[1]王强[],宗平[]. 云存储中基于可信第三方的安全可问责方案[J].计算机技术与发展,2017,27(10):111-116.
 WANG Qiang[],ZONG Ping[].A Data Security Accountability Scheme with Trusted Third Party in Cloud Storage[J].,2017,27(10):111-116.
点击复制

 云存储中基于可信第三方的安全可问责方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年10期
页码:
111-116
栏目:
安全与防范
出版日期:
2017-10-10

文章信息/Info

Title:
A Data Security Accountability Scheme with Trusted Third Party in Cloud Storage
文章编号:
1673-629X(2017)10-0111-06
作者:
 王强[1]宗平[2]
1. 南京邮电大学 计算机学院;2.南京邮电大学 海外教育学院
Author(s):
 WANG Qiang[1]ZONG Ping[2]
关键词:
 云存储可信第三方审计问责数据安全
Keywords:
 cloud storagetrusted third partyauditaccountabilitydata security
分类号:
TP301
文献标志码:
A
摘要:
 随着云存储的普及和发展,云端数据的安全问题越来越受到人们的关注.针对当存储在云端服务器中的数据文件遭到非法修改或意外损坏时,云存储用户与云端均无法提供使双方信服的凭据进行责任划分的问题,提出了一种基于可信第三方的数据安全可问责方案.该方案以可信第三方为审计的核心与桥梁,在用户与云端任何一方对数据状态持有异议时进行责任追溯.可信第三方针对每次用户数据操作都通过在线状态判断并经相应文件权限认证,只有通过可信第三方在线状态与文件权限审核的用户数据操作才能被系统所认可,并将操作记录保存在双方都无法抵赖的凭据中.实现了利用可信第三方代替用户执行数据审计与问责,可靠并高效地解决了用户对数据状态持有异议但无法追溯的问题.
Abstract:
 With the popularity and development of cloud storage,the security of the data in the cloud has been paid more and more atten-tion . In view of the problem that the user and the cloud service provider cannot offer convincing credentials to duty partition when the data stored in the cloud has been unlawful modification or accidental damage,a data security accountability scheme based on trusted third party is put forward. It,which takes the trusted third party as the core and bond,traces the responsibility when any party has objection. For every user data operations,trusted third party is through the online status judgment and authenticated by the corresponding file permissions. The user data operations only by the trusted third party online status and user data file permissions audit can be accepted by the system and their records are stored in the credentials which the both couldn’ t deny. It uses the trusted third party instead of users to audit and ac-count,and solves the problem reliably and efficiently that the user disagree the data state but cannot trace back.

相似文献/References:

[1]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(10):81.
[2]王永洲[],茅苏[].HDFS中的一种数据放置策略[J].计算机技术与发展,2013,(05):90.
 WANG Yong-zhou,MAO Su.A Blocks Placement Strategy in HDFS[J].,2013,(10):90.
[3]卞艺杰,马玲玲.云环境下移动视频监控系统安全性研究[J].计算机技术与发展,2013,(09):119.
 BIAN Yi-jie,MA Ling-ling.Research on Security of Mobile Video Surveillance System under Cloud Environment[J].,2013,(10):119.
[4]李东阳,刘鹏,田浪军.基于SSD的云存储主服务器元数据管理研究[J].计算机技术与发展,2013,(10):68.
 LI Dong-yang,LIU Peng,TIAN Lang-jun.Research on Master Server Metadata Management in Cloud Storage System Based on SSD[J].,2013,(10):68.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(10):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(10):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(10):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(10):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(10):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(10):29.
[11]付雄[],徐松[],周代明[]. 云计算环境下基于信任的访问控制模型研究[J].计算机技术与发展,2015,25(09):139.
 FU Xiong[],XU Song[],ZHOU Dai-ming[]. Research on Trust-based Access Control Model in Cloud Computing Environment[J].,2015,25(10):139.
[12]王凤领. 基于Hadoop高校教育资源云存储平台构建研究[J].计算机技术与发展,2016,26(03):176.
 WANG Feng-ling. Study on Construction of Cloud Storage Platform for College Education Resources Based on Hadoop[J].,2016,26(10):176.
[13]庞立君,廖春伟,黄波,等. 基于GID的车联网数据安全方案[J].计算机技术与发展,2016,26(04):101.
 PANG Li-jun,LIAO Chun-wei,HUANG Bo,et al. Data Security Scheme of IOV Based on GID[J].,2016,26(10):101.
[14]王法,谭郁松,伍复慧,等. 基于云存储视频处理框架的研究与实现[J].计算机技术与发展,2016,26(05):1.
 WANG Fa,TAN Yu-song,WU Fu-hui,et al. Research and Implementation of Video Processing Framework Based on Cloud Storage[J].,2016,26(10):1.
[15]周晓梅[],朱金付[],段洪秀[]. LeanCloud在图片管理系统中的应用研究[J].计算机技术与发展,2016,26(07):138.
 ZHOU Xiao-mei[],ZHU Jin-fu[],DUAN Hong-xiu[]. Application Study of LeanClound in Picture Management System[J].,2016,26(10):138.
[16]郑印[],吴振宇[],沈苏彬[]. 一种基于OpenStack的云存储空间动态调整方案[J].计算机技术与发展,2016,26(10):45.
 ZHENG Yin[],WU Zhen-yu[],SHEN Su-bin[]. A Dynamic Adjustment Solution of Cloud Storage Space Based on OpenStack[J].,2016,26(10):45.
[17]金思宇[],吴振宇[],沈苏彬[].一种基于Android平台的云客户端实现方案[J].计算机技术与发展,2016,26(11):19.
 JIN Si-yu[],WU Zhen-yu[],SHEN Su-bin[]. A Cloud Client Implementation Scheme Based on Android Platform[J].,2016,26(10):19.

更新日期/Last Update: 2017-11-24