山东大学学报 (工学版) ›› 2022, Vol. 57 ›› Issue (5): 57-65.doi: 10.6040/j.issn.1671-9352.2.2021.004
• • 上一篇
李瑞峰1,易铮阁1,袁文勇1,杨晓元1,2,钮可1,2*
LI Rui-feng1, YI Zheng-ge1, YUAN Wen-yong1, YANG Xiao-yuan1,2, NIU Ke1,2*
摘要: 针对用户云端数据完整性被破坏后维权困难的问题,提出了一种基于椭圆曲线签名的云审计方案。方案使用区块链与智能合约技术,能够实现云审计公平支付;支持针对云服务商与第三方审计者的数据隐私保护;审计过程中不需要计算幂指数和双线性对,计算开销较小。安全性分析和实验结果表明,本方案是安全、高效的。
中图分类号:
[1] SINGH B, DHAWAN S, ARORA A, et al. A view of cloud computing[J]. International Journal of Computers & Technology, 2013, 4(2b1):50-58. [2] QUICK D, MARTINI B, CHOO K K R. Cloud storage forensics[M]. New York: Syngress, 2014: 23-61. [3] DESWARTE Y, QUISQUATER J J, SAÏDANE A. Remote integrity checking[M] //Integrity and Internal Control in Information Systems VI. Boston: Kluwer Academic Publishers, 2004: 1-11. [4] GAZZONI F D L, BARRETO P S L M. Demonstrating data possession and uncheatable data transfer[J]. IACR Cryptology ePrint Archive, 2006: 150-159. [5] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C] //Proceedings of the 14th ACM Conference on Computer and Communications Security-CCS '07. New York: ACM Press, 2007: 28-31. [6] ZENG K. Publicly verifiable remote data integrity[M] //Information and Communications Security. Heidelberg: Springer, 2008: 419-434. [7] SEBÉ F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient remote data possession checking in critical information infrastructures[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8):1034-1038. [8] WANG C, CHOW S S M, WANG Q, et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013, 62(2):362-375. [9] XUE J T, XU C X, ZHAO J N, et al. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain[J]. Science China Information Sciences, 2019, 62(3):1-16. [10] HUANG L X, ZHOU J L, ZHANG G X, et al. Certificateless public verification for data storage and sharing in the cloud[J]. Chinese Journal of Electronics, 2020, 29(4):639-647. http://dx.doi.org/10.1049/cje.2020.05.007 [11] MING Y, SHI W C. Efficient privacy-preserving certificateless provable data possession scheme for cloud storage[J]. IEEE Access, 2019, 7:122091-122105. [12] WANG H, QIN H, ZHAO M H, et al. Block chain-based fair payment smart contract for public cloud storage auditing[J]. Information Sciences, 2020, 519:348-362. [13] 富瑶,李庆丹,张泽辉,等.支持隐私保护和公平支付的数据完整性验证方案[J/OL]. [2021-08-24].计算机研究与发展,http://kns.cnki.net/kcms/detail/11.1777.TP.20210824.1601.014.html. FU Yao, LI Qingdan, ZHANG Zehui, et al. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J/OL]. [2021-08-24]. Journal of Computer Research and Development, http://kns.cnki.net/kcms/detail/11.1777.TP.2021 0824.1601.014.html. [14] GALBRAITH S D, PATERSON K G, SMART N P. Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008, 156(16):3113-3121. [15] MILLER V S. Use of elliptic curves in cryptography[M] //Lecture Notes in Computer Science. Berlin: Springer,1986: 417-426. [16] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209. [17] 贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11):2452-2466. HE Haiwu, YAN An, CHEN Zehua. Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018, 55(11):2452-2466. [18] 韩静,李艳平,禹勇,等.用户可动态撤销及数据可实时更新的云审计方案[J].软件学报,2020,31(2):578-596. HAN Jing, LI Yanping, YU Yong, et al. Cloud auditing scheme with dynamic revocation of users and real-time updates of data[J]. Journal of Software, 2020, 31(2):578-596. |
[1] | 黄泗勇, 陈婷婷, 卢清, 吴英杰, 叶少珍. 基于kd-树的差分隐私二维空间数据划分发布方法[J]. 山东大学学报(工学版), 2015, 45(1): 24-29. |
[2] | 周风余, 赵文斐, 田天, 陈宏兴, 陈竹敏. 陪护机器人云存储系统设计及实现[J]. 山东大学学报(工学版), 2014, 44(5): 1-6. |
[3] | 孙岚,罗钊,吴英杰,王一蕾. 面向路网限制的位置隐私保护算法[J]. 山东大学学报(工学版), 2012, 42(5): 96-101. |
|