检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]南京理工大学计算机科学与工程学院,江苏南京210094
出 处:《电子学报》2017年第12期2863-2872,共10页Acta Electronica Sinica
基 金:国家自然科学基金项目(No.61572255;No.61702266);江苏省自然科学基金项目(No.BK20141404;BK20150787);中国博士后科学基金(No.2015M582622);江苏省研究生培养创新工程项目(No.KYLX16-0465)
摘 要:云存储环境下,客户端数据去重能在本地进行文件重复性检测,有效地节约存储空间和网络带宽.然而,客户端去重仍面临着很多安全挑战.首先,由于将文件哈希值作为重复性检测的证据,攻击者很可能通过一个文件的哈希值获得整个文件;其次,为了保护数据隐私,收敛加密被广泛运用于数据去重方案,但是由于数据本身是可预测的,所以收敛加密仍不可避免地遭受暴力字典攻击.为了解决上述问题,本文首次利用盲签名构造了一个安全的密钥生成协议,通过引入一个密钥服务器,实现了对收敛密钥的二次加密,有效地预防了暴力字典攻击;并进一步提出了一个基于块密钥签名的拥有权证明方法,能够有效预防攻击者通过单一的哈希值来获取文件,并能同时实现对密文文件的文件级和块级去重.同时,安全分析表明本文方案在随机预言模型下是可证明安全的,并能够满足收敛密钥安全、标签一致性和抗暴力字典攻击等更多安全属性.此外,与现有方案相比,实验结果表明本文方案在文件上传和文件去重方面的计算开销相对较小.In cloud storage environment,client-side data deduplication can detect duplicated files at local, so as to save storage space and network bandwidth effectively. However,client-side deduplication still faces many security challenges.Firstly, since the file hash value is regarded as the evidence of duplication detection, the attacker is likely to obtain a whole file via a hash of the file. Secondly, to ensure the privacy of data, convergent encryption has been widely used in data deduplication technology,but the data itself is predictable, so that convergent encryption still inevitably suffered from violence dictionary attacks. To solve problems mentioned above, this paper uses blind signature to construct a secure key generation protocol,by introducing a key server to achieve the secondary encryption of keys,which efficiently prevents violence dictionary attacks. Furthermore,we propose a Proof of Ownership method based on block key signature. It can effectively prevent the attacker from obtaining the file through a single hash value and can realize the file-level and block-level deduplication of the encrypted file simultaneously. Meanwhile, the security analysis shows that our scheme can be proved to be secure in the random oracle model and can meet the security properties such as convergence key security, tag consistency and anti-violence dictionary attacks. In addition, compared with the existing schemes, the experimental results show that the computational overhead of our scheme is relatively small in terms of file upload and file deduplication.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49