标题: | 支援分散式编码与可授权验证的资料完整性检查方法 Data Integrity Check for Decentralized Encoding and Delegated Verifier |
作者: | 沈宣佐 Shen, Shiuan-Tzuo 曾文贵 Tzeng, Wen-Guey 资讯科学与工程研究所 |
关键字: | 资料完整性检查;分散式编码;授权验证人;Data Integrity Check;Decentralized Encoding;Delegated Verifier |
公开日期: | 2015 |
摘要: | 云端储存是近几年相当受欢迎广泛被使用的网路服务。在云端储存的应用中,使用者将他的资料储存在远端的储存伺服器,使用者可以透过网际网路在任何时间任何地点不受限制地存取他的资料,也可以透过分享连结的方式和其他人共用资料,而不用花费大量的网路频宽去传送资料。云端储存服务提供使用者在资料存取上诸多便利,但是资料的安全性依然是很重要的考量,因为资料储存在云端,使用者自己没有储存备份的资料的,所以存取资料前必须去检查资料的完整性以确保资料的正确性。资料完整性检查的效率相当重要,当资料很大量的时候,使用者不会想要把全部资料取回来再做检查,这将会花费大量的网路频宽与时间。Ateniese等人提出了provable data possession方法,Juels和Kaliski提出了proof of retrievability方法,这两种完整性检查方法都不需要取回全部的资料。后续研究提出了多样的应用环境和功能性,本篇研究在以上两种方法为基础下,探讨资料完整性的应用情境与功能性议题: 我们首先考量一个以secure decentralized erasure code为基础的分散式储存系统。使用者为了达到可靠的资料储存,常常会使用到erasure code来储存资料。传统的方式是由使用者对资料进行编码后再产生完整性标签,然后才上传云端储存;在decentralized erasure code的架构下,使用者对资料产生完整性标签后就上传云端储存,资料和标签再由各台伺服器独立进行编码储存。为了支援这种分散式编码的特性,完整性标签必须具有同质性,伺服器才能够独立计算出对应的完整性标签,同时又确保原始资料的完整性不会受到破坏。本篇研究设计出一套能够支援分散式编码的资料完整性方法,并且正规地证明其安全性。 我们接下来考量到一个云端资料分享的应用情境。使用者透过云端和其他人分享他的资料,其他人在存取资料前必须先检查资料的完整性以确保资料的正确性。使用者限定只有经过授权的单位才可以存取他的资料,同样地只有经过授权的单位才可以检查资料的完整性。如果使用私密的完整性检查方法,则只有使用者本人可以检查资料完整性;如果使用公开的完整性检查方法,则所有人都可以检查资料完整性。要达到只有经过授权的单位才可以检查资料,资料完整性检查必须要提供有效的管理机制,使用者可以授权其他人去检查他的资料,也可以注销已经授权出去的能力,并且防止验证能力的泄漏。本篇研究设计出一套能够支援可授权验证的资料完整性方法,并且提供完整的安全性证明。 Cloud storage is a popular network service in recent years. In the application of cloud storage, a user stores his data in a remote data cloud. The user can access his data via the Internet anywhere and anytime. The user can also share his data with his friends without costly data migration. Cloud storage provides a user with convenience of data storing and data sharing. Nevertheless, data security is the main concern of the user. We consider the issues of data integrity because data are not stored in the local repository. Before a user accesses his data, he has to check data integrity to make sure that the data are correct. Efficiency is important to data integrity check. When the stored data are quite large, a user will not like to retrieve the whole data back because it could consume much network bandwidth. Ateniese et al. proposed the provable data possession model. Juels and Kaliski proposed the proof of retrievability model. Both the two models allow a user to check data integrity without retrieving the data back. The related works have proposed various applications. In this dissertation, we consider new application and functionality for data integrity check: First, we consider a secure decentralized erasure code-based storage system. To achieve a robust storage system, erasure code is usually used to encode data for multiple storage servers. For the regular encoding process, a user encodes his data into a codeword and generates an integrity tag for each codeword symbol. Then, the user stores each symbol-tag tuple to a storage server. For the decentralized encoding process, a user generates an integrity tag for each data block and dispatches each block-tag tuple to some storage servers. Each storage server independently receives some data blocks and encodes them into a codeword symbol. The integrity tags have to be homomorphic so that the storage server can compute the right tag for the stored symbol without the involvement of the user. We propose a novel integrity check scheme for secure decentralized erasure code and prove its security formally. Second, we consider a data sharing scenario of cloud data. A user can share his data with his friends. Before his friend accesses his data, the friend has to check data integrity to make sure that the data are correct. The user allows only his friends to access his data and only the friends to check the data. To satisfy this requirement, an integrity check scheme has to provide management on verifiers. If the user uses a private integrity check scheme, only the user can check integrity of the data. If the user uses a public integrity check scheme, everyone can check integrity of the data. We propose a novel integrity check scheme to support verifier management. A user can delegate a verifier to check his data. The user can also revoke the verifier later. The delegated verifier cannot re-delegate the verification capability to someone else. |
URI: | http://140.113.39.130/cdrfb3/record/nctu/#GT079755833 http://hdl.handle.net/11536/126395 |
显示于类别: | Thesis |