通信学报 ›› 2019, Vol. 40 ›› Issue (4): 128-139.doi: 10.11959/j.issn.1000-436x.2019073

• 学术论文 • 上一篇    下一篇

格上基于身份的云存储完整性检测方案

田苗苗1,高闯1,陈洁2   

  1. 1 安徽大学计算机科学与技术学院,安徽 合肥 230601
    2 华东师范大学计算机科学与软件工程学院,上海 200062
  • 修回日期:2019-01-11 出版日期:2019-04-25 发布日期:2019-05-05
  • 作者简介:田苗苗(1987– ),男,安徽阜阳人,博士,安徽大学副教授,主要研究方向为密码学与信息安全。|高闯(1994– ),男,河南长垣人,安徽大学硕士生,主要研究方向为密码学与信息安全。|陈洁(1985– ),男,江苏苏州人,博士,华东师范大学研究员,主要研究方向为密码学与信息安全。
  • 基金资助:
    国家自然科学基金资助项目(61502443);国家自然科学基金资助项目(61772001);国家自然科学基金资助项目(61472142);国家自然科学基金资助项目(U1705264)

Identity-based cloud storage integrity checking from lattices

Miaomiao TIAN1,Chuang GAO1,Jie CHEN2   

  1. 1 School of Computer Science and Technology,Anhui University,Hefei 230601,China
    2 School of Computer Science and Software Engineering,East China Normal University,Shanghai 200062,China
  • Revised:2019-01-11 Online:2019-04-25 Published:2019-05-05
  • Supported by:
    The National Natural Science Foundation of China(61502443);The National Natural Science Foundation of China(61772001);The National Natural Science Foundation of China(61472142);The National Natural Science Foundation of China(U1705264)

摘要:

随着云存储的快速发展,越来越多的用户将数据存储在云端。为了验证云端的用户数据是否损坏,一种有效的方法是采用云存储完整性检测方案。利用理想格上的小整数解问题,设计了一种基于身份的云存储完整性检测方案,并在随机预言模型下证明了所提方案可以抵抗云服务器的适应性选择身份攻击。为了验证方案的效率,通过实验将所提方案与现有的2种基于身份的云存储完整性检测方案分别进行了比较。实验结果显示,所提方案的标签在线生成时间降低了88.32%~93.74%,证据验证时间降低了98.81%~99.73%。

关键词: 格, 基于身份的密码学, 云存储, 完整性检测

Abstract:

With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.

Key words: lattice, identity-based cryptography, cloud storage, integrity checking

中图分类号: 

No Suggested Reading articles found!