• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

云存储加密数据去重删除所有权证明方法

杨超, 张俊伟, 董学文, 马建峰

杨超, 张俊伟, 董学文, 马建峰. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
引用本文: 杨超, 张俊伟, 董学文, 马建峰. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
Citation: Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
杨超, 张俊伟, 董学文, 马建峰. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展, 2015, 52(1): 248-258. CSTR: 32373.14.issn1000-1239.2015.20130544
引用本文: 杨超, 张俊伟, 董学文, 马建峰. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展, 2015, 52(1): 248-258. CSTR: 32373.14.issn1000-1239.2015.20130544
Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. CSTR: 32373.14.issn1000-1239.2015.20130544
Citation: Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. CSTR: 32373.14.issn1000-1239.2015.20130544

云存储加密数据去重删除所有权证明方法

基金项目: 国家自然科学基金青年基金项目(61303219,61100230)|国家自然科学基金重点项目(60633020)|中央高校基本科研业务费专项资金项目(K5051303007)|陕西省自然科学基金项目(2014JQ8295)
详细信息
  • 中图分类号: TP311.13

Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion

  • 摘要: 随着云计算服务的广泛应用,为了节省磁盘空间和带宽,出现了一种新技术:客户端去重复化.但近期发现了一种针对该技术的新型攻击:攻击者只需获得原始文件的一个摘要信息,即文件的散列值,即可从服务器端获得全部原始文件.为了解决上述安全问题,提出了一个密码学安全的、高效的证明方案来支持多客户端加密文件的去重复删除场景.通过抽样检测、动态系数和随机选择的原始文件检索值使方案达到安全与高效的目标;同时,还提出了一种巧妙的分布式捎带技术,将文件加密密钥的分发过程与所有权证明过程同步实施.最后,对所提方案进行了严格的安全性证明和深入的性能分析与仿真,结果表明,所提的方案不仅能达到可证明的安全级别,而且执行效率较高,尤其在减少客户端计算负载方面.
    Abstract: Abstract As the rapid adoption of cloud storage services, a new technology of client-side deduplication is proposed to save the bandwidth of uploading copies of existing files to the server. This promising technology, however, has been recently found being vulnerable to a new kind of attack, in which by learning just a small piece of information about the file, namely its Hash value, an attacker is able to get the entire file from the server. To solve the problems mentioned above, we propose a cryptographically secure and efficient scheme to support cross-user client side deduplication over encrypted file. The new scheme utilizes the technique of spot checking in which the client only need to access small portions of the original file, dynamic coefficients, randomly chosen indices of the original files and a subtle approach to distribute the file encrypting key among clients to satisfy security requirements. Extensive security analysis shows that the proposed scheme can generate provable ownership of the encrypted file (POEF) with the presence of the curious server, and maintain a high detection probability of the client misbehavior. Both performance analysis and simulation results demonstrate that our proposed scheme is much more efficient than the existing schemes, especially in reducing the burden of the client.
  • 期刊类型引用(5)

    1. 谢汶兵,田雪,漆锋滨,武成岗,王俊,罗巧玲. 二进制翻译技术综述. 软件学报. 2024(06): 2687-2723 . 百度学术
    2. 刘登峰,李东亚,柴志雷,周浩杰,丁海峰. 基于QEMU的SIMD指令替换浮点指令框架. 湖南大学学报(自然科学版). 2024(08): 70-77 . 百度学术
    3. 余子濠 ,陈璐 ,孙凝晖 ,包云岗 . 以RISC-V为目标的动态二进制翻译代码质量优化方法. 计算机研究与发展. 2023(10): 2322-2334 . 本站查看
    4. 李明亮,庞建民,岳峰. 基于地址重用的二进制翻译本地代码替换. 信息工程大学学报. 2022(01): 38-44 . 百度学术
    5. 李男,庞建民. 基于中间表示规则替换的二进制翻译中间代码优化方法. 国防科技大学学报. 2021(04): 156-162 . 百度学术

    其他类型引用(2)

计量
  • 文章访问数:  1804
  • HTML全文浏览量:  2
  • PDF下载量:  1019
  • 被引次数: 7
出版历程
  • 发布日期:  2014-12-31

目录

    /

    返回文章
    返回