• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

云环境中基于来源的数据完整性检查与验证

Provenance based data integrity checking and verification in cloud environments.

作者信息

Imran Muhammad, Hlavacs Helmut, Haq Inam Ul, Jan Bilal, Khan Fakhri Alam, Ahmad Awais

机构信息

Department of Computer Science, Sarhad University of Science & Information Technology, Peshawar, Pakistan.

Entertainment Computing, Faculty of Computer Science, University of Vienna, Austria.

出版信息

PLoS One. 2017 May 17;12(5):e0177576. doi: 10.1371/journal.pone.0177576. eCollection 2017.

DOI:10.1371/journal.pone.0177576
PMID:28545151
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5435237/
Abstract

Cloud computing is a recent tendency in IT that moves computing and data away from desktop and hand-held devices into large scale processing hubs and data centers respectively. It has been proposed as an effective solution for data outsourcing and on demand computing to control the rising cost of IT setups and management in enterprises. However, with Cloud platforms user's data is moved into remotely located storages such that users lose control over their data. This unique feature of the Cloud is facing many security and privacy challenges which need to be clearly understood and resolved. One of the important concerns that needs to be addressed is to provide the proof of data integrity, i.e., correctness of the user's data stored in the Cloud storage. The data in Clouds is physically not accessible to the users. Therefore, a mechanism is required where users can check if the integrity of their valuable data is maintained or compromised. For this purpose some methods are proposed like mirroring, checksumming and using third party auditors amongst others. However, these methods use extra storage space by maintaining multiple copies of data or the presence of a third party verifier is required. In this paper, we address the problem of proving data integrity in Cloud computing by proposing a scheme through which users are able to check the integrity of their data stored in Clouds. In addition, users can track the violation of data integrity if occurred. For this purpose, we utilize a relatively new concept in the Cloud computing called "Data Provenance". Our scheme is capable to reduce the need of any third party services, additional hardware support and the replication of data items on client side for integrity checking.

摘要

云计算是信息技术领域的一种新趋势,它将计算和数据分别从桌面设备和手持设备转移到大规模处理中心和数据中心。它被认为是一种有效的数据外包和按需计算解决方案,可控制企业中不断上升的信息技术设置和管理成本。然而,在云平台中,用户数据被转移到远程存储中,这使得用户失去了对其数据的控制权。云的这一独特特性面临着许多安全和隐私挑战,需要清晰地理解并加以解决。其中一个需要解决的重要问题是提供数据完整性证明,即存储在云存储中的用户数据的正确性。用户无法直接访问云中的数据。因此,需要一种机制,让用户能够检查其宝贵数据的完整性是否得到维护或遭到破坏。为此,人们提出了一些方法,如镜像、校验和以及使用第三方审计等。然而,这些方法通过维护数据的多个副本使用了额外的存储空间,或者需要第三方验证者的存在。在本文中,我们通过提出一种方案来解决云计算中的数据完整性证明问题,通过该方案用户能够检查存储在云中的数据的完整性。此外,如果发生数据完整性违规,用户可以进行追踪。为此,我们利用了云计算中一个相对较新的概念,即“数据溯源”。我们的方案能够减少对任何第三方服务的需求、额外的硬件支持以及在客户端复制数据项以进行完整性检查的需求。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/66405d5058c6/pone.0177576.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/e2fc832ea675/pone.0177576.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/4fa6bbfeeae0/pone.0177576.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/045ef492430d/pone.0177576.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/c9e0fb76fb20/pone.0177576.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/1bb43e522d5c/pone.0177576.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/df0feea49d45/pone.0177576.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/f1a4f3db353d/pone.0177576.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/66405d5058c6/pone.0177576.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/e2fc832ea675/pone.0177576.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/4fa6bbfeeae0/pone.0177576.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/045ef492430d/pone.0177576.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/c9e0fb76fb20/pone.0177576.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/1bb43e522d5c/pone.0177576.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/df0feea49d45/pone.0177576.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/f1a4f3db353d/pone.0177576.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9581/5435237/66405d5058c6/pone.0177576.g008.jpg

相似文献

1
Provenance based data integrity checking and verification in cloud environments.云环境中基于来源的数据完整性检查与验证
PLoS One. 2017 May 17;12(5):e0177576. doi: 10.1371/journal.pone.0177576. eCollection 2017.
2
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.一种具有属性更新功能的基于关键字搜索的属性加密方案,用于云存储。
PLoS One. 2018 May 24;13(5):e0197318. doi: 10.1371/journal.pone.0197318. eCollection 2018.
3
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.具有灾难恢复计划的电子健康云环境中的安全与隐私保护方法。
Comput Biol Med. 2016 Nov 1;78:1-8. doi: 10.1016/j.compbiomed.2016.09.003. Epub 2016 Sep 12.
4
Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.可验证的完全外包基于属性的签密系统,用于云计算中的物联网电子健康大数据。
Math Biosci Eng. 2019 Apr 22;16(5):3561-3594. doi: 10.3934/mbe.2019178.
5
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.基于云的物联网的具有支持概率审计的多副本完整性检查方案
PeerJ Comput Sci. 2024 Jan 16;10:e1790. doi: 10.7717/peerj-cs.1790. eCollection 2024.
6
Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.云存储中具有隐藏策略的可搜索和可撤销的多数据所有者基于属性的加密方案。
PLoS One. 2018 Nov 1;13(11):e0206126. doi: 10.1371/journal.pone.0206126. eCollection 2018.
7
Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges.云辅助医疗系统中的数据隐私:现状与未来挑战。
J Med Syst. 2016 Jun;40(6):155. doi: 10.1007/s10916-016-0509-2. Epub 2016 May 7.
8
eHealth Cloud Security Challenges: A Survey.电子健康云安全挑战:调查
J Healthc Eng. 2019 Sep 3;2019:7516035. doi: 10.1155/2019/7516035. eCollection 2019.
9
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.基于云平台的固体三角形面积和四面体体积的安全两方计算。
PLoS One. 2019 Jun 13;14(6):e0217067. doi: 10.1371/journal.pone.0217067. eCollection 2019.
10
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.基于 SM2 的离线/在线高效数据完整性验证方案,适用于多种应用场景。
Sensors (Basel). 2023 Apr 26;23(9):4307. doi: 10.3390/s23094307.

引用本文的文献

1
Design and Evaluation of a Real Time Physiological Signals Acquisition System Implemented in Multi-Operating Rooms for Anesthesia.设计与评估一个实时生理信号采集系统,在多个手术室中应用于麻醉。
J Med Syst. 2018 Jun 30;42(8):148. doi: 10.1007/s10916-018-0999-1.
2
Using digital health to enable ethical health research in conflict and other humanitarian settings.利用数字健康技术在冲突及其他人道主义环境中开展符合伦理的健康研究。
Confl Health. 2018 May 14;12:23. doi: 10.1186/s13031-018-0163-z. eCollection 2018.

本文引用的文献

1
Decision support for personalized cloud service selection through multi-attribute trustworthiness evaluation.通过多属性可信度评估实现个性化云服务选择的决策支持
PLoS One. 2014 Jun 27;9(6):e97762. doi: 10.1371/journal.pone.0097762. eCollection 2014.