通信学报 ›› 2019, Vol. 40 ›› Issue (4): 95-106.doi: 10.11959/j.issn.1000-436x.2019076

• 学术论文 • 上一篇    下一篇

抗密钥泄露的支持密态数据去重的完整性审计方案

张襄松1,李晨2,刘振华2()   

  1. 1 西安工业大学理学院,陕西 西安 710021
    2 西安电子科技大学数学与统计学院,陕西 西安 710071
  • 修回日期:2019-01-22 出版日期:2019-04-25 发布日期:2019-05-05
  • 作者简介:张襄松(1980- ),女,河南南阳人,博士,西安工业大学副教授,主要研究方向为信息科学中的安全与优化问题。|李晨(1992- ),女,河北石家庄人,西安电子科技大学硕士生,主要研究方向为密态数据去重与审计。|刘振华(1978- ),男,河南信阳人,博士,西安电子科技大学教授、硕士生导师,主要研究方向为密态数据的计算。
  • 基金资助:
    国家自然科学基金资助项目(61807026);国家自然科学基金资助项目(61472470);国家重点研发计划基金资助项目(2017YFB0802000);陕西省教育厅专项科研计划基金资助项目(17JK0362)

Key-exposure resilient integrity auditing scheme with encrypted data deduplication

Xiangsong ZHANG1,Chen LI2,Zhenhua LIU2()   

  1. 1 School of Science,Xi’an Technological University,Xi’an 710021,China
    2 School of Mathematics and Statistics,Xidian University,Xi’an 710071,China
  • Revised:2019-01-22 Online:2019-04-25 Published:2019-05-05
  • Supported by:
    The National Natural Science Foundation of China(61807026);The National Natural Science Foundation of China(61472470);The National Key Research Development Program of China(2017YFB0802000);The Scientific Research Plan Project of Education Department of Shaanxi Province(17JK0362)

摘要:

针对云存储环境中密钥泄露、数据重复和完整性检验的问题,提出了一种支持密钥更新和密文数据去重的完整性审计方案。所提方案利用布隆过滤器实现了密态数据的客户端去重,且每一次密钥更新能保证更新结果不能由其余时间周期的密钥猜测得到。该方案首次解决了在支持密态数据去重的审计方案中密钥更新困难的问题。安全性分析表明,所提方案在随机预言机模型下基于计算性Diffie-Hellman困难问题假设具有强抗密钥泄露、机密性、可检测性以及认证标签和证明值的不可伪造性。

关键词: 云存储, 完整性审计, 抗密钥泄露, 密态数据, 客户端去重

Abstract:

For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.

Key words: cloud storage, integrity auditing, key-exposure resilient, encrypted data, client-side deduplication

中图分类号: 

No Suggested Reading articles found!