...
首页> 外文期刊>IEEE transactions on dependable and secure computing >Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
【24h】

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

机译:可靠云存储系统的基于模糊身份的数据完整性审计

获取原文
获取原文并翻译 | 示例

摘要

Data integrity, a core security issue in reliable cloud storage, has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing, the first in such an approach, to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user's identity can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol offers the property of error-tolerance, namely, it binds with private key to one identity which can be used to verify the correctness of a response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.
机译:数据完整性是可靠的云存储中的核心安全问题,已引起广泛关注。数据审核协议使验证者可以有效地检查外包数据的完整性,而无需下载数据。与数据审核协议的现有设计相关的关键研究挑战是密钥管理的复杂性。在本文中,我们将尽我们所知,通过引入基于模糊身份的审核(这种方法中的第一个)来解决云数据完整性检查中的复杂密钥管理挑战。更具体地说,我们介绍了基于模糊身份的数据审核的原语,其中用户的身份可以视为一组描述性属性。我们为这个新原语形式化系统模型和安全模型。然后,我们通过利用生物识别技术作为模糊身份,提出了基于模糊身份的审计协议的具体构建。新协议提供了容错的特性,即,当且仅当两个身份足够接近时,它才能与私钥绑定到一个身份,该身份可用于验证由另一个身份生成的响应的正确性。我们基于选择性ID安全模型中的计算Diffie-Hellman假设和离散对数假设,证明了协议的安全性。最后,我们开发了该协议的原型实现,从而证明了该建议的实用性。

著录项

  • 来源
  • 作者单位

    Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China|Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China;

    Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China|Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China;

    Univ Exeter, Coll Engn Math & Phys Sci, Exeter EX4 4QF, Devon, England;

    Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia;

    Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada;

    Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Cloud storage; data integrity; fuzzy identity; threshold secret sharing;

    机译:云存储;数据完整性;模糊身份;阈值秘密共享;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号