Please use this identifier to cite or link to this item:
標題: 一個低儲存空間成本的多擁有者資料完整性公開驗證機制
A Low Storage Overhead Public Verification Scheme on the Integrity of Multi-Owner Data
作者: Yu-An Chen
關鍵字: data integrity
provable data possession
cloud storage
public verification
outsoueced storage
引用: [1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, 'Provable data possession at untrusted stores,' Proceedings of the 14th ACM conference on Computer and communications security ACM, pp. 598-609, 2007. [2] G. Ateniese, S. Hohenberger, 'Proxy re-signatures: new definitions, algorithms, and applications,' Proceedings of the 12th ACM conference on Computer and communications security. Pp. 310-319, 2005. [3] G. Ateniese, R. D. Pietro, L. V. Mancini, G. Tsudik, 'Scalable and efficient provable data possession,' SecureComm '08 Proceedings of the 4th international conference on Security and privacy in communication networks, No. 9, 2008. [4] M. Bellare, G. Neven, 'Multi-signatures in the plain public-key model and a general forking lemma,' Proceedings of the 13th ACM conference on Computer and communications security, pp. 390-399, 2006. [5] M. Blaze, G. Bleumer, M. Strauss, 'Divertible protocols and atomic proxy cryptography,' Advances in Cryptology – EUROCPYPT'98 Lecture Notes in Computer Science, Vol. 1403, pp. 127-144, 1998. [6] A. Boldyreva, 'Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme,' Public key cryptography – PKC 2003, Vol. 2567, pp. 31-46, 2003. [7] D. Boneh, B. Lynn, H. Shacham, 'Short signatures from weil pairing,' Advances in Cryptology – ASIACPYPT 2001 Lecture Notes in Computer Science, Vol. 2248, pp. 514-532, 2001. [8] L. Chen, 'Using algebraic signatures to check data possession in cloud storage,' Future Generation Computer System, Vol. 29, No. 7, pp. 1709-1715, 2013. [9] L. Chen, S. Zhou, X. Huang, L. Xu, 'Data dynamics for remote data possession checking in cloud storage,' Computers & Electrical Engineering, Vol. 39, No. 7, pp. 2413-2424, 2013. [10] H. Den, X. Song, J. Tao, 'A double-efficient integrity verification scheme to cloud storage data.' TELKONIKA Indonesian Journal of Electrical Engineering, Vol. 12, No. 9, pp. 7007-7013, 2014. [11] Y. Deswarte, J. J. Quisquater, A. Sai ̈dane, 'Remote integrity checking,' Integirty and Internal Control in Information Systems VI, pp. 1-11, 2004. [12] W. Diffie, M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976. [13] D. L. G. Filho, P. S. L. M. Barreto, 'Demonstrating data possession and uncheatable data transfer,' IACR Cryptology ePrint Archive, 2006. [14] Z. Hao, S. Zhong, N. Yu, 'A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,' IEEE Transactions on Knowledge and Data Engineering, Vol. 23, No. 9, pp. 1432-1437, 2011. [15] K. Itakura, K. Nakamura, 'A public-key cryptosystem suitable for digital multisignatures,' NEC Research and Development, Vol. 71, pp. 1-8, 1983. [16] N. Kaniche, E. E. Moustaine, M. Laurent, 'A novel zero-knowledge scheme for proof of data possession in cloud storage applications,' 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing(CCGrid), pp. 522-531, 2014. [17] N. Koblitz, 'Elliptic curve cryptosystems,' Mathematics of computation,Vol. 48, No. 177, pp. 203-209, 1987. [18] S. Kumar R, A. Saxena, 'Data integrity proofs in cloud storage,' 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1-4, 2011. [19] H. Liu, G. Bai, 'Ensuring the data integrity in cloud data storage,' 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 240-243, 2011. [20] H. Liu, P. Zhang, J. Liu, 'Public data integrity verification for secure cloud storage,' Journal of Networks, Vol. 8, No. 2, pp.373-380, 2013. [21] V. Miller, 'Use of elliptic curves in cryptography,' Lecture Notes in Computer Science, pp. 417-426, 1986. [22] H. Shacham, B. Waters, 'Compact proofs of retrievability,' Advances in Cryptology – ASIACPYPT 2008, Vol. 5350, pp. 90-107, 2008. [23] C. Wang, S. S. M. Chow, M. Li, H. Li, 'Storing shared data on the cloud via security-mediator,' 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 124-133, 2013. [24] C. Wang, S. S. M. Chow, Q, Wang, K. Ren, W. Lou, 'Privacy-preserving public auditing for secure cloud storage,' IEEE Transactions on Computers, Vol. 62, pp. 362-375, 2013. [25] B. Wang, B. Li, H. Li, 'Oruta: Privacy-preserving public auditing for shared data in the cloud,' 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp.295-302, 2012. [26] B. Wang, B. Li, H. Li, 'Public auditing for shared data with efficient user revocation in the cloud,' INFOCOM, 2013 Proceedings IEEE, pp. 2904-2912, 2013. [27] B. Wang, H. Li, X. Liu, F. Li X. Li, 'Efficient public verification on the integrity of multi-owner data in the cloud,' Journal of Communications and Networks, Vol. 16, no. 6, pp.592-599, 2014. [28] C. Wang, Q. Wang, K. Ren, W. Lou, 'Privacy-preserving public auditing for data storage security in cloud computing,' INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010. [29] Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, 'Enabling public verifiability and data dynamics for storage security in cloud computing,' Computer Security-ESORICS 2009, Vol. 5789, pp. 355-370, 2009. [30] Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, 'Enabling public auditability and data dynamics for storage security in cloud computing,' IEEE Transactions on Parallel and Distributed System, Vol. 22, No. 5, pp. 847-859, 2011. [31] S. G. Worku, C. Xu, J. Zhan, X. He, 'Secure and efficient privacy-preserving public auditing scheme for cloud storage,' Computers & Electrical Engineering, Vol. 40, No. 5, pp. 1703-1713, 2014. [32] Y. Yu, J. Ni, M. H. Au, H. Liu, H. Wang, C. Xu, 'Improved security of a dynamic remote data possession checking protocol for cloud storage,' Expert Systems with Applications, Vol. 41, No. 17, pp. 7789-7796, 2014. [33] Y. Yu, Y. Zhang, J, Ni, M. H. Au, L. Chen, H. Liu, 'Remote data possession checking with enhanced security for cloud storage,' Future Generation Computer Systems, 2014. [34] J. Yuan, S. Yu, 'Proofs of retrievability with public verifiability and constant communication cost in cloud,' Proceedings of the 2013 international workshop on Security in cloud computing ACM, pp. 19-26, 2013. [35] Y. Zhu, G. Hu, G. J. Ahn, S. S. Yau, 'Efficient audit service outsourcing for data integrity in clouds,' Journal of Systems and Software, Vol. 85, No. 5, pp. 1083-1095, 2012. [36] Y. Zhu, H. Hu, G. J. Ahn, M. Yu, 'Cooperative provable data possession for integrity verification in multicloud storage,' IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 12, pp. 2231-2244, 2012.
摘要: Since the rise of cloud computing, there are more and more people dedicate to the study of security in cloud storage in order to ensure the integrity of the stored data. But most of these researches are for single data owner, few of them consider the cases of shared data. Wang et al. are the first to propose public verification on the integrity of multi-owner data in the cloud. We analysis Wang et al.'s scheme and show that it can not resist malicious cloud server from tampering or deleting user's data. Also, verifiable tags and file are at the same size. So, cloud server needs to spend twice of the space to store the verifiable tags and file. In this thesis, we propose a low storage overhead public verification scheme on the integrity of multi-owner data. And we solve the security problem and reduce the size of verifiable tags. Based on the 'user-pays' principle in cloud storage, our scheme can reduce user's cost, too.
其他識別: U0005-1307201516074400
文章公開時間: 2018-07-16
Appears in Collections:資訊科學與工程學系所



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.