دانلود رایگان مقاله یک طرح امن تأیید صحت اطلاعات برای فضای ذخیره سازی ابر – سال 2019
مشخصات مقاله:
عنوان فارسی مقاله:
یک طرح امن تأیید صحت اطلاعات برای فضای ذخیره سازی ابر
عنوان انگلیسی مقاله:
One secure data integrity verification scheme for cloud storage
کلمات کلیدی مقاله:
محيط اجرای امن، فضای ذخيره سازي ابر، تأیید صحت، امضاي جمعي مبتني بر هويت، طرح آستانه Shamir
مناسب برای رشته های دانشگاهی زیر:
مهندسی کامپیوتر – مهندسی فناوری اطلاعات
مناسب برای گرایش های دانشگاهی زیر:
رایانش ابری – امنیت اطلاعات – معماری سیستم های کامپیوتری – اینترنت و شبکه های گسترده
وضعیت مقاله انگلیسی و ترجمه:
مقاله انگلیسی را میتوانید به صورت رایگان با فرمت PDF با کلیک بر روی دکمه آبی، دانلود نمایید. برای ثبت سفارش ترجمه نیز روی دکلمه قرمز رنگ کلیک نمایید. سفارش ترجمه نیازمند زمان بوده و ترجمه این مقاله آماده نمیباشد و پس از اتمام ترجمه، فایل ورد تایپ شده قابل دانلود خواهد بود.
فهرست مطالب:
Outline
Abstract
Keywords
۱٫ Introduction
۲٫ Problem formulation
۳٫ Model statements
۴٫ Security analysis
۵٫ Performance evaluation
۶٫ Related works
۷٫ Conclusions
Acknowledgments
References
قسمتی از مقاله انگلیسی:
Abstract
Cloud computing is a novel kind of information technology that users can enjoy sundry cloud services from the shared configurable computing resources. Compared with traditional local storage, cloud storage is a more economical choice because the remote data center can replace users for data management and maintenance, which can save time and money on the series of work. However, delivering data to an unknown Cloud Service Provider (CSP) makes the integrity of data become a potential vulnerability. To solve this problem, we propose a secure identity based aggregate signatures (SIBAS) as the data integrity checking scheme which resorts Trusted Execution Environment (TEE) as the auditor to check the outsourced data in the local side. SIBAS can not only check the integrity of outsourced data, but also achieve the secure key management in TEE through Shamir’s threshold scheme. To prove the security, security analysis in the random oracle model under the computational Diffie–Hellman assumption shows that SIBAS can resist attacks from the adversary that chooses its messages and target identities, experimental results also show that our solution is viable and efficient in practice.
1 Introduction
Cloud computing was treated as a new network information technology architecture to meet the increasing need of computing owing to its own unprecedented characteristics: broad network access, on-demand self-service, resource pooling that location independence, the rapid elasticity of the resource and high-quality of measured services [1]. Different from the traditional technology, cloud computing allows individuals and IT enterprises to outsource the data to the cloud, which provides users with more flexible access services. Cloud computing is widely used in various networks, such as wireless sensor network[2,3]. The wireless sensors can be treated as the cloud nodes, the collected signals of which are transmitted to the cloud for secure storage.