Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/90852
標題: 一個低儲存空間成本的多擁有者資料完整性公開驗證機制
A Low Storage Overhead Public Verification Scheme on the Integrity of Multi-Owner Data
作者: Yu-An Chen
陳昱安
關鍵字: data integrity
provable data possession
cloud storage
multi-owner
public verification
outsoueced storage
資料完整性
可證明的資料擁有
雲端儲存空間
多個擁有者
公開驗證
資料外包
引用: [1] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, 'Provable data possession at untrusted stores,' Proceedings of the 14th ACM conference on Computer and communications security ACM, pp. 598-609, 2007. [2] G. Ateniese, S. Hohenberger, 'Proxy re-signatures: new definitions, algorithms, and applications,' Proceedings of the 12th ACM conference on Computer and communications security. Pp. 310-319, 2005. [3] G. Ateniese, R. D. Pietro, L. V. Mancini, G. Tsudik, 'Scalable and efficient provable data possession,' SecureComm '08 Proceedings of the 4th international conference on Security and privacy in communication networks, No. 9, 2008. [4] M. Bellare, G. Neven, 'Multi-signatures in the plain public-key model and a general forking lemma,' Proceedings of the 13th ACM conference on Computer and communications security, pp. 390-399, 2006. [5] M. Blaze, G. Bleumer, M. Strauss, 'Divertible protocols and atomic proxy cryptography,' Advances in Cryptology – EUROCPYPT'98 Lecture Notes in Computer Science, Vol. 1403, pp. 127-144, 1998. [6] A. Boldyreva, 'Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme,' Public key cryptography – PKC 2003, Vol. 2567, pp. 31-46, 2003. [7] D. Boneh, B. Lynn, H. Shacham, 'Short signatures from weil pairing,' Advances in Cryptology – ASIACPYPT 2001 Lecture Notes in Computer Science, Vol. 2248, pp. 514-532, 2001. [8] L. Chen, 'Using algebraic signatures to check data possession in cloud storage,' Future Generation Computer System, Vol. 29, No. 7, pp. 1709-1715, 2013. [9] L. Chen, S. Zhou, X. Huang, L. Xu, 'Data dynamics for remote data possession checking in cloud storage,' Computers & Electrical Engineering, Vol. 39, No. 7, pp. 2413-2424, 2013. [10] H. Den, X. Song, J. Tao, 'A double-efficient integrity verification scheme to cloud storage data.' TELKONIKA Indonesian Journal of Electrical Engineering, Vol. 12, No. 9, pp. 7007-7013, 2014. [11] Y. Deswarte, J. J. Quisquater, A. Sai ̈dane, 'Remote integrity checking,' Integirty and Internal Control in Information Systems VI, pp. 1-11, 2004. [12] W. Diffie, M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976. [13] D. L. G. Filho, P. S. L. M. Barreto, 'Demonstrating data possession and uncheatable data transfer,' IACR Cryptology ePrint Archive, 2006. [14] Z. Hao, S. Zhong, N. Yu, 'A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,' IEEE Transactions on Knowledge and Data Engineering, Vol. 23, No. 9, pp. 1432-1437, 2011. [15] K. Itakura, K. Nakamura, 'A public-key cryptosystem suitable for digital multisignatures,' NEC Research and Development, Vol. 71, pp. 1-8, 1983. [16] N. Kaniche, E. E. Moustaine, M. Laurent, 'A novel zero-knowledge scheme for proof of data possession in cloud storage applications,' 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing(CCGrid), pp. 522-531, 2014. [17] N. Koblitz, 'Elliptic curve cryptosystems,' Mathematics of computation,Vol. 48, No. 177, pp. 203-209, 1987. [18] S. Kumar R, A. Saxena, 'Data integrity proofs in cloud storage,' 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1-4, 2011. [19] H. Liu, G. Bai, 'Ensuring the data integrity in cloud data storage,' 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 240-243, 2011. [20] H. Liu, P. Zhang, J. Liu, 'Public data integrity verification for secure cloud storage,' Journal of Networks, Vol. 8, No. 2, pp.373-380, 2013. [21] V. Miller, 'Use of elliptic curves in cryptography,' Lecture Notes in Computer Science, pp. 417-426, 1986. [22] H. Shacham, B. Waters, 'Compact proofs of retrievability,' Advances in Cryptology – ASIACPYPT 2008, Vol. 5350, pp. 90-107, 2008. [23] C. Wang, S. S. M. Chow, M. Li, H. Li, 'Storing shared data on the cloud via security-mediator,' 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 124-133, 2013. [24] C. Wang, S. S. M. Chow, Q, Wang, K. Ren, W. Lou, 'Privacy-preserving public auditing for secure cloud storage,' IEEE Transactions on Computers, Vol. 62, pp. 362-375, 2013. [25] B. Wang, B. Li, H. Li, 'Oruta: Privacy-preserving public auditing for shared data in the cloud,' 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp.295-302, 2012. [26] B. Wang, B. Li, H. Li, 'Public auditing for shared data with efficient user revocation in the cloud,' INFOCOM, 2013 Proceedings IEEE, pp. 2904-2912, 2013. [27] B. Wang, H. Li, X. Liu, F. Li X. Li, 'Efficient public verification on the integrity of multi-owner data in the cloud,' Journal of Communications and Networks, Vol. 16, no. 6, pp.592-599, 2014. [28] C. Wang, Q. Wang, K. Ren, W. Lou, 'Privacy-preserving public auditing for data storage security in cloud computing,' INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010. [29] Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, 'Enabling public verifiability and data dynamics for storage security in cloud computing,' Computer Security-ESORICS 2009, Vol. 5789, pp. 355-370, 2009. [30] Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, 'Enabling public auditability and data dynamics for storage security in cloud computing,' IEEE Transactions on Parallel and Distributed System, Vol. 22, No. 5, pp. 847-859, 2011. [31] S. G. Worku, C. Xu, J. Zhan, X. He, 'Secure and efficient privacy-preserving public auditing scheme for cloud storage,' Computers & Electrical Engineering, Vol. 40, No. 5, pp. 1703-1713, 2014. [32] Y. Yu, J. Ni, M. H. Au, H. Liu, H. Wang, C. Xu, 'Improved security of a dynamic remote data possession checking protocol for cloud storage,' Expert Systems with Applications, Vol. 41, No. 17, pp. 7789-7796, 2014. [33] Y. Yu, Y. Zhang, J, Ni, M. H. Au, L. Chen, H. Liu, 'Remote data possession checking with enhanced security for cloud storage,' Future Generation Computer Systems, 2014. [34] J. Yuan, S. Yu, 'Proofs of retrievability with public verifiability and constant communication cost in cloud,' Proceedings of the 2013 international workshop on Security in cloud computing ACM, pp. 19-26, 2013. [35] Y. Zhu, G. Hu, G. J. Ahn, S. S. Yau, 'Efficient audit service outsourcing for data integrity in clouds,' Journal of Systems and Software, Vol. 85, No. 5, pp. 1083-1095, 2012. [36] Y. Zhu, H. Hu, G. J. Ahn, M. Yu, 'Cooperative provable data possession for integrity verification in multicloud storage,' IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 12, pp. 2231-2244, 2012.
摘要: Since the rise of cloud computing, there are more and more people dedicate to the study of security in cloud storage in order to ensure the integrity of the stored data. But most of these researches are for single data owner, few of them consider the cases of shared data. Wang et al. are the first to propose public verification on the integrity of multi-owner data in the cloud. We analysis Wang et al.'s scheme and show that it can not resist malicious cloud server from tampering or deleting user's data. Also, verifiable tags and file are at the same size. So, cloud server needs to spend twice of the space to store the verifiable tags and file. In this thesis, we propose a low storage overhead public verification scheme on the integrity of multi-owner data. And we solve the security problem and reduce the size of verifiable tags. Based on the 'user-pays' principle in cloud storage, our scheme can reduce user's cost, too.
由於雲端運算的興起,有愈來愈多的人投入雲端儲存空間安全性的研究,確保用戶上傳的資料不會遭竄改或刪除,但這些研究絕大部分皆是以單一資料擁有者的角度來探討,鮮少人討論可分享的資料。Wang等學者是第一個提出,多擁有者的資料完整性公開驗證機制。本文分析Wang等學者機制的安全性後,發現此機制無法抵抗惡意的雲端服務提供者,即使將使用者上傳的資料遭竄改或刪除,惡意的雲端服務提供者仍然能欺騙驗證者且通過驗證。而此機制中,驗證標籤和檔案的大小幾乎相同,因此雲端服務提供者需多花一倍的檔案空間來儲存驗證標籤。本文修補此漏洞,且改善儲存空間成本,將驗證標籤的大小縮小為原本的(1⁄s)倍,基於雲端儲存空間上的使用者付費原則,本文提出一個低儲存空間成本的多擁有者資料完整性公開驗證機制,減少用戶的花費。
URI: http://hdl.handle.net/11455/90852
其他識別: U0005-1307201516074400
文章公開時間: 2018-07-16
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.