无可信第三方的加密重复数据安全删除方法
重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源...
Saved in:
| Published in | Journal of Cryptologic Research Vol. 5; no. 3; p. 286 |
|---|---|
| Main Authors | , , , , , , , , , |
| Format | Journal Article |
| Language | Chinese |
| Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
22.06.2018
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2097-4116 |
| DOI | 10.13868/j.cnki.jcr.000239 |
Cover
| Abstract | 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源自相同明文数据. 采用同态加密算法设计加密密钥传递算法, 初识上传者能够通过云服务器将加密密钥安全传递至后继上传者. 持有相同数据的用户能够获取相同加密密钥, 使云服务器能够实现加密数据重复删除. 安全性分析与性能评估体现本文方案拥有较高的安全性与执行效率. |
|---|---|
| AbstractList | 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相同则证明数据相同, 这使得明文数据重复删除较为简单. 然而多数用户为保护数据隐私, 通常选择使用私有密钥对数据加密, 然后外包至云服务器. 由于用户密钥多样化, 导致相同明文被加密为不同密文, 云服务器无法执行重复数据删除. 现存解决方案多数依赖于第三方服务器, 导致方案的安全性与执行效率较低. 提出一种无需可信第三方的重复数据删除方案. 使用口令认证密钥交换协议与双线性映射构建加密数据冗余性识别算法, 安全验证不同加密数据是否源自相同明文数据. 采用同态加密算法设计加密密钥传递算法, 初识上传者能够通过云服务器将加密密钥安全传递至后继上传者. 持有相同数据的用户能够获取相同加密密钥, 使云服务器能够实现加密数据重复删除. 安全性分析与性能评估体现本文方案拥有较高的安全性与执行效率. |
| Author | 张曙光 Hong-Yan, LIU He-Qun, XIAN 侯瑞涛 ZHANG, Shu-Guang Rui-Tao, HOU 刘红燕 咸鹤群 王利明 Li-Ming, WANG |
| Author_xml | – sequence: 1 givenname: Shu-Guang surname: ZHANG fullname: ZHANG, Shu-Guang – sequence: 2 givenname: XIAN surname: He-Qun fullname: He-Qun, XIAN – sequence: 3 givenname: WANG surname: Li-Ming fullname: Li-Ming, WANG – sequence: 4 givenname: LIU surname: Hong-Yan fullname: Hong-Yan, LIU – sequence: 5 givenname: HOU surname: Rui-Tao fullname: Rui-Tao, HOU – sequence: 6 fullname: 张曙光 – sequence: 7 fullname: 咸鹤群 – sequence: 8 fullname: 王利明 – sequence: 9 fullname: 刘红燕 – sequence: 10 fullname: 侯瑞涛 |
| BookMark | eNotjT1Lw0AYgG-oYK39A67Oiffe5S7vjVL8goKLziWXXqBRkprYf-BXheDUik4ROjiUVnDRyT_TS-m_sKDTszw8zxapJWliCNkB6gJHiXuxGyYXPTcOM5dSyriqkTqjync8ALlJmnne01QIyZF5UCeqei7t03zx87acThdfw2r8vXy9sY-lnd-t7gs7KarRR1XM7Gxob9_tQ7l6mayd6nO0TTai4DI3zX82yPnhwVnr2GmfHp209ttOHxhKh4OQKE2kOA0ZM9jtajBoQITKpxo0og6VMQwiwUM0CpQfREabgEbSB6p5g-z-dftZejUw-XUnTgdZsl52GCoBvofI-S_HzF6e |
| ContentType | Journal Article |
| Copyright | 2018. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2018. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | JQ2 |
| DOI | 10.13868/j.cnki.jcr.000239 |
| DatabaseName | ProQuest Computer Science Collection |
| DatabaseTitle | ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| GroupedDBID | -SI -S~ ALMA_UNASSIGNED_HOLDINGS CAJEI JQ2 PB1 PB9 Q-- |
| ID | FETCH-LOGICAL-p1286-315686ef930c22e8ddb1e8e15c970b1b88bc9ee21f53c8e9197afebea0f6710b3 |
| ISSN | 2097-4116 |
| IngestDate | Mon Jun 30 13:49:04 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 3 |
| Language | Chinese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p1286-315686ef930c22e8ddb1e8e15c970b1b88bc9ee21f53c8e9197afebea0f6710b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2895174883 |
| PQPubID | 6503834 |
| ParticipantIDs | proquest_journals_2895174883 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-06-22 |
| PublicationDateYYYYMMDD | 2018-06-22 |
| PublicationDate_xml | – month: 06 year: 2018 text: 2018-06-22 day: 22 |
| PublicationDecade | 2010 |
| PublicationPlace | Beijing |
| PublicationPlace_xml | – name: Beijing |
| PublicationTitle | Journal of Cryptologic Research |
| PublicationYear | 2018 |
| Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| SSID | ssib055638241 ssib058688234 |
| Score | 2.171123 |
| Snippet | 重复数据删除已广泛应用在公共云服务中, 该技术指相同的数据副本只在云服务器存储一次, 若有相同副本出现, 则云服务器为上传者创建访问该数据副本的链接. 数据的哈希值相... |
| SourceID | proquest |
| SourceType | Aggregation Database |
| StartPage | 286 |
| SubjectTerms | Algorithms Cloud computing Cryptography Cybersecurity Data encryption Encryption Performance evaluation Privacy Redundancy Trusted third parties |
| Title | 无可信第三方的加密重复数据安全删除方法 |
| URI | https://www.proquest.com/docview/2895174883 |
| Volume | 5 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central issn: 2097-4116 databaseCode: BENPR dateStart: 20140101 customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.proquest.com/central omitProxy: true ssIdentifier: ssib055638241 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LbtNAcNWmQuKCQIB4FNQDy83Bz_XM0QmOUtSGVyLCKYodmxaktJTkQM-8ilRxKghOQeqBQ9UicYETP1On6l8wu3YeUiJeUrSazHrWu5n1zGQ9D8auua3QgEhEGtmioNmxHmiBMEGzAgxcG2NID9yWK6Jcs2_VnfrM7Ikxr6VuJ8iHm1PjSv6Hq4Qjvsoo2X_g7HBQQhBM_KWWOEztX_GY-4Kjyz2d-w6HEvdK3Ld5gQCD-4Qvyo_EAAdUFwteQNmFHgdbUXkZOdGC4D5ycDncVBhbAUTl8IIuAfrq-arLVwMSOcGgAFDjIEeUhKN7UWvxtMLlFCO4uPF8vZPK36ET4PAsu-ylAVX3V7oabeVMx6qDW-1uV4nL-qI3fJe0tKotZxVaHniVYc2w8lr7kfYwC7FYrI0fcxgg3bHM0Z9iWU08kqlaRptW-WFOm2b67uHPK1FS1tTR1WwjDfgcqARnbOdb4-I9Tds9oXYsEKD0Tth-spp_HG7kVSIhHCnZgWNB5XajVFtaalT9evX6-lNNlj-TbgJZLZhZNmeSetJzbK7gV-7cG4hGmcYNzJHl6tANwVQ-E8MFZCFhci43JmYyYWoo-6l6mp3KfqkFL93FZ9jM5spZhv0PveTdweHPz0d7e4fft_rvfxx9epG87SUHr45fbye72_2dr_3t_WR_K3n5JXnTO_64S9f0v-2cY7WSXy2WtayYh7ZOJpAgXe8IEFGMlh6aZgStVmBEEBlOiK4eGAFAEGIUmUbsWCFEaKDbjEnCNPVYkBUcWOdZrr3Wji6wBT1wEJrCcdFs2dSLcZOMfgHYQmzFoXWRzQ_W2sie1mcNE1AmZQewLv2--zI7Odp_8yzX2ehGV8jw7ARXM6b8AkjGgXw |
| linkProvider | ProQuest |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E6%97%A0%E5%8F%AF%E4%BF%A1%E7%AC%AC%E4%B8%89%E6%96%B9%E7%9A%84%E5%8A%A0%E5%AF%86%E9%87%8D%E5%A4%8D%E6%95%B0%E6%8D%AE%E5%AE%89%E5%85%A8%E5%88%A0%E9%99%A4%E6%96%B9%E6%B3%95&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=ZHANG%2C+Shu-Guang&rft.au=He-Qun%2C+XIAN&rft.au=Li-Ming%2C+WANG&rft.au=Hong-Yan%2C+LIU&rft.date=2018-06-22&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=5&rft.issue=3&rft.spage=286&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000239&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |