【摘 要】
:
More and more clients would like to store their data to public cloud servers(PCSs)along with the rapid development of cloud computing.New security problems have to be solved in order to help more clie
【出 处】
:
第4届密码学与云计算安全国际会议(CCCS2016)
论文部分内容阅读
More and more clients would like to store their data to public cloud servers(PCSs)along with the rapid development of cloud computing.New security problems have to be solved in order to help more clients process their datain public cloud.When the client is restricted to access PCS,he will delegate its proxy to process his data and upload them.On the other hand,remote data integrity checking is also an important security problem in public cloud storage.It makes the clients check whether their outsourced data are kept intact without downloading the whole data.From the security problems,we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography:identity-based proxy-oriented data uploading and remote data integrity checking in public cloud(ID-PUIC).We give the formal definition,system model,and security model.Then,a concrete ID-PUIC protocol is designed using the bilinear pairings.The proposed ID-PUIC protocol is provably secure based on the hardness of computational Diffie–Hellman problem.Our ID-PUIC protocol is also efficient and flexible.Based on the original clients authorization,the proposed ID-PUIC protocol can realize private remote data integrity checking,delegated remote data integrity checking,and public remote data integrity checking.
其他文献
Recent advances in the sensors technology of remote sensing have led to an increased availability of multi-sensor data from the same area.In particular,hyperspectral(HS)images provide a detailed descr
In this talk,I will present a novel low dimensional manifold model for some image processing problem.This model is based on the observation that for many natural images,the patch manifold usually has
In real world applications many signals contain singularities,like edges in images.Recent wavelet frame based approaches were successfully applied to reconstruct scattered data from such functions whi
The alternating direction method of multipliers(ADMM)is being widely used for various convex programming models with separable structures arising in specifically many scientific computing areas.In thi
A spectrally sparse signal of order r is a mixture of r damped or undamped complex sinusoids.In this talk,we consider the problem of reconstructing spectrally sparse signals from a random subset of n
In the recent years,Symmetric Searchable Encryption(SSE)has become one of the hottest topic in cloud-computing area because of its availability and flexibility,and there are a series of SSE schemes we
With Big-data processing and analytics,organizations and enterprises have increased the collection of data from individuals,and are increasingly developing business models involving analytics to gain
Attribute Based Encryption(ABE)is a special type of public key encryption that efficiently shares sensitive data with fine-grained access control.The security of most existing ABE systems is far from
As popularity of the mobile devices,including smartphones and tablets,continue to grow,more and more personal data inevitably stored inside these devices and it has become an important issue to protec
从大量的数据中挖掘出某些规律,这是今年来热门的大数据技术追求的本质,而密码分析也一直是从事这个研究主题。本文论述如何利用密码分析中的2个著名的算法工具实现从大量的数据中挖掘出内在的规律。具体地讲,我们要把云计算全同态加密体制分析的逼近欧几里得算法(approx-GCD)用于自然现象的大数据分析,揭示出某些周期性规律,并特别应用于移动目标稀疏采样的轨迹数据的分析,揭示出这些稀疏轨迹中存在的内在控制机