• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

关于云服务中存储文件完整性的信任验证的安全架构与协议

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

作者信息

Pinheiro Alexandre, Dias Canedo Edna, de Sousa Junior Rafael Timoteo, de Oliveira Albuquerque Robson, García Villalba Luis Javier, Kim Tai-Hoon

机构信息

Cybersecurity INCT Unit 6, Decision Technologies Laboratory-LATITUDE, Electrical Engineering Department (ENE), Technology College, University of Brasília (UnB), Brasília-DF, CEP 70910-900, Brazil.

Department of Computer Science, University of Brasília (UnB), P.O. Box 4466-Brasília-DF, CEP 70910-900, Brazil.

出版信息

Sensors (Basel). 2018 Mar 2;18(3):753. doi: 10.3390/s18030753.

DOI:10.3390/s18030753
PMID:29498641
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5876826/
Abstract

Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

摘要

由于其可扩展性、可用性以及几乎无限的存储容量,云计算被视为一种有趣的范式。然而,从客户端角度组织一个安全的云存储服务(CSS)并在公共云中实现该CSS具有挑战性,因为盲目地将此配置视为完全可信赖是不明智的。理想情况下,大量数据的所有者应该信任他们的数据能长时间存储在云中,而无需承担保存原始数据副本的负担,也无需访问全部内容以验证数据保存情况。由于这些要求,完整性、可用性、隐私和信任对于采用云存储服务而言仍是具有挑战性的问题,尤其是当信息丢失或泄露可能带来重大损害时,无论是法律方面还是与业务相关的损害。考虑到这些问题,本文提出了一种用于定期监控存储在云中的信息以及服务提供商行为的架构。该架构通过基于信任和加密概念的提议协议运行,以确保云数据完整性,同时不损害保密性且不会使存储服务过载。对所提出的架构和协议进行的广泛测试和模拟验证了它们的功能行为和性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/795613c03e17/sensors-18-00753-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/d8f33c091897/sensors-18-00753-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/197f991bed72/sensors-18-00753-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/684e93f9e22c/sensors-18-00753-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/f3a90779a557/sensors-18-00753-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/f0436a4a0f46/sensors-18-00753-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/6508bbb1170b/sensors-18-00753-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/9a7242b20fc8/sensors-18-00753-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8dd81113e198/sensors-18-00753-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/a95741376a67/sensors-18-00753-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/cd98e6807141/sensors-18-00753-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/ec3a4d83962e/sensors-18-00753-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/d04075469b62/sensors-18-00753-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/241e2587cc94/sensors-18-00753-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/ecac09243e44/sensors-18-00753-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8ec940ba28a7/sensors-18-00753-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8b9b6e174d94/sensors-18-00753-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/795613c03e17/sensors-18-00753-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/d8f33c091897/sensors-18-00753-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/197f991bed72/sensors-18-00753-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/684e93f9e22c/sensors-18-00753-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/f3a90779a557/sensors-18-00753-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/f0436a4a0f46/sensors-18-00753-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/6508bbb1170b/sensors-18-00753-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/9a7242b20fc8/sensors-18-00753-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8dd81113e198/sensors-18-00753-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/a95741376a67/sensors-18-00753-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/cd98e6807141/sensors-18-00753-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/ec3a4d83962e/sensors-18-00753-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/d04075469b62/sensors-18-00753-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/241e2587cc94/sensors-18-00753-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/ecac09243e44/sensors-18-00753-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8ec940ba28a7/sensors-18-00753-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/8b9b6e174d94/sensors-18-00753-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/af36/5876826/795613c03e17/sensors-18-00753-g017.jpg

相似文献

1
Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.关于云服务中存储文件完整性的信任验证的安全架构与协议
Sensors (Basel). 2018 Mar 2;18(3):753. doi: 10.3390/s18030753.
2
Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts.利用区块链和智能合约验证存储在云中的文件完整性连续监控的架构有效性。
Sensors (Basel). 2021 Jun 29;21(13):4440. doi: 10.3390/s21134440.
3
Analysis of the security and privacy requirements of cloud-based electronic health records systems.基于云的电子健康记录系统的安全性和隐私性要求分析
J Med Internet Res. 2013 Aug 21;15(8):e186. doi: 10.2196/jmir.2494.
4
Provenance based data integrity checking and verification in cloud environments.云环境中基于来源的数据完整性检查与验证
PLoS One. 2017 May 17;12(5):e0177576. doi: 10.1371/journal.pone.0177576. eCollection 2017.
5
Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems.基于云的智能机器学习技术的健康监测系统的关键聚合加密系统和双重加密方法。
Comput Intell Neurosci. 2022 Apr 21;2022:3767912. doi: 10.1155/2022/3767912. eCollection 2022.
6
Computer Security Issues and Legal System Based on Cloud Computing.基于云计算的计算机安全问题及法律体系。
Comput Intell Neurosci. 2022 Jul 11;2022:8112212. doi: 10.1155/2022/8112212. eCollection 2022.
7
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.基于云的物联网的具有支持概率审计的多副本完整性检查方案
PeerJ Comput Sci. 2024 Jan 16;10:e1790. doi: 10.7717/peerj-cs.1790. eCollection 2024.
8
A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.电子健康云隐私保护方法的研究进展综述
IEEE J Biomed Health Inform. 2014 Jul;18(4):1431-41. doi: 10.1109/JBHI.2014.2300846.
9
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.具有灾难恢复计划的电子健康云环境中的安全与隐私保护方法。
Comput Biol Med. 2016 Nov 1;78:1-8. doi: 10.1016/j.compbiomed.2016.09.003. Epub 2016 Sep 12.
10
When Sensor-Cloud Meets Mobile Edge Computing.当传感器云遇到移动边缘计算。
Sensors (Basel). 2019 Dec 3;19(23):5324. doi: 10.3390/s19235324.

引用本文的文献

1
Design and Framework of Non-Intrusive Spatial System for Child Behavior Support in Domestic Environments.家庭环境中儿童行为支持的非侵入式空间系统设计与框架
Sensors (Basel). 2025 Aug 23;25(17):5257. doi: 10.3390/s25175257.
2
Security challenges and solutions using healthcare cloud computing.使用医疗云计算的安全挑战与解决方案。
J Med Life. 2021 Jul-Aug;14(4):448-461. doi: 10.25122/jml-2021-0100.
3
Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts.
利用区块链和智能合约验证存储在云中的文件完整性连续监控的架构有效性。
Sensors (Basel). 2021 Jun 29;21(13):4440. doi: 10.3390/s21134440.
4
Rethinking the Meaning of Cloud Computing for Health Care: A Taxonomic Perspective and Future Research Directions.重新思考云计算对医疗保健的意义:一种分类学视角及未来研究方向
J Med Internet Res. 2018 Jul 11;20(7):e10041. doi: 10.2196/10041.