• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

支持隐私保护和公平支付的数据完整性验证方案

富瑶, 李庆丹, 张泽辉, 高铁杠

富瑶, 李庆丹, 张泽辉, 高铁杠. 支持隐私保护和公平支付的数据完整性验证方案[J]. 计算机研究与发展, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
引用本文: 富瑶, 李庆丹, 张泽辉, 高铁杠. 支持隐私保护和公平支付的数据完整性验证方案[J]. 计算机研究与发展, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
Citation: Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
富瑶, 李庆丹, 张泽辉, 高铁杠. 支持隐私保护和公平支付的数据完整性验证方案[J]. 计算机研究与发展, 2022, 59(6): 1343-1355. CSTR: 32373.14.issn1000-1239.20210023
引用本文: 富瑶, 李庆丹, 张泽辉, 高铁杠. 支持隐私保护和公平支付的数据完整性验证方案[J]. 计算机研究与发展, 2022, 59(6): 1343-1355. CSTR: 32373.14.issn1000-1239.20210023
Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. CSTR: 32373.14.issn1000-1239.20210023
Citation: Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. CSTR: 32373.14.issn1000-1239.20210023

支持隐私保护和公平支付的数据完整性验证方案

基金项目: 国家科技重大专项(2018YFB0204304);天津市自然科学基金重点项目(21JCZDJC00130)
详细信息
  • 中图分类号: TP309

Data Integrity Verification Scheme for Privacy Protection and Fair Payment

Funds: This work was supported by the National Science and Technology Major Project of China (2018YFB0204304) and the Key Project of the Natural Science Foundation of Tianjin (21JCZDJC00130).
  • 摘要: 随着云存储模式的出现,越来越多的数据拥有者(data owner, DO)选择将数据移植到云中,为了确保DO存储在云中数据的完整性,DO通常采用云存储数据完整性验证模型.在按需付费的云环境下,DO除了需要支付费用给云服务提供商外,还需要支付额外费用给第三方验证者(third party auditor, TPA)用于执行验证操作.然而,在实际的完整性验证中,TPA并不完全可信.为解决TPA不可信问题并且实现服务-支付公平,提出一种支持隐私保护和公平支付的数据完整性验证方案.首先,引入一种新型数据认证结构——基于等级的Merkle散列树,以实现数据位置的完整性验证和数据的可验证动态更新;其次,为实现数据隐私保护并减少通信开销,提出无交互式动态数据完整性证明机制(non-interactive dynamic provable data possession, NIDPDP);最后,结合区块链技术,利用智能合约(smart contract, SC)实现DO、云存储服务器(cloud storage server, CSS)和TPA之间的服务-支付公平,使各方诚实地按照规则执行.性能分析与实验表明:方案能够有效地保护用户数据隐私、实现公平支付,具有较低的计算代价与通信开销.
    Abstract: With the emergence of cloud storage, increasing users tend to migrate their data to cloud for management and maintenance, which can save time and money on the series of work. To ensure the integrity of data stored in the efficient yet unreliable cloud, data owners may adopt a data integrity verification model. In the pay-per-use cloud environment, data owners not only pay for the service to cloud server provider, but also pay an additional fee to the third party auditor (TPA) in order to perform verification operations. However, TPA is not always available in the actual, which makes the integrity of data become a potential vulnerability. In view of the untrustworthy of TPA and the realization of service-payment fairness, we propose a novel verification scheme for privacy protection and fair payment. Firstly, we introduce a novel type of data authentication structure—the rank-based Merkle Hash tree to realize the integrity verification of data index and support verifiable dynamic update of block. Secondly, in order to achieve privacy protection and reduce communication overhead, a non-interactive dynamic provable data possession is presented. Finally, combined with blockchain, smart contract is applied to achieve service-payment fairness among data owners, cloud storage server and TPA, so that all parties can act honestly according to the rules. Performance analysis and experiments show that the proposed scheme can effectively protect the privacy of user data, realize fair payment, and achieve lower computational cost and communication overhead of the entire system.
  • 期刊类型引用(11)

    1. 安晓明,王忠勇,翟慧鹏,巩克现,王玮,孙鹏. 基于深度学习的二进制变种协议字段划分方法. 计算机工程与设计. 2024(04): 982-988 . 百度学术
    2. 黄涛,王郅伟,刘家池,龙千禧,况博裕,付安民,张玉清. 工控协议安全研究综述. 通信学报. 2024(06): 60-74 . 百度学术
    3. 许伟杰,邹洪,张佳发,曾子峰,江家伟. 基于模糊测试技术的工控协议安全性分析系统. 微型电脑应用. 2024(09): 250-253 . 百度学术
    4. 赵起超,杨晓龙,赵文宇,刘经纬,贾磊,于潼. 基于语义级协议解析的工控网络安全监测方法. 信息安全与通信保密. 2024(09): 19-30 . 百度学术
    5. 谭高升,李伟,裴彦纯,孙军,王诗蕊. 工控协议深度包解析与检测技术研究. 网络安全技术与应用. 2023(05): 1-4 . 百度学术
    6. 付安民,毛安,黄涛,胡超,刘莹,张晓明,王占丰. 基于主动交互式学习的工控协议逆向分析. 西安电子科技大学学报. 2023(04): 22-33 . 百度学术
    7. 况博裕,李雨泽,顾芳铭,苏铓,付安民. 车联网安全研究综述:威胁、对策与未来展望. 计算机研究与发展. 2023(10): 2304-2321 . 本站查看
    8. 徐魁,海洋,李晓辉,朱承才,陶军. 未知二进制协议的报文分割方法. 计算机技术与发展. 2023(11): 119-125 . 百度学术
    9. 屠雅春,许驰,杜昕宜,王倚天,夏长清,金曦. 基于字符距离聚类的未知工控协议分类方法. 计算机应用研究. 2023(12): 3696-3700+3705 . 百度学术
    10. 孙彦斌,汪弘毅,田志宏,方滨兴. 工业控制系统安全防护技术发展研究. 中国工程科学. 2023(06): 126-136 . 百度学术
    11. 李长连,余思阳,程驰. 基于设备流量行为的工业物联网指纹识别技术. 工业信息安全. 2022(10): 47-56 . 百度学术

    其他类型引用(8)

计量
  • 文章访问数:  240
  • HTML全文浏览量:  4
  • PDF下载量:  132
  • 被引次数: 19
出版历程
  • 发布日期:  2022-05-31

目录

    /

    返回文章
    返回