Identity-Based Proxy-Oriented Data Uploading and Remote Data IntegrityChecking in Public Cloud

来源 :第4届密码学与云计算安全国际会议(CCCS2016) | 被引量 : 0次 | 上传用户:morningwind2009
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  More and more clients would like to store their data to public cloud servers(PCSs)along with the rapid development of cloud computing.New security problems have to be solved in order to help more clients process their datain public cloud.When the client is restricted to access PCS,he will delegate its proxy to process his data and upload them.On the other hand,remote data integrity checking is also an important security problem in public cloud storage.It makes the clients check whether their outsourced data are kept intact without downloading the whole data.From the security problems,we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography:identity-based proxy-oriented data uploading and remote data integrity checking in public cloud(ID-PUIC).We give the formal definition,system model,and security model.Then,a concrete ID-PUIC protocol is designed using the bilinear pairings.The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie–Hellman problem.Our ID-PUIC protocol is also efficient and flexible.Based on the original clients authorization,the proposed ID-PUIC protocol can realize private remote data integrity checking,delegated remote data integrity checking,and public remote data integrity checking.
其他文献
Recent advances in the sensors technology of remote sensing have led to an increased availability of multi-sensor data from the same area.In particular,hyperspectral(HS)images provide a detailed descr
会议
In this talk,I will present a novel low dimensional manifold model for some image processing problem.This model is based on the observation that for many natural images,the patch manifold usually has
会议
In real world applications many signals contain singularities,like edges in images.Recent wavelet frame based approaches were successfully applied to reconstruct scattered data from such functions whi
会议
The alternating direction method of multipliers(ADMM)is being widely used for various convex programming models with separable structures arising in specifically many scientific computing areas.In thi
会议
A spectrally sparse signal of order r is a mixture of r damped or undamped complex sinusoids.In this talk,we consider the problem of reconstructing spectrally sparse signals from a random subset of n
会议
In the recent years,Symmetric Searchable Encryption(SSE)has become one of the hottest topic in cloud-computing area because of its availability and flexibility,and there are a series of SSE schemes we
会议
With Big-data processing and analytics,organizations and enterprises have increased the collection of data from individuals,and are increasingly developing business models involving analytics to gain
会议
Attribute Based Encryption(ABE)is a special type of public key encryption that efficiently shares sensitive data with fine-grained access control.The security of most existing ABE systems is far from
会议
As popularity of the mobile devices,including smartphones and tablets,continue to grow,more and more personal data inevitably stored inside these devices and it has become an important issue to protec
会议
从大量的数据中挖掘出某些规律,这是今年来热门的大数据技术追求的本质,而密码分析也一直是从事这个研究主题。本文论述如何利用密码分析中的2个著名的算法工具实现从大量的数据中挖掘出内在的规律。具体地讲,我们要把云计算全同态加密体制分析的逼近欧几里得算法(approx-GCD)用于自然现象的大数据分析,揭示出某些周期性规律,并特别应用于移动目标稀疏采样的轨迹数据的分析,揭示出这些稀疏轨迹中存在的内在控制机
会议