期刊文献+

外包数据完整性审计综述 被引量:2

A Survey on Integrity Auditing of Outsourcing Data
下载PDF
导出
摘要 数据外包云存储是当前主流的海量数据存储方式,这种模式下用户失去对其数据的绝对控制权,恶意租户或云服务内部人员可能会篡改或破坏云端数据,如何确保非可信云存储环境下外包数据的完整性是制约云计算发展的重要安全问题。文章对现有的数据完整性审计工作进行综述,基于对外包数据完整性审计问题的统一抽象给出审计模型分类,结合支撑数据动态操作、计算和通信开销等审计目标,从审计中用户关键数据是否共享的视角分类,对当前典型方案进行了对比分析和优缺点讨论,最后总结了外包数据完整性审计的未来发展方向。 Data outsourcing cloud storage is the current mainstream mass data storage method.However,in this mode,data owners lose absolute control over data,and cloud data may be tampered with or destroyed by malicious tenants or internal personnel of cloud service providers.How to ensure the integrity of outsourced data stored on untrusted clouds is an important problem that restricts the development of cloud storage.This paper summarizes the existing data integrity audit work,gives the classification of audit models based on the unified abstraction of outsourcing data integrity audit issues,and compares and analyzes the current typical schemes and discusses their advantages and disadvantages from the perspective of whether users’ key data are shared in the audit in combination with the audit objectives such as supporting data dynamic operation,calculation and communication overhead.Finally,it summarizes the future development direction on integrity auditing of outsourcing data.
作者 林莉 檀文婷 储振兴 Lin Li;Tan Wenting;Chu Zhenxing(College of Computer Science,Faculty of Information Technology,Beijing University of Technology,Beijing 100124;Beijing Key Laboratory of Trusted Computing,Beijing100124)
出处 《网络空间安全》 2020年第11期61-69,共9页 Cyberspace Security
基金 国家自然科学基金(项目编号:61502017) 北京市教委科技计划一般项目(项目编号:KM201710005024)
关键词 完整性审计 外包数据 云计算 云存储 integrity audit outsourcing data cloud computing cloud storage
  • 相关文献

参考文献9

二级参考文献113

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2Mell P,Grance T. The NIST definition of cloud computing[J].National Institute of Standards and Technology,2009,(06):50.
  • 3Armbrust M,Fox A,Griffith R. A view of cloud computing[J].Communications of the ACM,2010,(04):50-58.
  • 4Velte T,Velte A,Elsenpeter R. Cloud computing,a practical approach[M].McGraw-Hil,Inc,2009.
  • 5Oualha N,Roudier Y. Reputation and audits for self-organizing storage[A].ACM,2008.2.
  • 6Oualha N,Leneutre J,Roudier Y. Verifying remote data integrity in peer-to-peer data storage:A comprehensive survey of protocols[J].Peer-to-Peer Networking and Applications,2012,(03):231-243.
  • 7Yang K,Jia X. An efficient and secure dynamic auditing protocol for data storage in cloud computing[J].Paral el and Distributed Systems IEEE Transactions on,2013,(09):1717-1726.
  • 8Wang C,Ren K,Lou W. Toward publicly auditable secure cloud data storage services[J].Network IEEE,2010,(04):19-24.
  • 9Yang K,Jia X. Data storage auditing service in cloud computing:chal enges,methods and opportunities[J].World Wide Web,2012,(04):409-428.
  • 10Deswarte Y,Quisquater J J,Sa?dane A. Remote integrity checking[A].Springer US,2004.1-11.

共引文献113

同被引文献16

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部