design and implement of integrity checking schema under cloud storage model | |
Fu Yan-Yan ; Zhang Min ; Feng Deng-Guo | |
刊名 | Tongxin Xuebao/Journal on Communications
![]() |
2011 | |
卷号 | 32期号:9 A页码:8-15 |
关键词 | Communication Technology |
ISSN号 | 1000-436X |
中文摘要 | In the cloud storage model, user need to confirm the file status while it's kept in the untrusted remote storage server. Then user could decide to restore the data or use the data for other purpose. By pre-random sampling from a file to form samples and sign them, provide users with a credible certification credentials. When user initiates a verification, the storage server re-generate a new signature in accordance with the same rules. By comparing the signatures, user can verify whether the file is complete. Analysis showed that, with this random sampling method, user can find file corruption with quite high probability. though a single verification may be not quite provable, user can send multiple challenge to get better credibility. Also, time required for verification has nothing to do with file size , but the credibility of the verification. Experimental results show that this schema work better under cloud storage model than other schema based on signatures and has a very high credibility. |
英文摘要 | In the cloud storage model, user need to confirm the file status while it's kept in the untrusted remote storage server. Then user could decide to restore the data or use the data for other purpose. By pre-random sampling from a file to form samples and sign them, provide users with a credible certification credentials. When user initiates a verification, the storage server re-generate a new signature in accordance with the same rules. By comparing the signatures, user can verify whether the file is complete. Analysis showed that, with this random sampling method, user can find file corruption with quite high probability. though a single verification may be not quite provable, user can send multiple challenge to get better credibility. Also, time required for verification has nothing to do with file size , but the credibility of the verification. Experimental results show that this schema work better under cloud storage model than other schema based on signatures and has a very high credibility. |
收录类别 | EI |
语种 | 中文 |
公开日期 | 2013-10-08 |
内容类型 | 期刊论文 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16059] ![]() |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Fu Yan-Yan,Zhang Min,Feng Deng-Guo. design and implement of integrity checking schema under cloud storage model[J]. Tongxin Xuebao/Journal on Communications,2011,32(9 A):8-15. |
APA | Fu Yan-Yan,Zhang Min,&Feng Deng-Guo.(2011).design and implement of integrity checking schema under cloud storage model.Tongxin Xuebao/Journal on Communications,32(9 A),8-15. |
MLA | Fu Yan-Yan,et al."design and implement of integrity checking schema under cloud storage model".Tongxin Xuebao/Journal on Communications 32.9 A(2011):8-15. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论