Public Proof of Cloud Storage from Lattice Assumption

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:zhao3785
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Cloud storage can provide flexible and scalable data storage services to users. However, once data is uploaded to the cloud without a copy in local computers,the user loses control of the data physically. So, it is necessary to study a method to ensure users’ data integrity.Avoiding retrieving enormous storage data or checking the data by users, a proof of storage protocol with public auditing was proposed based on the lattice cryptography. The user computed the signatures of the blocks, and outsourced them to cloud servers. Cloud service providers combined the blocks. Third party auditor verified all blocks’ integrity only through the combined message and signature. Based on the Small integer solution assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the Learning with error assumption, the presented protocol is secure against the curiosity attack from third party auditor. The protocol is quite efficient, requiring just a few matrix-vector multiplications and samplings from discrete Gaussians. However, once data is uploaded to the cloud without a copy in local computers, the user loses control of the data physically. So, it is necessary to study a method to ensure users ’data integrity.Avoiding retrieving enormous storage data or checking the data by users, a proof of storage protocol with public auditing was proposed based on the lattice cryptography. The user computed the signatures of the blocks, and outsourced them to cloud servers. Cloud service providers combined the blocks. Third party auditor verified all blocks’ integrity only through the combined message and signature. Based on the Small integer solution assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the Learning with error assumption, the presented protocol is secure against the curiosity attack from third party auditor. The protocol is quite efficient, requi ring just a few matrix-vector multiplications and samplings from discrete Gaussians.
其他文献
美术对一个人的情操、气质、品格等都会产生重大影响,作为美术特长生,其艺术修养是其个人素质的重要表现,但是当前,美术特长生的艺术修养并不是受到大家的欢迎,因此本文就针
素有“中国佛教造像艺术博物馆”美誉的五台山,不仅保存有自北魏以来的佛菩萨等庄严的汉传佛教造像,还有造型奇特的藏传佛教欢喜佛造像。相较于佛菩萨而言,世俗对于欢喜佛造
最近,北京市古代钱币展览馆举办了“戎刀燕币——尖首刀币起源的故事”专题展览,以通俗化、科普化的表现形式将本属于学术领域的一项考古新发现与研究成果,用讲故事的方式,简
衡水地区是两汉时期封国所在地,汉墓资源丰富,考古发掘东汉时期墓葬较多,以砖室墓为主,分为单室墓、双室墓、三室墓和多室墓,墓葬随葬品也以实用陶器最多。并且不论墓葬形制
三峡文物保护是为配合三峡水利枢纽工程而进行的文物保护工程,经过20年的保护历程,千余处文物得到了有效保护,这是中华人民共和国成立以来我国规模最大的文物保护工程。三峡
无创伤通气 (NIV)就是对有自主呼吸的病人不通过气管插管或气管切开的方式提供通气支持。这项技术最初采用是负压通气 (铁肺 )。但随着正压通气的出现 ,其应用越来越少。自从持
哈尔滨市正运用“新法”技术构筑我国第一个高保温、高节能的居民示范小区。该小区将投资1.3亿元,占地4万平方米,预计2年后建成。专利发明人杨绍林工程师去年在王岗大街二号
风险无时不有,无处不在,社会经济和技术的发展从正方面为风险管理理论和实务提供条件,而人类社会进程当中出现的一些负面影响则从反面为风险管理理论与实务发展提供素材并加
公安边防机动部队组建于上世纪80年代初,目前,已有24个集体和8名官兵被授予荣誉称号,87个集体和2328名官兵立功受奖。近5年来,全国公安边防部队在中央级媒体刊发各类新闻稿件
Women’s Rights,Interests and Lawful Protection西藏妇女的平等权利及其法律保障Tibetan women have equal legal status with men. Since 1965, more than 10 laws and