通信学报 ›› 2017, Vol. 38 ›› Issue (Z2): 156-163.doi: 10.11959/j.issn.1000-436x.2017269

• 学术论文 • 上一篇    下一篇

基于收敛加密的云安全去重与完整性审计系统

郭晓勇1,2,付安民1,2,况博裕1,丁纬佳1   

  1. 1 南京理工大学计算机科学与工程学院,江苏 南京 210094
    2 贵州大学贵州省公共大数据重点实验室,贵州 贵阳 550025
  • 出版日期:2017-11-01 发布日期:2018-06-07
  • 作者简介:郭晓勇(1993-),男,山西忻州人,南京理工大学硕士生,主要研究方向为云存储安全。|付安民(1981-),男,湖北通城人,博士,南京理工大学副教授、博士生导师,主要研究方向为无线网络安全、云计算、大数据安全等。|况博裕(1994-),男,四川绵阳人,南京理工大学硕士生,主要研究方向为物联网安全。|丁纬佳(1995-),女,浙江杭州人,南京理工大学本科生,主要研究方向为云存储安全。

Secure deduplication and integrity audit system based on convergent encryption for cloud storage

Xiao-yong GUO1,2,An-min FU1,2,Bo-yu KUANG1,Wei-jia DING1   

  1. 1 School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
    2 Guizhou Provincial Key Laboratory of Public Big Data,GuiZhou University,Guiyang 550025,China
  • Online:2017-11-01 Published:2018-06-07

摘要:

云存储应用以其便利性、可扩展性等优势迅速成为个人用户和企业存储的不二选择,但安全去重与完整性审计是云存储面临的关键问题。首先提出了基于盲签名的收敛密钥封装与解封算法,在安全存储收敛密钥的同时可以实现收敛密钥去重,提高了云存储空间利用率。另一方面,提出了基于收敛密钥的BLS签名算法,并利用可信第三方(TTP)存储审计公钥和代理审计,实现了对审计签名和审计公钥的去重,减轻了客户端存储和计算负担。在此基础上,进一步设计与实现了一个基于收敛加密的云安全去重和完整性审计系统。该系统能为云存储提供数据隐私保护、重复认证、审计认证等安全服务,且进一步降低了客户端、云端的存储和计算开销。

关键词: 去重, 收敛密钥, 密钥管理, 代理审计

Abstract:

Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.

Key words: deduplication, convergent key, key management, proxy audit

中图分类号: 

No Suggested Reading articles found!