حسابرسی کارآمد برای داده های به اشتراک گذاشته شده در ابر با لغو امنیت کاربر و محاسبات برون سپاری Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
- نوع فایل : کتاب
- زبان : انگلیسی
- ناشر : Elsevier
- چاپ و سال / کشور: 2018
توضیحات
رشته های مرتبط کامپیوتر
گرایش های مرتبط رایانش ابری
مجله کامپیوترها و امنیت – Computers & Security
دانشگاه College of Computer – National University of Defense Technology – Changsha – China
منتشر شده در نشریه الزویر
کلمات کلیدی ذخیره سازی ابر، حسابرسی عمومی، لغو کاربر، برون سپاری، محیط متحرک
گرایش های مرتبط رایانش ابری
مجله کامپیوترها و امنیت – Computers & Security
دانشگاه College of Computer – National University of Defense Technology – Changsha – China
منتشر شده در نشریه الزویر
کلمات کلیدی ذخیره سازی ابر، حسابرسی عمومی، لغو کاربر، برون سپاری، محیط متحرک
Description
1. Introduction Cloud storage is one of the most crucial services of cloud computing, which provides users with elastic storage space. Users are allowed to modify and share their outsourced data in the cloud anywhere and anytime [1]. However, data security has become a critical problem that prevents this new paradigm of data hosting service from widespread adoptions. One of the biggest concerns of the data security is the integrity of the outsourced data in the cloud. Although the cloud storage providers commit a reliable and secure storage service to users, the integrity of outsourced can still be corrupted due to carelessness of humans or failures of hardware/software [2, 3]. Besides internal threats, external adversaries may also destroy the integrity of the outsourced data in the cloud. Therefore, public integrity auditing is needed to convince the users that the outsourced data is correctly stored in the cloud. To ensure the integrity of outsourced data in an untrustable cloud, a number of protocols have been proposed based on various techniques [4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16]. In all these protocols, the data owner computes a signature on each block of the data and outsources the data together with the corresponding signatures to the cloud, which allows not only the data owner, but also a third party auditor (TPA) to check the integrity of data in the cloud without downloading the entire outsourced data. However, most of the previous works only consider the case of personal data, which means that there is only one modifier, namely the data owner, who holds the secret key and can modify the data.