Fang Li , Gang Wang , Guangjun Liu , Xiao Xue , Deyu Zhou
{"title":"服务生态系统中分布式动态数据完整性验证方案","authors":"Fang Li , Gang Wang , Guangjun Liu , Xiao Xue , Deyu Zhou","doi":"10.1016/j.cose.2025.104671","DOIUrl":null,"url":null,"abstract":"<div><div>Big data distributed storage provides solid data support for various service ecosystem services. The cloud computing platform is the key infrastructure to realize the management of big data distributed storage. To cope with increasingly complex network threats and data protection requirements, distributed storage systems often require a higher level of information-theoretic security assurance. Among them, how to realize data security audit and ensure data integrity and reliability is the core key technology that must be addressed in the field of cloud computing distributed storage. Existing cloud computing outsourced dynamic data audit schemes mainly rely on the security technology of computational complexity and still have such problems as insufficient security and poor availability, so it is difficult to directly apply or effectively extend them to distributed storage systems with requirements for information-theoretic security. In order to address this challenge, this paper proposes a lightweight algebraic remote data audit methodology, which explores an orthogonal authentication technique for the linear subspace generated from cloud-stored data vectors. This approach offers a novel application for algebraic coding in the context of distributed dynamic cloud storage auditing. Different from the existing dynamic audit mechanism, the proposed scheme does not rely on any authentication data structure, which ensures the real-time update and integrity audit of outsourced dynamic storage data. Experimental analysis demonstrates that the proposed scheme is capable of resisting forgery or replay attacks and achieving the objective of distributed information-theoretic security auditing. Compared with existing similar schemes, the proposed scheme involves lower storage overhead and less computation in the process of dynamic data updating.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104671"},"PeriodicalIF":5.4000,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrity verification scheme for distributed dynamic data in service ecosystems\",\"authors\":\"Fang Li , Gang Wang , Guangjun Liu , Xiao Xue , Deyu Zhou\",\"doi\":\"10.1016/j.cose.2025.104671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Big data distributed storage provides solid data support for various service ecosystem services. The cloud computing platform is the key infrastructure to realize the management of big data distributed storage. To cope with increasingly complex network threats and data protection requirements, distributed storage systems often require a higher level of information-theoretic security assurance. Among them, how to realize data security audit and ensure data integrity and reliability is the core key technology that must be addressed in the field of cloud computing distributed storage. Existing cloud computing outsourced dynamic data audit schemes mainly rely on the security technology of computational complexity and still have such problems as insufficient security and poor availability, so it is difficult to directly apply or effectively extend them to distributed storage systems with requirements for information-theoretic security. In order to address this challenge, this paper proposes a lightweight algebraic remote data audit methodology, which explores an orthogonal authentication technique for the linear subspace generated from cloud-stored data vectors. This approach offers a novel application for algebraic coding in the context of distributed dynamic cloud storage auditing. Different from the existing dynamic audit mechanism, the proposed scheme does not rely on any authentication data structure, which ensures the real-time update and integrity audit of outsourced dynamic storage data. Experimental analysis demonstrates that the proposed scheme is capable of resisting forgery or replay attacks and achieving the objective of distributed information-theoretic security auditing. Compared with existing similar schemes, the proposed scheme involves lower storage overhead and less computation in the process of dynamic data updating.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"159 \",\"pages\":\"Article 104671\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2025-09-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825003608\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003608","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Integrity verification scheme for distributed dynamic data in service ecosystems
Big data distributed storage provides solid data support for various service ecosystem services. The cloud computing platform is the key infrastructure to realize the management of big data distributed storage. To cope with increasingly complex network threats and data protection requirements, distributed storage systems often require a higher level of information-theoretic security assurance. Among them, how to realize data security audit and ensure data integrity and reliability is the core key technology that must be addressed in the field of cloud computing distributed storage. Existing cloud computing outsourced dynamic data audit schemes mainly rely on the security technology of computational complexity and still have such problems as insufficient security and poor availability, so it is difficult to directly apply or effectively extend them to distributed storage systems with requirements for information-theoretic security. In order to address this challenge, this paper proposes a lightweight algebraic remote data audit methodology, which explores an orthogonal authentication technique for the linear subspace generated from cloud-stored data vectors. This approach offers a novel application for algebraic coding in the context of distributed dynamic cloud storage auditing. Different from the existing dynamic audit mechanism, the proposed scheme does not rely on any authentication data structure, which ensures the real-time update and integrity audit of outsourced dynamic storage data. Experimental analysis demonstrates that the proposed scheme is capable of resisting forgery or replay attacks and achieving the objective of distributed information-theoretic security auditing. Compared with existing similar schemes, the proposed scheme involves lower storage overhead and less computation in the process of dynamic data updating.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.