###
计算机系统应用英文版:2020,29(2):94-100
←前一篇   |   后一篇→
本文二维码信息
码上扫一扫!
基于模糊身份的动态数据审计方案
(1.福建师范大学 数学与信息学院, 福州 350117;2.
福建师范大学 福建省网络安全与密码技术重点实验室, 福州 350007)
Fuzzy Identity-Based Dynamic Data Auditing Scheme
(1.College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China;2.
Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1404次   下载 1518
Received:July 12, 2019    Revised:August 20, 2019
中文摘要: 云存储服务的快速发展,也带来众多安全挑战.针对云存储数据的完整性,已有的基于模糊身份的审计方案仅仅支持静态数据,因此很多情况并不适用.本文提出了一种基于模糊身份的动态数据完整性审计方案,结合默克哈希树的动态数据结构,实现用户对云端数据的完全动态操作.该方案采用基于模糊身份的密码体制,与基于公钥基础设施的数据完整性审计方案相比,避免了对公钥证书颁发、管理、吊销的过程,降低了通信代价.并且该方案能够支持批量验证,提高认证效率.最后,本文从安全性和功能上对新方案进行分析,能够抵抗伪造攻击,也保护了数据隐私安全,并且在功能上较其他方案也有一定的优势.
Abstract:The rapid development of cloud storage services also brings many security challenges. The existing fuzzy identity-based data integrity auditing scheme only focuses on static data, which is obviously not suitable for many practical applications. This study proposes a fuzzy identity-based dynamic data integrity auditing scheme, which combines the dynamic data structure of Merkle hash tree to realize the complete dynamic operations of cloud data. Compared with data integrity auditing schemes based on the public key infrastructure, the scheme avoids the processes of issuing, managing, and revoking public key certificates by using fuzzy identity-based cryptosystem, and reduces the communication cost. Furthermore, the proposed scheme supports batch verification and improves authentication efficiency. Finally, the new scheme is analyzed in terms of security and function, which resists forgery attack and preserves data privacy, and has certain advantages over other schemes in terms of function.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(U1905211,61771140);福建省科技厅高校产学研项目(2017H6005);福州市科技局科技重大项目(榕科(2017)325号);企事业合作项目(DH-1307)
引用文本:
赵陈斌,许力,王峰.基于模糊身份的动态数据审计方案.计算机系统应用,2020,29(2):94-100
ZHAO Chen-Bin,XU Li,WANG Feng.Fuzzy Identity-Based Dynamic Data Auditing Scheme.COMPUTER SYSTEMS APPLICATIONS,2020,29(2):94-100