融合门限公钥加密和纠删码的安全云存储模型
作者:
基金项目:

国家自然科学基金(61440014);辽宁省博士启动基金(20141012);中央高校基本科研业务费项目(N151704002);沈阳市科技计划(F14-231-1-08)


Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
Author:
Fund Project:

National Natural Science Foundation of China (61440014); Liaoning Province Doctor Startup Fundunder (20141012); Fundamental Research Funds for the Central Universitie (N151704002); Shenyang Science and Technology Plan Projects (F14-231-1-08)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [26]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    针对当前云存储系统中的机密性和容错性问题,展开分析和研究.指出目前的主流解决方案往往仅能解决机密性问题或容错性问题中的一个,而不能将二者兼顾起来进行考虑.为此,将门限公钥加密技术与指数纠删码(erasure codes over exponents,简称EC-E)相融合,设计并提出了同时能够满足机密性与容错性要求的安全云存储模型(a secure cloud storage model with data confidentiality and fault-tolerant,简称SCSM-DCF).给出了模型的形式化定义、安全性定义以及实体间通信协议;对模型的性能进行分析,指出其在能够保证安全性的同时,具有较好的代价 优势.

    Abstract:

    The analysis and research described in this paper aim at solving the problem of data confidentiality and fault-tolerant in cloud storage environments. It first shows that the existing solutions can either solve the problem of confidentiality or fault tolerance, but are not able to take both for consideration. In order to solve the problems, the paper proposes a secure cloud storage system with data confidentiality and fault-tolerant (SCSM-DCF),which is based on threshold public key encryption scheme and erasure codes over exponents. The formal definition, security definition, and communication protocols between entities are given in this paper. Finally, the performance of the model is analyzed, and the result indicates that the model is not only correct and secure, but also has the higher efficiency.

    参考文献
    [1] Li H, Sun WH, Li FH, Wang BY. Secure and privacy-preserving data storage service in public cloud. Journal of Computer Research and Development, 2014,51(7):1397-1409 (in Chinese with English abstract).
    [2] Fu YX, Luo SM, Shu JW. Survey of secure cloud storage system and key technologies. Journal of Computer Research and Development, 2013,50(1):136-145 (in Chinese with English abstract).
    [3] Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Ruan Jian Xue Bao/Journal of Software, 2011, 22(1):71-83 (in Chinese with English abstract). [doi: 10.3724/SP.J.1001.2011.03958]
    [4] Julisch K, Hall M. Security and control in the cloud. Information Security Journal: A Global Perspective, 2010,19(6):299-309. [doi: 10.1080/19393555.2010.514654]
    [5] Yu NH, Hao Z, Xu JJ, Zhang WM, Zhang C. Review of cloud computing security. Acta Electronica Sinica, 2013,41(2):371-381 (in Chinese with English abstract).
    [6] Padilha R, Pedone F. Confidentiality in the cloud. IEEE Security & Privacy, 2015,13(1):57-60. [doi: 10.1109/MSP.2015.4]
    [7] Wang HB, Cao ZF, Wang LC. Multi-Use and unidirectional identity-based proxy re-encryption. Information Sciences, 2010, 180(20):4042-4059. [doi: 10.1016/j.ins.2010.06.029]
    [8] Zhu WT. Towards secure and communication-efficient broadcast encryption systems. Journal of Network and Computer Applications, 2013,36(1):178-186. [doi: 10.1016/j.jnca.2012.09.007]
    [9] Wei HJ, Liu WF, Hu XX. Forward-Secure ciphertext-policy attribute-based encryption scheme. Journal on Communications, 2014, 35(7):38-45 (in Chinese with English abstract).
    [10] Gentry C. Fully homomorphic encryption using ideal lattices. In: Proc. of the STOC 2009. Bethesda: ACM Press, 2009. 169-178. [doi: 10.1145/1536414.1536440]
    [11] Boneh D, Crescenzo GD, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proc. of the EUROCRYPT 2004. Interlaken: Springer-Verlag, 2004. 506-522. [doi: 10.1007/978-3-540-24676-3_30]
    [12] Li J, Wang Q, Wang C, Cao N, Ren K , Lou WJ. Fuzzy key word search over encrypted data in cloud computing. In: Proc. of the INFOCOM 2010. San Diego: IEEE Press, 2010. 441-445. [doi: 10.1109/INFCOM.2010.5462196]
    [13] Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the ICDCS 2010. Genova: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS.2010.34]
    [14] Cao N, Wang C, Li M, Ren K, Lou WJ. Privacy-Preserving multi-keyword ranked search over encrypted cloud data. In: Proc. of the INFOCOM. Shanghai: IEEE Computer Society, 2011. 829-837. [doi: 10.1109/INFCOM.2011.5935306]
    [15] Li M, Yu SC, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the ICDCS 2011. Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS.2011.55]
    [16] Tan PX, Chen Y, Lan JL, Jia HY. Secure fault-tolerant code for cloud storage. Journal on Communications, 2014,35(3):109-115 (in Chinese with English abstract).
    [17] Weatherspoon H, Kubiatowicz JD. Erasure coding vs. replication: A quantitative comparison. In: Proc. of the 1st Int'l Workshop on Peer to Peer Systems. Cambridge: Springer-Verlag, 2002. 328-337. [doi: 10.1007/3-540-45748-8_31]
    [18] Yang DR, Wang Y, Liu P. Fault-Tolerant mechanism combined with replication and error correcting code for cloud file systems. Journal of Tshinghua University (Sci. & Technol.), 2014,54(1):137-144 (in Chinese with English abstract).
    附中文参考文献:
    [1] 李晖,孙文海,李凤华,王博洋.公共云存储服务数据安全及隐私保护技术综述.计算机研究与发展,2014,51(7):1397-1409.
    [2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述.计算机研究与发展,2013,50(1):136-145.
    [3] 冯登国,张敏,张妍,徐震.云计算安全研究.软件学报,2011,22(1):71-83. [doi: 10.3724/SP.J.1001.2011.03958]
    [5] 俞能海,郝卓,徐甲甲,张卫明,张驰.云安全研究进展综述.电子学报,2013,41(2):371-381.
    [9] 魏江宏,刘文芬,胡学先.前向安全的密文策略基于属性加密方案.通信学报,2014,35(7):38-45.
    [16] 谭鹏许,陈越,兰巨龙,贾洪勇.用于云存储的安全容错编码.通信学报,2014,35(3):109-115.
    [18] 杨东日,王颖,刘鹏.一种副本复制和纠错码融合的云存储文件系统容错机制.清华大学学报(自然科学版),2014,54(1):137-144.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

徐剑,李坚,韩健,李福祥,周福才.融合门限公钥加密和纠删码的安全云存储模型.软件学报,2016,27(6):1463-1474

复制
分享
文章指标
  • 点击次数:4961
  • 下载次数: 6933
  • HTML阅读次数: 2973
  • 引用次数: 0
历史
  • 收稿日期:2015-08-15
  • 最后修改日期:2015-10-09
  • 在线发布日期: 2016-01-22
文章二维码
您是第19732985位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号