信息网络安全 ›› 2015, Vol. 15 ›› Issue (7): 7-12.doi: 10.3969/j.issn.1671-1122.2015.07.002

• • 上一篇    下一篇

无双线性对的云数据完整性验证方案

赵洋, 任化强(), 熊虎, 陈阳   

  1. 电子科技大学信息与软件工程学院,四川成都 610054
  • 收稿日期:2015-05-11 出版日期:2015-07-01 发布日期:2015-07-28
  • 作者简介:

    作者简介: 赵洋(1973-),男,四川,副教授,博士,主要研究方向:网络安全;任化强(1990-),男,安徽,硕士研究生,主要研究方向:网络安全;熊虎(1982-),男,四川,副教授,博士,主要研究方向:网络安全;陈阳(1985-),男,湖北,硕士研究生,主要研究方向:网络安全。

  • 基金资助:
    国家自然科学基金[61472064];国家高技术研究发展计划[2015AA016007]

Cloud Data Integrity Verification Scheme without Bilinear Pairing

Yang ZHAO, Hua-qiang REN(), Hu XIONG, Yang CHEN   

  1. School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China
  • Received:2015-05-11 Online:2015-07-01 Published:2015-07-28

摘要:

云存储系统给现代生活带来了便利,用户可以将数据存储在云存储系统中,在不同的地方通过因特网访问云中的数据。但由于云服务器是半可信的,为了保证云数据的完整性和正确性,用户需要对云中的数据进行完整性验证。文章提出了一种无双线性对的云数据完整性验证方案,用户将完整性验证的任务委托给第三方代理执行。第三方代理首先发送挑战信息给云服务器,云服务器根据要挑战的信息生成相应的证据发送给第三方代理进行验证。在验证之前,第三方代理需要将证据发送给重签名服务器进行重签名,然后第三方代理利用自己的私钥对重签名后的证据进行验证,验证失败时,通知用户。由于方案中无双线性对的参与,计算性能要优于现有需要复杂的双线性对运算的方案,同时因为在验证过程中需要代理重签名服务器的参与,所以文中方案能够实现用户对第三方审计者的权利进行撤销的功能。通过最后的安全分析和性能分析可以看出,文中方案是一个高效安全的云数据完整性验证方案。

关键词: 云存储, 数据完整性, 第三方代理审计, 重签名

Abstract:

Cloud storage system brings conveniences to the modern life, the user can store their data in the cloud storage system and access data through the Internet in different places. But due to the cloud server is half credible, in order to ensure the completeness and correctness of the cloud data, the user needs to provable cloud data possession. This paper proposes a cloud data integrity verification scheme without bilinear pairing. The users can entrust a third party agent to audit cloud data. Firstly, the third party agent send challenge information to the cloud server, the cloud server according the information to generate the corresponding proof sent to the third party agent for validation. Before the third party agent audit the proof, it needs to be sent to the re-signature server for re-signature, and then the third party agent using its own private key to verify the proof of re-signature. When audit fails, the third party agent notifies the user. Since the scheme proves without bilinear pairing, the computing performance is superior to the existing scheme which requires expensive bilinear pairing operation. At the same time, because in the audit process it requires the participation of re-signature server, so this scheme can realize the function which the users undo rights of the third party auditor. By security analysis and performance analysis which in the end of this article, we can be seen that this scheme is an efficient security provable data possession scheme.

Key words: cloud storage, data integrity, the third-party audit, re-signature

中图分类号: