检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]College of Information Engineering, Shenzhen University [2]Shenzhen Key Laboratory of Advanced Communications and Information Processing
出 处:《Chinese Journal of Electronics》2014年第1期186-190,共5页电子学报(英文版)
基 金:supported by the National Natural Science Foundation of China(No.61001058,No.61171072);Projects in the National Science&Technology Pillar Program(No.2011BAH20B02,No.2011BAH20B03)
摘 要:Cloud storage can provide flexible and scal- able data storage services to users. However, once data is uploaded to the cloud without a copy in local computers, the user loses control of the data physically. So, it is nec- essary to study a method to ensure users' data integrity. Avoiding retrieving enormous storage data or checking the data by users, a proof of storage protocol with public audit- ing was proposed based on the lattice cryptography. The user computed the signatures of the blocks, and outsourced them to cloud servers. Cloud service providers combined the blocks. Third party auditor verified all blocks' integrity only through the combined message and signature. Based on the Small integer solution assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the Learning with error assumption, the presented protocol is secure against the curiosity attack from third party auditor. The pro- tocol is quite eftlcient, requiring just a few matrix-vector multiplications and samplings from discrete Gaussians.Cloud storage can provide flexible and scalable data storage services to users. However, once data is uploaded to the cloud without a copy in local computers,the user loses control of the data physically. So, it is necessary to study a method to ensure users' data integrity.Avoiding retrieving enormous storage data or checking the data by users, a proof of storage protocol with public auditing was proposed based on the lattice cryptography. The user computed the signatures of the blocks, and outsourced them to cloud servers. Cloud service providers combined the blocks. Third party auditor verified all blocks' integrity only through the combined message and signature. Based on the Small integer solution assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the Learning with error assumption, the presented protocol is secure against the curiosity attack from third party auditor. The protocol is quite efficient, requiring just a few matrix-vector multiplications and samplings from discrete Gaussians.
关 键 词:Cloud storage Proof of storage Latticecryptography Public auditing.
分 类 号:TP333[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.229