• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Zhu Yu. Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud[J]. Journal of Computer Research and Development, 2019, 56(10): 2170-2182. DOI: 10.7544/issn1000-1239.2019.20190351
Citation: Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Zhu Yu. Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud[J]. Journal of Computer Research and Development, 2019, 56(10): 2170-2182. DOI: 10.7544/issn1000-1239.2019.20190351

Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud

More Information
  • Published Date: September 30, 2019
  • Due to the long-term immutability of the ciphertext stored in the cloud, key compromise becomes an important factor affecting the security of stored data. Data re-encryption is an effective way to deal with key leakage, but the corresponding computational overhead and communication overhead of data uploading and downloading increase the burden on users and storage systems. In addition, for data storage based on distributed coding, ciphertext update needs to be performed on the basis of decrypting ciphertext, and the ciphertext merging also increases the communication and computational overhead of the system. Aiming at the above problems, a distributed data encoding storage scheme supporting updatable encryption (DDES-UE) in cloud environment is proposed. By constructing the updatable encryption scheme with key homomorphic pseudo-random functions, the heavy calculation and communication overhead of ciphertext update can be avoided; ciphertext segmentation and improved functional minimum storage regenerated code (FMSR) are used for achieving distributed data storage, which ensures high availability for storage data and direct data update of each storage node. Security proofs and performance analysis show that the proposed scheme can support secure and efficient data recoverability in the case of node corruption and the integrity verification of decrypted data while guaranteeing the security of data storage. Compared with traditional data re-encryption, DDES-UE can avoid the computation and communication overhead for data re-encryption, uploading, downloading, decoding, and ciphertext merging as well, which is of great significance for building secure and efficient cloud storage system with direct data update. In addition, the periodic key update can effectively increase the time cost for an attacker to crack the ciphertext by acquiring the key, which also enhance the active security defense capability of the system.
  • Related Articles

    [1]Gao Han, Luo Juan, Cai Qianya, Zheng Yanliu. An Intelligent Traffic Signal Coordination Method Based on Asynchronous Decision-Making[J]. Journal of Computer Research and Development, 2023, 60(12): 2797-2805. DOI: 10.7544/issn1000-1239.202220773
    [2]Wang Qi, Li Deyu, Zhai Yanhui, Zhang Shaoxia. Parameterized Fuzzy Decision Implication[J]. Journal of Computer Research and Development, 2022, 59(9): 2066-2074. DOI: 10.7544/issn1000-1239.20210539
    [3]Zhang Chao, Li Deyu. Interval-Valued Hesitant Fuzzy Graphs Decision Making with Correlations and Prioritization Relationships[J]. Journal of Computer Research and Development, 2019, 56(11): 2438-2447. DOI: 10.7544/issn1000-1239.2019.20180314
    [4]Liu Linlan, Zhang Jiang, Shu Jian, Guo Kai, Meng Lingchong. Multiple Attribute Decision Making-Based Prediction Approach of Critical Node for Opportunistic Sensor Networks[J]. Journal of Computer Research and Development, 2017, 54(9): 2021-2031. DOI: 10.7544/issn1000-1239.2017.20160645
    [5]Yu Haiquan, Si Guangya, Yang Zhimou, Luo Pi. The Scene Simulation of Crowd Behaviors Oriented to Strategic Decision-Making[J]. Journal of Computer Research and Development, 2010, 47(6): 1020-1025.
    [6]Zhai Junhai, Wang Xizhao, Zhang Sufang. Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral[J]. Journal of Computer Research and Development, 2009, 46(3): 470-477.
    [7]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [8]Jiang Yuncheng, Tang Yong, Wang Ju, Shen Yuming. A Tableaux Decision Procedure for Fuzzy Description Logic FALNUI[J]. Journal of Computer Research and Development, 2007, 44(8): 1309-1316.
    [9]Hu Xiaojian, Yang Shanlin, Hu Xiaoxuan, Fang Fang. Optimal Decomposition of Decision Table Systems Based on Bayesian Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 667-673.
    [10]Lin Zhigui, Xu Lizhong, Yan Xijun, Huang Fengchen, Liu Yingping. A Decision-Making Method on D-S Evidence Fusion Information Based on Distance Measure[J]. Journal of Computer Research and Development, 2006, 43(1): 169-175.
  • Cited by

    Periodical cited type(5)

    1. 谢汶兵,田雪,漆锋滨,武成岗,王俊,罗巧玲. 二进制翻译技术综述. 软件学报. 2024(06): 2687-2723 .
    2. 刘登峰,李东亚,柴志雷,周浩杰,丁海峰. 基于QEMU的SIMD指令替换浮点指令框架. 湖南大学学报(自然科学版). 2024(08): 70-77 .
    3. 余子濠 ,陈璐 ,孙凝晖 ,包云岗 . 以RISC-V为目标的动态二进制翻译代码质量优化方法. 计算机研究与发展. 2023(10): 2322-2334 . 本站查看
    4. 李明亮,庞建民,岳峰. 基于地址重用的二进制翻译本地代码替换. 信息工程大学学报. 2022(01): 38-44 .
    5. 李男,庞建民. 基于中间表示规则替换的二进制翻译中间代码优化方法. 国防科技大学学报. 2021(04): 156-162 .

    Other cited types(2)

Catalog

    Article views (1144) PDF downloads (314) Cited by(7)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return