具有私钥可恢复能力的云存储完整性检测方案
作者:
基金项目:

国家自然科学基金(61572267,61272425,60703089,61402245);山东省自然科学基金(ZR2014FQ010,ZR2010FQ019);信息安全国家重点实验室开放课题基金;华为科技基金(YB2013120027);青岛市建设事业科技发展项目(JK2015-26)


Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
Author:
Fund Project:

National Natural Science Foundation of China (61572267, 61272425, 60703089, 61402245); Shandong Provincial Natural Science Foundation of China (ZR2014FQ010, ZR2010FQ019); Open Research Fund from the State Key Laboratory of Information Security; Huawei Technique Fund (YB2013120027); Qingdao Construction Project of Science and Technology Development (JK2015-26)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [27]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    共享数据云存储完整性检测用来验证一个群体共享在云端数据的完整性,是最常见的云存储完整性检测方式之一.在云存储完整性检测中,用户用于生成数据签名的私钥可能会因为存储介质的损坏、故障等原因而无法使用.然而,目前已有的共享数据云存储完整性检测方案均未考虑到这个现实问题.探索了如何解决共享数据云存储完整性检测中私钥不可用的问题,提出了第1个具有私钥可恢复能力的共享数据云存储完整性检测方案.在方案中,当一个群用户的私钥不可用时,可以通过群里的t个或者t个以上的用户帮助其恢复私钥.同时,设计了随机遮掩技术,用于确保参与成员私钥的安全性.用户也可验证被恢复私钥的正确性.最后,给出安全性和实验结果的分析,结果显示所提方案是安全高效的.

    Abstract:

    Verifying the integrity of cloud data shared by a group is one of the most common usage of cloud storage integrity checking. In cloud storage integrity checking, the private key which is used to generate data signatures by user may be unavailable because of the damage or the fault of storage medium. However, currently existing cloud storage integrity checking schemes for shared data do not consider this realistic problem. This paper first explores how to deal with the problem of the private key unavailability in cloud storage integrity checking for shared data. A new scheme that enables cloud storage integrity checking for shared data with private key-recovery ability is proposed. In this scheme, when a group user's private key is unavailable, this user's private key can be recovered with the help of t or more users in the group. At the same time, a random masking technology is designed to guarantee the security of participating members' private keys. The user can also verify the correctness of the recovered private key. Finally, the analysis of security and experimental results are provided to show that the proposed scheme is secure and efficient.

    参考文献
    [1] Ren K, Wang C, Wang Q, Yu J. Research progress of data security in cloud computing. In: China Cryptography Development Report 2013. Beijing: China Quality Inspection Press, 2014. 71-94 (in Chinese).
    [2] Armbrust M, Fox A, Griffith R, Joseph A. D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010,53(4):50-58. [doi: 10.1145/1721654.1721672]
    [3] Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proc. of the ACM CCS. 2007. 598-609. [doi: 10.1145/1315245.1315318]
    [4] Wang BY, Li BC, Li H. Oruta: Privacy-Preserving public auditing for shared data in the cloud. In: Proc. of the IEEE Cloud. 2012. 295-302. [doi: 10.1109/CLOUD.2012.46]
    [5] Ren K, Wang C, Wang Q. Security challenges for the public cloud. IEEE Internet Computing, 2012,16(1):69-73. [doi: 10.1109/ MIC.2012.14]
    [6] Song D, Shi E, Fischer I, Shankar U. Cloud data protection for the masses. IEEE Computer, 2012,45(1):39-45. [doi: 10.1109/MC. 2012.1]
    [7] Wang C, Chow SMS, Wang Q, Ren K, Lou WJ. Privacy-Preserving public auditing for secure cloud storage. IEEE Trans. on Computers, 2013,62(2):362-375. [doi: 10.1109/TC.2011.245]
    [8] Wang Q, Wang C, Ren K, Lou WJ, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. on Parallel and Distributed Systems, 2011,22(5):847-859. [doi: 10.1109/TPDS.2010.183]
    [9] Singh R, Kumar S, Agrahari SK. Ensuring data storage security in cloud computing. Int'l Journal of Engineering and Computer Science, 2012,2319-7242.
    [10] Wang Q, Wang C, Li J, Ren K, Lou WJ. Enabling public verifiability and data dynamic for storage security in cloud computing. In: Proc. of the ESORICS. 2009. 355-370. [doi: 10.1007/978-3-642-04444-1_22]
    [11] Wang C, Wang Q, Ren K, Lou WJ. Privacy-Preserving public auditing for data storage security in cloud computing. In: Proc. of the IEEE INFOCOM. 2010. 1-9. [doi: 10.1109/INFCOM.2010.5462173]
    [12] Chen B, Curtmola R, Ateniese G, Burns R. Remote data checking for network coding-based distributed storage systems. In: Proc. of the ACM CCSW. 2010. 31-42. [doi: 10.1145/1866835.1866842]
    [13] Yu J, Ren K, Wang C, Varadharajan V. Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. on Information Forensics and Security, 2015,10(6):1167-1179. [doi: 10.1109/TIFS.2015.2400425]
    [14] Yang GY, Yu J, Shen WT, Su QQ. Fu ZJ, Hao R. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. Journal of Systems and Software, 2016,113:130-139. [doi: 10.1016/j.jss.2015.11.044]
    [15] Wang BY, Li H, Li M. Privacy-Preserving public auditing for shared cloud data supporting group dynamics. In: Proc. of the 2013 IEEE Int'l Conf. on Communications (ICC). 2013. 1946-1950. [doi: 10.1109/ICC.2013.6654808]
    [16] Wang BY, Li BC, Li H. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. on Services Computing, 2015,8(1):92-106. [doi: 10.1109/TSC.2013.2295611]
    [17] Yuan JW, Yu SC. Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proc. of the IEEE INFOCOM. 2014. 2121-2129.
    [18] Hard Drive Data Corruption-iAfrica. http://users.iafrica.com/c/cq/cquirke/baddata.htm [doi: 10.1109/INFOCOM.2014.6848154]
    [19] Hard Disk Drive Failure. https://en.wikipedia.org/wiki/Hard_disk_drive_failure
    [20] RSA Laboratories-How should I store my private key. http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/store-private- key.htm
    [21] What is Key Escrow?-Definition from Techopedia. http://www.techopedia.com/definition/3997/key-escrow
    [22] Shamir A. How to share a secret. Communications of the ACM, 1979,22(11):612-613. [doi: 10.1145/359168.359176]
    [23] Blakley GR. Safeguarding cryptographic keys. IEEE Computer Society, 1979. 313-317.
    [24] Shacham H, Waters B. Compact proofs of retrievability. Journal of Cryptology, 2013,26(3):442-483. [doi: 10.1007/s00145-012- 9129-2]
    [25] Lynn B. The pairing-based cryptographic library. 2015. http://crypto.Stanford.edu/pbc/
    附中文参考文献:
    [1] 任奎,王聪,王骞,于佳.云计算中数据安全的研究进展.见:中国密码学发展报告2013.北京:中国质检出版社,2014.71-94.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

沈文婷,于佳,杨光洋,程相国,郝蓉.具有私钥可恢复能力的云存储完整性检测方案.软件学报,2016,27(6):1451-1462

复制
分享
文章指标
  • 点击次数:5244
  • 下载次数: 6851
  • HTML阅读次数: 3053
  • 引用次数: 0
历史
  • 收稿日期:2015-08-14
  • 最后修改日期:2015-10-09
  • 在线发布日期: 2016-01-22
文章二维码
您是第19877004位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号