完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Shen, Shiuan-Tzuo | en_US |
dc.contributor.author | Lin, Hsiao-Ying | en_US |
dc.contributor.author | Tzeng, Wen-Guey | en_US |
dc.date.accessioned | 2015-12-02T02:59:32Z | - |
dc.date.available | 2015-12-02T02:59:32Z | - |
dc.date.issued | 2015-09-01 | en_US |
dc.identifier.issn | 0018-9529 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TR.2015.2423192 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/128308 | - |
dc.description.abstract | In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confidentiality, the user can first encrypt files and then store the encrypted files in a cloud storage. For data robustness, there are two concerns: service failure, and service corruption. We are concerned about data robustness in cloud storage services. Lin and Tzeng proposed a secure erasure code-based storage system with multiple key servers recently. Their system supports a repair mechanism, where a new storage server can compute a new ciphertext from the ciphertexts obtained from the remaining storage servers. Their system considers data confidentiality in the cloud, and data robustness against storage server failure. In this paper, we propose an integrity check scheme for their system to enhance data robustness against storage server corruption, which returns tampered ciphertexts. With our integrity check scheme, their storage system can deal with not only the problem of storage server failure, but also the problem of storage server corruption. The challenging part of our work is to have homomorphic integrity tags. New integrity tags can be computed from old integrity tags by storage servers without involvement of the user\'s secret key or backup servers. We prove the security of our integrity check scheme formally, and establish the parameters for achieving an overwhelming probability of a successful data retrieval. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Data confidentiality | en_US |
dc.subject | data robustness | en_US |
dc.subject | homomorphism | en_US |
dc.subject | integrity check | en_US |
dc.subject | secure decentralized erasure code | en_US |
dc.title | An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TR.2015.2423192 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON RELIABILITY | en_US |
dc.citation.volume | 64 | en_US |
dc.citation.spage | 840 | en_US |
dc.citation.epage | 851 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000360794600002 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 期刊論文 |