通信学报 ›› 2021, Vol. 42 ›› Issue (6): 145-157.doi: 10.11959/j.issn.1000-436x.2021091

• 学术论文 • 上一篇    下一篇

具有可信约束的分布式存储因果一致性模型

田俊峰1,2, 张俊涛1,2, 王彦骉1,2   

  1. 1 河北大学网络空间安全与计算机学院,河北 保定 071002
    2 河北省高可信信息系统重点实验室,河北 保定 071002
  • 修回日期:2021-03-24 出版日期:2021-06-25 发布日期:2021-06-01
  • 作者简介:田俊峰(1965− ),男,河北保定人, 博士,河北大学教授、博士生导师,主要研究方向为信息安全与分布式计算
    张俊涛(1995− ),男,河北保定人,河北大学硕士生,主要研究方向为信息安全与数据一致性
    王彦骉(1994− ),男,河北邢台人,河北大学硕士生,主要研究方向为信息安全与数据一致性
  • 基金资助:
    国家自然科学基金资助项目(61802106);河北省自然科学基金资助项目(F2016201244)

Distributed storage causal consistency model with trusted constraint

Junfeng TIAN1,2, Juntao ZHANG1,2, Yanbiao WANG1,2   

  1. 1 School of Cyber Security and Computer, Hebei University, Baoding 071002, China
    2 Key Laboratory on High Trusted Information System in Hebei Province, Baoding 071002, China
  • Revised:2021-03-24 Online:2021-06-25 Published:2021-06-01
  • Supported by:
    The National Natural Science Foundation of China(61802106);The Natural Science Foundation of Hebei Province(F2016201244)

摘要:

目前,关于分布式存储因果一致性的研究领域中鲜有考虑安全风险的成熟方案。在混合逻辑时钟和HashGraph的基础上,结合可信云平台中的可信云联盟技术,提出了具有可信约束的分布式存储因果一致性模型(CCT模型)。CCT模型在客户端、服务端分别设计了身份认证和一致性数据可信校验机制,并对云存储集群中数据副本之间同步数据的过程进行了安全约束。通过仿真实验验证,CCT模型在造成了较小性能开销的前提下,能对客户端和服务端中身份签名伪造、非法第三方等安全风险进行识别并验证,为系统提供可信约束。

关键词: 分布式存储, 因果一致性, 可信约束, 混合逻辑时钟, HashGraph

Abstract:

At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.

Key words: distributed storage, causal consistency, trusted constraint, hybrid logical clock, HashGraph

中图分类号: 

No Suggested Reading articles found!