, et al. SeShare: Secure cloud data sharing based on blockchain and public auditing[J]. Concurrency and Computation: Practice and Experience, 2019, 31(22): e4359. [16]QI Y, TANG X, HUANG Y. Enabling efficient verification of dynamic data possession and batch up-dating in cloud storage[J]. KSII Transactions on Internet and Information Systems, 2018,12(6): 2429-2449. [17]WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22 (5): 847-859. |
[1] | 葛奕飞, 郑彦斌. 带有纠删或纠错性质的隐私保护信息检索方案[J]. 广西师范大学学报(自然科学版), 2020, 38(3): 33-44. |
[2] | 陈汹, 朱钰, 封科, 于同伟. 基于区块链的电力系统安全稳定控制终端身份认证[J]. 广西师范大学学报(自然科学版), 2020, 38(2): 8-18. |
[3] | 葛丽娜. 基于k-同构和局部随机化的隐私保护方法[J]. 广西师范大学学报(自然科学版), 2016, 34(4): 1-8. |
|
版权所有 © 广西师范大学学报(自然科学版)编辑部 地址:广西桂林市三里店育才路15号 邮编:541004 电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn 本系统由北京玛格泰克科技发展有限公司设计开发 |