...
首页> 外文期刊>The Computer journal >Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage
【24h】

Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage

机译:改进了云存储中数据可用性的可检索性和复制证明

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly-while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.
机译:对于高水平的数据可用性和可靠性,云服务提供商的常见策略是依赖于复制,即将多个副本存储到不同的服务器上。要为云用户提供强烈保证,它们实际存储了它们所需的所有副本,提出了许多多副本完整性审计方案。但是,大多数现有解决方案都不是资源经济,因为用户需要自己创建和上传其文件的副本。提出了一个称为镜像的多副本解决方案以克服这些问题,但我们发现它很容易存储保存攻击,而不诚实的提供商可以显着节省存储成本,而诚实地存储所有副本的成本相比成功通过任何挑战。此外,我们还发现镜子很容易受到替代攻击和伪造攻击,这为云用户构成了新的安全风险。为了解决这些问题,我们提出了一些简单但有效的对策和改进的可回收性和复制方案证明,可以抵制上述攻击并保持镜像的优势,例如经济带宽和有效的验证。实验结果表明,我们的方案在实现高安全性的同时表现出与镜子相当的性能。

著录项

  • 来源
    《The Computer journal》 |2020年第8期|1216-1230|共15页
  • 作者单位

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing 100878 China;

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China;

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China;

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China;

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China;

    State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    cloud storage; data integrity; proofs of retrievability; data availability; replication;

    机译:云储存;数据的完整性;检索性证明;数据可用性;复制;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号