高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于区块链的细粒度云数据安全存储与删除方案

周由胜 陈律君

郑晋军, 谷学敏, 张丽艳. 最大熵方法在准连续波体制中的实现[J]. 电子与信息学报, 1998, 20(4): 458-463.
引用本文: 周由胜, 陈律君. 基于区块链的细粒度云数据安全存储与删除方案[J]. 电子与信息学报, 2021, 43(7): 1856-1863. doi: 10.11999/JEIT200399
Zheng Jinjun, Gu Xuemin, Zhang Liyan. IMPLEMENTATION OF MAXIMUM ENTROPY METHOD IN QCW[J]. Journal of Electronics & Information Technology, 1998, 20(4): 458-463.
Citation: Yousheng ZHOU, Lüjun CHEN. Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control[J]. Journal of Electronics & Information Technology, 2021, 43(7): 1856-1863. doi: 10.11999/JEIT200399

基于区块链的细粒度云数据安全存储与删除方案

doi: 10.11999/JEIT200399
基金项目: 国家自然科学基金(61702067),重庆市自然科学基金(cstc2020jcyjmsxmX0343),重庆市留学人员回国创业创新支持计划(CX2018122)
详细信息
    作者简介:

    周由胜:男,1979年生,博士,副教授,研究方向为密码学与信息安全

    陈律君:女,1995年生,硕士生,研究方向为密码学与信息安全

    通讯作者:

    陈律君 s180201047@stu.cqupt.edu.cn

  • 中图分类号: TN918

Secure Storage and Deletion Based on Blockchain for Cloud Data with Fine-grained Access Control

Funds: The National Natural Science Foundation of China (61702067), The Chongqing Natural Science Foundation (cstc2020jcyjmsxmX0343), The Venture & Innovation Support Program for Chongqing Overseas Returnees (CX2018122)
  • 摘要: 在基于云计算的存储与删除服务中,由于外包数据所有权和管理分离,现有的逻辑删除机制使云上的数据很容易暴露给未经授权的用户,甚至云服务器可能未遵循用户要求删除相应数据。为此,该文提出一种细粒度的安全云端数据存储与删除方案。基于椭圆曲线构造了基于密文策略的属性基加密以实现外包数据细粒度访问控制,应用区块链实现可公开验证的安全数据删除。该文方案具有责任可追踪性以及两方删除与可验证性等特性。理论分析与实验结果表明该文方案具有较好的安全性和较高的性能,能够满足云数据共享与安全删除的需求。
  • 图  1  系统模型

    图  2  证据链结构

    图  3  不同访问矩阵行数或密文中属性个数下的加解密时间变化

    图  4  不同访问矩阵行数或密文中属性个数下的删除与验证时间变化

    表  1  安全特性对比

    方案Yang等人[14]方案Hao等人[23]方案Xue等人[18]方案Yu等人[15]方案本文方案
    可公开验证
    云数据共享
    细粒度访问
    责任可追踪
    隐私保护
    下载: 导出CSV

    表  2  时间复杂度对比

    方案Yang等人[14]方案Hao等人[23]方案Xue等人[18]方案Yu等人[15]方案本文方案
    加密Tε+2ThTp_mul+2Tε+4Th(2+2|γ|)Texp+Tmul+Tsig+2|γ|ThTbp+3lTexp+(l+1)Tmul(5l+1)Tp_mul+(l+1)Tp_add+Tsig+(2l1)Th
    解密Tsig+Tver+TD+3ThTε+TD+3Th(Tbp+Tmul)|γ|+Tbp+2Tmul(2Tbp+1Texp+1Tmul)Ma+2Tmul(2Tp_mul+2Tp_add)Ma+Tp_add
    删除Tsig+TverTsig2Tbp+Texp+Tmul+Tsig+Tver+(log2|γ|+1)Th4Texp+Tsig+2Tver+Th3Tp_mul+Tp_add+2Tsig+Tver+(log2l+3)Th
    验证(log2m+m+12+1)ThTverTexp+(log2|γ|+1)Th(2Tbp+1Texp+1Tmul)Ma+1Texp+2Tmul+Tver+ThTp_mul+Tp_add+Tver
    下载: 导出CSV
  • [1] LI Yannan, YU Yong, MIN Geyong, et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J]. IEEE Transactions on Dependable and Secure Computing, 2017, 16(1): 72–83. doi: 10.1109/TDSC.2017.2662216
    [2] 张玉磊, 刘祥震, 郎晓丽, 等. 云存储环境下多服务器的密钥聚合可搜索加密方案[J]. 电子与信息学报, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418

    ZHANG Yulei, LIU Xiangzhen, LANG Xiaoli, et al. Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment[J]. Journal of Electronics &Information Technology, 2019, 41(3): 674–679. doi: 10.11999/JEIT180418
    [3] ZHANG Zhiwei, TAN Shichong, WANG Jianfeng, et al. An associated deletion scheme for multi-copy in cloud storage[C]. International Conference on Algorithms and Architectures for Parallel Processing. Guangzhou, China, 2018: 511-526. doi: 10.1007/978-3-030-05063-4_38.
    [4] HUANG Hui, CHEN Xiaofeng, WU Qianhong, et al. Bitcoin-based fair payments for outsourcing computations of fog devices[J]. Future Generation Computer Systems, 2018, 78: 850–858. doi: 10.1016/j.future.2016.12.016
    [5] 赵志远, 朱智强, 王建华, 等. 云存储环境下无密钥托管可撤销属性基加密方案研究[J]. 电子与信息学报, 2018, 40(1): 1–10. doi: 10.11999/JEIT170317

    ZHAO Zhiyuan, ZHU Zhiqiang, WANG Jianhua, et al. Revocable Attribute-based Encryption with Escrow-free in Cloud Storage[J]. Journal of Electronics &Information Technology, 2018, 40(1): 1–10. doi: 10.11999/JEIT170317
    [6] 张曙光, 咸鹤群, 王利明, 等. 云加密数据安全重复删除方法[J]. 软件学报, 2019, 30(12): 3815–3828. doi: 10.13328/j.cnki.jos.005610

    ZHANG Shuguang, XIAN Hequn, WANG Liming, et al. Secure Cloud Encrypted Data Deduplication Method[J]. Journal of Software, 2019, 30(12): 3815–3828. doi: 10.13328/j.cnki.jos.005610
    [7] GARFINKEL S L and SHELAT A. Remembrance of data passed: A study of disk sanitization practices[J]. IEEE Security & Privacy, 2003, 1(1): 17–27. doi: 10.1109/MSECP.2003.1176992
    [8] GUTMANN P. Secure deletion of data from magnetic and solid-state memory[C]. The Sixth USENIX Security Symposium, San Jose, USA. 1996, 14: 77-89.
    [9] PAUL M and SAXENA A. Proof of erasability for ensuring comprehensive data deletion in cloud computing[C]. International Conference on Network Security and Applications. Berlin, Germany, 2010: 340-348. doi: 10.1007/978-3-642-14478-3_35.
    [10] PERITO D and TSUDIK G. Secure code update for embedded devices via proofs of secure erasure[C]. European Symposium on Research in Computer Security. Berlin, Germany, 2010: 643-662. doi: 10.1007/978-3-642-15497-3_39.
    [11] HU Pengfei, NING Huansheng, QIU Tie, et al. Fog computing based face identification and resolution scheme in internet of things[J]. IEEE Transactions on Industrial Informatics, 2016, 13(4): 1910–1920. doi: 10.1109/TII.2016.2607178
    [12] PERLMAN R. File system design with assured delete[C]. The 3rd IEEE International, Security in Storage Workshop. San Francisco, USA, 2005. doi: 10.1109/SISW.2005.5.
    [13] 张曙光, 咸鹤群, 王利明, 等. 无可信第三方的加密重复数据安全删除方法[J]. 密码学报, 2018, 5(3): 286-296.

    ZHANG Shuguang, XIAN Hequn, WANG Liming, et al. Security deduplication method of encrypted data without ant additional server[J]. Journal of Cryptologic Research, 2018, 5(3): 286-296.
    [14] YANG Changsong, CHEN Xiaofeng, and XIANG Yang. Blockchain-based publicly verifiable data deletion scheme for cloud storage[J]. Journal of Network and Computer Applications, 2018, 103: 185–193. doi: 10.1016/j.jnca.2017.11.011
    [15] YU Yong, XUE Liang, LI Yannan, et al. Assured data deletion with fine-grained access control for fog-based industrial applications[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10): 4538–4547. doi: 10.1109/TII.2018.2841047
    [16] MO Zhen, XIAO Qingjun, ZHOU Yian, et al. On deletion of outsourced data in cloud computing[C]. 2014 IEEE 7th International Conference on Cloud Computing. Anchorage, USA, 2014: 344-351. doi: 10.1109/CLOUD.2014.54.
    [17] REARDON J, RITZDORF H, BASIN D, et al. Secure data deletion from persistent media[C]. The 2013 ACM SIGSAC conference on Computer & communications security. Berlin, Germany, 2013: 271-284. doi: 10.1007/978-3-319-28778-2_9.
    [18] XUE Liang, YU Yong, LI Yannan, et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640–650. doi: 10.1016/j.ins.2018.02.015
    [19] BEIMEL A. Secure Schemes for Secret Sharing and Key Distribution[M]. Haifa, International Journal of Pure & Applied Mathematics, 1996.
    [20] SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Germany, 2005: 457-473. doi: 10.1007/11426639_27.
    [21] 刘忆宁, 周元健, 蓝如师, 等. 基于区块链的云数据删除验证协议[J]. 计算机研究与发展, 2018, 55(10): 2199–2207. doi: 10.7544/issn1000-1239.2018.2018.20180436

    LIU Yining, ZHOU Yuanjian, LAN Rushi, et al. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199–2207. doi: 10.7544/issn1000-1239.2018.2018.20180436
    [22] RAMOKAPANE K M, RASHID A, and SUCH J M. Assured deletion in the cloud: requirements, challenges and future directions[C]. The 2016 ACM on Cloud Computing Security Workshop. New York, USA, 2016: 97-108. doi: 10.1145/2996429.2996434.
    [23] HAO Feng, CLARKE D, and ZORZO A F. Deleting secret data with public verifiability[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(6): 617–629. doi: 10.1109/TDSC.2015.2423684
  • 加载中
图(4) / 表(2)
计量
  • 文章访问数:  1747
  • HTML全文浏览量:  866
  • PDF下载量:  241
  • 被引次数: 0
出版历程
  • 收稿日期:  2020-05-22
  • 修回日期:  2020-12-06
  • 网络出版日期:  2020-12-18
  • 刊出日期:  2021-07-10

目录

    /

    返回文章
    返回