{"title":"基于数据代理的云存储数据动态完整性验证","authors":"Wei Zhao, Xiaoming Jiang, Jingchun Wang","doi":"10.1145/3421766.3421814","DOIUrl":null,"url":null,"abstract":"To solve the problems of frequent changes of cloud storage data blocks and high audit overhead, a data agent-based dynamic data integrity verification scheme is proposed, which supports public verification and meets dynamic operation requirements. Fine-grained data-based signature methods have significant advantages in significantly reducing signature-related costs. Besides, users can set the number of sub-blocks according to their own needs in the application process, and the scalability also reaches a high level. Under the lattice-based cryptosystem, this scheme is much more efficient than the traditional one because it mainly uses linear computation. The security of this scheme is mainly related to the decimal integer solution on the lattice. High security can affect the resistance against quantum attack and has high application value.","PeriodicalId":360184,"journal":{"name":"Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture","volume":"303 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic Integrity Verification of Cloud Storage Data Based on Data Proxy\",\"authors\":\"Wei Zhao, Xiaoming Jiang, Jingchun Wang\",\"doi\":\"10.1145/3421766.3421814\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To solve the problems of frequent changes of cloud storage data blocks and high audit overhead, a data agent-based dynamic data integrity verification scheme is proposed, which supports public verification and meets dynamic operation requirements. Fine-grained data-based signature methods have significant advantages in significantly reducing signature-related costs. Besides, users can set the number of sub-blocks according to their own needs in the application process, and the scalability also reaches a high level. Under the lattice-based cryptosystem, this scheme is much more efficient than the traditional one because it mainly uses linear computation. The security of this scheme is mainly related to the decimal integer solution on the lattice. High security can affect the resistance against quantum attack and has high application value.\",\"PeriodicalId\":360184,\"journal\":{\"name\":\"Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture\",\"volume\":\"303 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3421766.3421814\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Conference on Artificial Intelligence and Advanced Manufacture","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3421766.3421814","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Integrity Verification of Cloud Storage Data Based on Data Proxy
To solve the problems of frequent changes of cloud storage data blocks and high audit overhead, a data agent-based dynamic data integrity verification scheme is proposed, which supports public verification and meets dynamic operation requirements. Fine-grained data-based signature methods have significant advantages in significantly reducing signature-related costs. Besides, users can set the number of sub-blocks according to their own needs in the application process, and the scalability also reaches a high level. Under the lattice-based cryptosystem, this scheme is much more efficient than the traditional one because it mainly uses linear computation. The security of this scheme is mainly related to the decimal integer solution on the lattice. High security can affect the resistance against quantum attack and has high application value.