• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Zhu Yu. Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud[J]. Journal of Computer Research and Development, 2019, 56(10): 2170-2182. DOI: 10.7544/issn1000-1239.2019.20190351
Citation: Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Zhu Yu. Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud[J]. Journal of Computer Research and Development, 2019, 56(10): 2170-2182. DOI: 10.7544/issn1000-1239.2019.20190351

Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud

More Information
  • Published Date: September 30, 2019
  • Due to the long-term immutability of the ciphertext stored in the cloud, key compromise becomes an important factor affecting the security of stored data. Data re-encryption is an effective way to deal with key leakage, but the corresponding computational overhead and communication overhead of data uploading and downloading increase the burden on users and storage systems. In addition, for data storage based on distributed coding, ciphertext update needs to be performed on the basis of decrypting ciphertext, and the ciphertext merging also increases the communication and computational overhead of the system. Aiming at the above problems, a distributed data encoding storage scheme supporting updatable encryption (DDES-UE) in cloud environment is proposed. By constructing the updatable encryption scheme with key homomorphic pseudo-random functions, the heavy calculation and communication overhead of ciphertext update can be avoided; ciphertext segmentation and improved functional minimum storage regenerated code (FMSR) are used for achieving distributed data storage, which ensures high availability for storage data and direct data update of each storage node. Security proofs and performance analysis show that the proposed scheme can support secure and efficient data recoverability in the case of node corruption and the integrity verification of decrypted data while guaranteeing the security of data storage. Compared with traditional data re-encryption, DDES-UE can avoid the computation and communication overhead for data re-encryption, uploading, downloading, decoding, and ciphertext merging as well, which is of great significance for building secure and efficient cloud storage system with direct data update. In addition, the periodic key update can effectively increase the time cost for an attacker to crack the ciphertext by acquiring the key, which also enhance the active security defense capability of the system.
  • Related Articles

    [1]Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
    [2]Zhou Lei, Chen Zhenzhu, Fu Anmin, Su Mang, Yu Yan. Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement[J]. Journal of Computer Research and Development, 2022, 59(10): 2247-2260. DOI: 10.7544/issn1000-1239.20220529
    [3]Cai Changxing, Du Yajuan, Zhou Taiyu. Endurance Aware Out-of-Place Update for Persistent Memory[J]. Journal of Computer Research and Development, 2022, 59(3): 553-567. DOI: 10.7544/issn1000-1239.20210541
    [4]Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Wang Zhonghui. Updatable Attribute-Based Encryption Scheme Supporting Dynamic Change of User Rights[J]. Journal of Computer Research and Development, 2020, 57(5): 1057-1069. DOI: 10.7544/issn1000-1239.2020.20190254
    [5]Su Mang, Cao Mengyuan, Xie Rongna, Fu Anmin. PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud[J]. Journal of Computer Research and Development, 2018, 55(7): 1479-1487. DOI: 10.7544/issn1000-1239.2018.20180056
    [6]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [7]Wu Guangqiang. Multi-Authority CP-ABE with Policy Update in Cloud Storage[J]. Journal of Computer Research and Development, 2016, 53(10): 2393-2399. DOI: 10.7544/issn1000-1239.2016.20160432
    [8]Cheng Fangquan, Peng Zhiyong, Song Wei, Wang Shulin, Cui Yihui. Key Management for Access Control in Trusted Cloud Storages[J]. Journal of Computer Research and Development, 2013, 50(8): 1613-1627.
    [9]Du Xuehui, Wang Yadi, Chen Xingyuan, and Wang Zhen. A Data Forwarding Algorithm for Periodical Links in Space Delay-Tolerant Network[J]. Journal of Computer Research and Development, 2013, 50(4): 758-766.
    [10]Zeng Weini, Lin Yaping, Hu Yupeng, Yi Yeqing, Li Xiaolong. A Group Key Management Scheme Based on Distributed Rekeying Authority in Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 606-614.

Catalog

    Article views (1144) PDF downloads (314) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return