• •    下一篇

云存储服务中数据完整性审计方案综述

秦志光%吴世坤%熊虎   

  • 基金资助:
    国家自然科学基金[61003230、61370026]、四川省应用基础研究计划(2014JY0041)

A Review on Data Integrity Auditing Protocols for Data Storage in Cloud Computing

QIN Zhi-guang%WU Shi-kun%XIONG hu   

  • About author:电子科技大学计算机科学与工程学院,四川成都,611731

摘要: 云存储是由云计算提供的一个重要服务,允许数据拥有者将数据远程存储到云服务器上,同时又能够从云服务器上便捷、高效地获取这些数据,没有本地存储和维护数据的负担。然而,这种新的数据存储模式也引发了众多安全问题,一个重要的问题就是如何确保云服务器中数据拥有者数据的完整性。因此,数据拥有者以及云存储服务提供商亟需一个稳定、安全、可信的完整性审计方案,用于审核云服务器中数据的完整性和可用性。不仅如此,一个好的数据完整性审计方案还需满足如下功能需求:支持数据的动态操作,包括插入、删除、修改;支持多用户、多云服务器的批量审计;确保用户数据的隐私性;注重方案的执行效率,尽量减少数据拥有者和云服务器的计算开销与通信开销。为了促进云存储服务的广泛应用与推广,文章重点对云数据完整性审计方案的研究现状进行综述,描述云存储以及数据完整性审计的相关概念、特点,提出云计算环境下数据完整性审计模型和安全需求,阐述云存储数据完整性审计的研究现状,并重点分析部分经典方案,通过方案对比,指出当前方案存在的优点及缺陷。同时,文章还指出了本领域未来的研究方向。

Abstract: Cloud storage is an important service provided by cloud computing, which allows data owners to move data from their local computing systems to the cloud. At the same time, owners also can access the data from the cloud server conveniently and efficiently, without the data burden of local storage and maintenance. However, this new paradigm of data hosting service also introduces new security challenges. An important problem is that how to ensure the remote data integrity in the cloud storage. So, owners and cloud servers require an independent, stable and secure auditing service to check the data integrity in the cloud. In the same time, a good auditing scheme is also required to meet the following requirements: it should support the data dynamic operation including insert, delete and modify; it should support batch auditing of multi-user and multi-server in the cloud; it also should ensure the privacy of owner's data and pay attention on efficiency about reducing the computational cost and the communication cost between data owners and cloud server. In order to promoting the storage service widely used and popularized, the focus of this paper is to review the research on cloud data integrity audit protocols, describe the related concepts and features of data integrity verification, and propose the audit model and security requirements of data integrity verification and state the present research on data integrity audit protocolsin the cloud storage. By the schemes comparison, each protocol's advantages and disadvantages are pointed out. Then this paper introduces some classical schemes and also points out the future research orientation in the field.