郭成

个人信息Personal Information

教授

博士生导师

硕士生导师

主要任职:软件学院、大连理工大学-立命馆大学国际信息与软件学院副院长

性别:男

毕业院校:大连理工大学

学位:博士

所在单位:软件学院、国际信息与软件学院

学科:软件工程. 计算机应用技术

联系方式:guocheng@dlut.edu.cn

电子邮箱:guocheng@dlut.edu.cn

扫描关注

论文成果

当前位置: 中文主页 >> 科学研究 >> 论文成果

An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

点击次数:

论文类型:期刊论文

第一作者:Feng, Bin

通讯作者:Qiu, T (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China.; Qiu, T (reprint author), Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China.

合写作者:Ma, Xinzhu,Guo, Cheng,Shi, Hui,Fu, Zhangjie,Qiu, Tie

发表时间:2016-01-01

发表刊物:IEEE ACCESS

收录刊物:SCIE、EI、Scopus

卷号:4

页面范围:7899-7911

ISSN号:2169-3536

关键字:Cloud computing; storage security; provable data possession; bidirectional authentication

摘要:In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.