[1]王 新,秦敬源.公开云环境中身份基代理远程数据完整性证明[J].计算机技术与发展,2017,27(12):93-97.[doi:10.3969/ j. issn.1673-629X.2017.12.021]
 WANG Xin,QIN Jing-yuan.Remote Data Integrity Checking of Identity-based Proxy in Public Cloud Environment[J].Computer Technology and Development,2017,27(12):93-97.[doi:10.3969/ j. issn.1673-629X.2017.12.021]
点击复制

公开云环境中身份基代理远程数据完整性证明()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年12期
页码:
93-97
栏目:
安全与防范
出版日期:
2017-12-10

文章信息/Info

Title:
Remote Data Integrity Checking of Identity-based Proxy in Public Cloud Environment
文章编号:
1673-629X(2017)12-0093-05
作者:
王 新秦敬源
大连海洋大学 信息工程学院,辽宁 大连 116023
Author(s):
WANG XinQIN Jing-yuan
School of Information Engineering,Dalian Ocean University,Dalian 116023,China
关键词:
公开云身份基代理完整性检验
Keywords:
public cloudidentity-basedproxyintegrity checking
分类号:
TP39
DOI:
10.3969/ j. issn.1673-629X.2017.12.021
文献标志码:
A
摘要:
云计算作为一种传统计算的替代方式,发展迅速。 因为它可以提供给和商业环境一种灵活的、动态的、有弹性的架构。在公共云环境中,客户端将其数据上传到公有云服务器 PCS 中,无法控制其远程数据,因此检查远程数据的完整性是至关重要的工作。 在原始数据不需下载的情况下,确保用户能够检测其外包数据完整性。 在某些情况下,客户没有能力检查其远程数据的完整性,不得不将远程数据完整性检测任务委托给其代理。基于双线性对和计算 Diffie-ellman 问题的困难性,设计了身份基代理远程数据完整性证明协议。 在该协议中采用身份基的密码体系,减少了对公钥证书的验证,降低了用户和云服务器的储存、通信开销。 通过安全性分析和性能分析,表明该协议是可证安全的和高效的。
Abstract:
Cloud computing as an alternative to conventional computing has a rapid development because it can provide a flexible,dynamic and resilient infrastructure for both academy and business. In public cloud environment,the clients move their data to Public Cloud Server (PCS). Since remote data are uncontrollable,checking its integrity is of crucial importance. It enables the clients to check whether their outsourced data have been kept intact without downloading the original data. In some cases,the clients are failed to check the integrity of remote data so that they have to delegate their proxy for checking of remote data integrity. Based on the bilinear pairing technique
and the hardness of computational Diffie-Hellman problem,a protocol of remote data integrity checking of identity-based proxy is designed where identity-based cryptography system is used to reduce authentication of public key certificates and lower the storage and communication costs of user and public cloud server. Through analysis of security and performance,the protocol proposed is provably secure and efficient.

相似文献/References:

[1]路守克 史国川.身份基认证密钥协商协议[J].计算机技术与发展,2011,(12):172.
 LU Shou-ke,SHI Guo-chuan.An Identity-Based Authenticated Key Agreement Protocol[J].Computer Technology and Development,2011,(12):172.

更新日期/Last Update: 2018-03-06