Cloud storage data integrity audit based on an index–stub table

赵海春, 姚宣霞, 郑雪峰
{"title":"Cloud storage data integrity audit based on an index–stub table","authors":"赵海春, 姚宣霞, 郑雪峰","doi":"10.13374/J.ISSN2095-9389.2019.09.15.008","DOIUrl":null,"url":null,"abstract":"With the development of cloud computing technology, more individuals and organizations have chosen cloud services to store and maintain their data and reduce the burden on local storage and corresponding maintenance costs. However, although the cloud computing infrastructure is more powerful and reliable than personal computing devices, the cloud storage server is not completely trusted due to various internal and external threats;therefore, users need to regularly check whether their data stored in the cloud server are intact. Therefore, in recent years, researchers have proposed a variety of schemes for data integrity auditing in cloud storage. Among them, in a part of public auditing schemes for cloud storage based on homomorphic authenticators, random sampling of data blocks, and random masking techniques, users need to store and maintain a two-dimensional(2 D) table related to the index information of data blocks in the file. When a user’s outsource data need to be frequently updated to avoid forgery attacks due to the similar index value of data block being reused, the design and maintenance of the 2 D table become cumbersome. In this study, to solve the abovementioned problem, an index–stub table structure was first proposed, which is simple and easy to maintain. On the basis of this structure, a thirdparty auditor auditing scheme with a privacy-preserving property was proposed for cloud storage. This scheme can effectively support various remote dynamic operations for outsource data at the block level. Then, a formal security proof for data integrity guarantee provided by the scheme was given under the random oracle model. A formal security analysis was also given for the privacy-preserving property of the audit protocol. Finally, the performance of the scheme was theoretically analyzed and compared with relevant experiments. Results indicate that the scheme has high efficiency.","PeriodicalId":31263,"journal":{"name":"工程设计学报","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"工程设计学报","FirstCategoryId":"1087","ListUrlMain":"https://doi.org/10.13374/J.ISSN2095-9389.2019.09.15.008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 1

Abstract

With the development of cloud computing technology, more individuals and organizations have chosen cloud services to store and maintain their data and reduce the burden on local storage and corresponding maintenance costs. However, although the cloud computing infrastructure is more powerful and reliable than personal computing devices, the cloud storage server is not completely trusted due to various internal and external threats;therefore, users need to regularly check whether their data stored in the cloud server are intact. Therefore, in recent years, researchers have proposed a variety of schemes for data integrity auditing in cloud storage. Among them, in a part of public auditing schemes for cloud storage based on homomorphic authenticators, random sampling of data blocks, and random masking techniques, users need to store and maintain a two-dimensional(2 D) table related to the index information of data blocks in the file. When a user’s outsource data need to be frequently updated to avoid forgery attacks due to the similar index value of data block being reused, the design and maintenance of the 2 D table become cumbersome. In this study, to solve the abovementioned problem, an index–stub table structure was first proposed, which is simple and easy to maintain. On the basis of this structure, a thirdparty auditor auditing scheme with a privacy-preserving property was proposed for cloud storage. This scheme can effectively support various remote dynamic operations for outsource data at the block level. Then, a formal security proof for data integrity guarantee provided by the scheme was given under the random oracle model. A formal security analysis was also given for the privacy-preserving property of the audit protocol. Finally, the performance of the scheme was theoretically analyzed and compared with relevant experiments. Results indicate that the scheme has high efficiency.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于索引存根表的云存储数据完整性审计
随着云计算技术的发展,越来越多的个人和组织选择云服务来存储和维护他们的数据,减少了本地存储的负担和相应的维护成本。然而,虽然云计算基础设施比个人计算设备更强大、更可靠,但由于各种内部和外部威胁,云存储服务器并不是完全可信的,因此用户需要定期检查存储在云服务器上的数据是否完好无损。因此,近年来研究人员提出了多种云存储数据完整性审计方案。其中,在基于同态认证器、数据块随机抽样和随机屏蔽技术的云存储公共审计方案中,用户需要在文件中存储和维护一个与数据块索引信息相关的二维表。当用户的外包数据块由于索引值相似而需要频繁更新以避免伪造攻击时,2d表的设计和维护变得十分繁琐。为了解决上述问题,本文首先提出了一种简单且易于维护的索引存根表结构。在此基础上,提出了一种具有隐私保护特性的云存储第三方审计员审计方案。该方案可以有效地支持对外包数据进行块级的各种远程动态操作。然后,在随机oracle模型下,给出了该方案提供的数据完整性保证的形式化安全证明。对审计协议的保密性进行了形式化的安全性分析。最后,对该方案的性能进行了理论分析,并与相关实验进行了比较。结果表明,该方案具有较高的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
工程设计学报
工程设计学报 Engineering-Engineering (miscellaneous)
CiteScore
0.60
自引率
0.00%
发文量
2447
审稿时长
14 weeks
期刊介绍: Chinese Journal of Engineering Design is a reputable journal published by Zhejiang University Press Co., Ltd. It was founded in December, 1994 as the first internationally cooperative journal in the area of engineering design research. Administrated by the Ministry of Education of China, it is sponsored by both Zhejiang University and Chinese Society of Mechanical Engineering. Zhejiang University Press Co., Ltd. is fully responsible for its bimonthly domestic and oversea publication. Its page is in A4 size. This journal is devoted to reporting most up-to-date achievements of engineering design researches and therefore, to promote the communications of academic researches and their applications to industry. Achievments of great creativity and practicablity are extraordinarily desirable. Aiming at supplying designers, developers and researchers of diversified technical artifacts with valuable references, its content covers all aspects of design theory and methodology, as well as its enabling environment, for instance, creative design, concurrent design, conceptual design, intelligent design, web-based design, reverse engineering design, industrial design, design optimization, tribology, design by biological analogy, virtual reality in design, structural analysis and design, design knowledge representation, design knowledge management, design decision-making systems, etc.
期刊最新文献
Innovative design of box elevator epidemic prevention function integrating AD and TRIZ Discrete element simulation for evolution characteristics of multi-funnel mineral-rock force chain under flexible isolation layer Application progress of artificial intelligence in military confrontation Cloud storage data integrity audit based on an index–stub table Clinical named entity recognition from Chinese electronic medical records using a double-layer annotation model combining a domain dictionary with CRF
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1