《计算机应用研究》|Application Research of Computers

一种基于MB+树的网络共享数据查询和检验方法

Approach of query authentication for data sharing online based on MB+tree

免费全文下载 (已被下载 次)  
获取PDF全文
作者 李凌,张蕾,杨洋,李京
机构 1.西南科技大学 a.计算机科学与技术学院;b.四川省军民融合研究院,四川 绵阳 621010;2.中国科学技术大学 计算机科学与技术学院,合肥 230026;3.浙江科技学院 经济与管理学院,杭州 310000;4.四川省计算机研究院,成都 610041
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2018)03-0782-06
DOI 10.3969/j.issn.1001-3695.2018.03.030
摘要 网络数据共享机制将数据置于远程网络服务商处并通过外部访问接口进行共享,用户无须保存数据副本,网络服务商负责数据的安全保障,因此无副本情况下数据用户对网络服务商处存储数据的查询和安全校验至关重要。分析目前对远程存储数据查询和检验常用的Merkle散列树方法,就其对大规模数据进行检验时存在验证过程冗余、验证辅助数据量大等不足,提出一种基于MB+树的网络共享数据查询和检验方法,帮助数据用户确认位于网络服务商处数据的正确性和完整性。利用MB+树非叶节点包含多出度、叶节点直接映射数据等特性对数据文件进行抽象组织,避免Merkle散列树的节点数和深度随数据文件块的增多而呈线性增长的问题,同时缩短检验过程中的查询认证路径,减少检验所需的辅助认证信息,有效地控制了时间和空间消耗。通过实验分析可知,相较于常用的方法(如Merkle散列树),处理大规模数据时MB+树更易于构建,也能够更加快速地查询和检验数据文件。
关键词 数据共享;副本;查询;检验;MB+树;正确性;完整性
基金项目 西南科技大学博士研究基金资助项目(13zx7101)
高超声速冲压发动机技术国防科技重点研究室开发课题项目(STS/MY-KFKT-2014-004)
国家自然科学基金面上资助项目(61672438)
四川省军民融合研究院开放基金资助项目(JMRH01)
本文URL http://www.arocmag.com/article/01-2018-03-030.html
英文标题 Approach of query authentication for data sharing online based on MB+tree
作者英文名 Li Ling, Zhang Lei, Yang Yang, Li Jing
机构英文名 1.a.SchoolofComputerScience&Technology,b.SichuanCivilmilitaryIntegrationInstitute,SouthwestUniversityofScience&Technology,MianyangSichuan621010,China;2.SchoolofComputerScience&Technology,UniversityofScience&TechnologyofChina,Hefei230026,China;3.SchoolofEconomics&Management,ZhejiangUniversityofScience&Technology,Hangzhou310000,China;4.SichuanInstituteofComputerSciences,Chengdu610041,China
英文摘要 Data sharing online is now being wildly used through many applications. In this mode, data is uploaded to network service providers by data owners. So it is shared by network service providers instead of data owners and can be accessed through external interface by any other users. Then there is no need for data owners to keep the copy of their data. Due to the reputation of network service providers, query authentication for data sharing online by data owners becomes important. This paper applied traditional Merkle hash tree to ensure the correctness and integrity of data remotely stored. Considering the disadvantages of Merkle hash tree such as redundant verification procedures, large auxiliary verifications and so on, this paper proposed a new approach of query authentication for these data based on MB+ tree. It constructed MB+tree by partitions of data under verification, and its leaf nodes were directly mapped to certain partitions. Tree authentication algorithm through MB+tree could check the validity of any random partition. Compared with Merkle hash tree, experimental results show that this approach has the advantages of less query paths, lower auxiliary verifications, and moderate complexity.
英文关键词 data sharing; copy; query; verification; MB+ tree; correctness; integrity
参考文献 查看稿件参考文献
  [1] Arrington M. Gmail disaster:reports of mass email deletions[EB/OL] . (2006-12-28)[2016-12-01] . http://www. techcrunch. com/2006/12/28/gmail-disaster-reports-of-massemail-deletions/.
[2] Krigsman M. Apple’s MobileMe experiences post-launch pain[EB/OL] . (2008-07-11)[2016-12-01] . http://www. zdnet. com//blog/projectfailures/apples-mobileme-experiences-post-launch-pain/.
[3] Perez J C. Microsoft BPOS cloud suite hit by access problem[EB/OL] . (2010-08-24)[2016-12-01] . http://www. reuters. com/article/idUS188745639320100824.
[4] Shi Jun, Li Hui, Zhou Lidong. The technical security issues in cloud computing[J] . International Journal of Information and Communication Technology, 2013, 5(3-4):109-116.
[5] Fernandes D A, Soares L F, Gomes J, et al. Security issues in cloud environments:a survey[J] . International Journal of Information Security, 2014, 13(2):113-170.
[6] Duncan B, Whittington M. Enhancing cloud security and privacy:broadening the service level agreement[C] //Proc ofIEEE International Conference on Trust. Washington DC:IEEE Computer Society, 2015:1088-1093.
[7] Duncan B, Whittington M. Enhancing cloud security and privacy:the cloud audit problem[C] //Proc of the 7th International Conference on Cloud Computing, GRIDs and Virtualization. [S. l. ] :IARIA XPS Press, 2016:119-124.
[8] Singh J, Pasquler T, Bacon J, et al. Twenty security considerations for cloud-supported Internet of things[J] . IEEE Internet of Things Journal, 2016, 3(3):269-284.
[9] Saxena R, Day S. Cloud audit:a data integrity verification approach for cloud computing[J] . Procedia Computer Science, 2016, 89:142-151.
[10] Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J] . Journal of Software, 2011, 22(1):71-83.
[11] Li Ling, Xu Lin, Li Jing, et al. Study on the third-party audit in cloud storage service[C] //Proc of International Conference on Cloud and Service Computing. Washington DC:IEEE Computer Society, 2011:220-227.
[12] Lonea A M, Popescu D E, Prostean O. A survey of management interfaces for Eucalyptus cloud[C] //Proc of the 7th IEEE International Symposium on Applied Computational Intelligence and Informatics. Washington DC:IEEE Computer Society, 2012:261-266.
[13] Souza D, Matos R, Araujo J, et al. A tool for automatic dependability test in Eucalyptus cloud computing infrastructure[J] . Computer and Information Science, 2013, 6(3):57-67.
[14] Zheng Zibin, Zhang Yiei, Lyu M R. Investigating QoS of real-world Web services[J] . IEEE Trans on Services Computing, 2014, 7(1):32-39.
[15] Gao Zefeng, Li Xiaoyong. A framework for monitoring and security authentication in cloud based on Eucalyptus[C] //Proc of IEEE International Conference on Signal Processing, Communications and Computing. 2015:1-5.
[16] Hashizume K, Rosado D G, Fernandez-medina E, et al. An analysis of security issues of cloud computing[J] . Journal of Internet Ser-vices and Applications, 2013, 4(1):5.
[17] Harfoushi O, Alfawwaz B, Ghatasheh N A, et al. Data security issues and challenges in cloud computing:a conceptual analysis and review[J] . Communications and Network, 2014, 6(1):14-21.
[18] Chen Xuexiu, Chen Chi, Tao Yuan, et al. A cloud security assessment system based on classifying and grading[J] . IEEE Cloud Computing, 2015, 2(2):58-67.
[19] Wikipedia. Cloud storage[EB/OL] . (2016-10-01)[2016-12-01] . https://en. wikipedia. org/wiki/Cloud_storage.
[20] Stallings W. 密码编码学与网络安全[M] . 唐明, 李莉, 杜瑞颖, 等译. 6版. 北京:电子工业出版社, 2015.
[21] Juels A, Burton S, Kaliski J R. Proofs of retrievability for large files[C] //Proc of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007:584-597.
[22] Xiao Da, Shu Jiwu, Chen Kang, et al. A practical data possession checking scheme for networked archival storage[J] . Journal of Computer Research and Development, 2009, 46(10):1660-1668.
[23] Erway C, Kupcu A, Papamanthou C, et al. Dynamic provable data possession[C] //Proc of the 16th ACM Conference on Computer and Communications Security. New York:ACM Press, 2009:213-222.
[24] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores[C] //Proc of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007:598-609.
[25] Wang Qian, Wang Cong, Li Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C] //Proc of European Symposium on Research in Computer Security. Berlin:Springer-Verlag, 2009:355-370.
[26] Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving public auditing for storage security in cloud computing[C] //Proc of IEEE INFOCOM. Washington DC:IEEE Communication Society, 2010:525-533.
[27] Wang Cong, Ren Kui, Lou Wenjing, et al. Toward publicly auditable secure cloud data storage services[J] . IEEE Network, 2010, 24(4):19-24.
[28] Wikipedia. Merkle tree[EB/OL] . (2016-11-23)[2016-12-01] . https://en. wikipedia. org/wiki/Merkle_tree.
[29] 袁多宝, 王晓明. 基于MH树的外包数据库查询验证方法[J] . 计算机工程, 2010, 36(4):115-118.
[30] 严蔚敏, 吴伟民. 数据结构(C语言版)[M] . 北京:清华大学出版社, 2011.
[31] Cormen T H, Leisersion C E, Rivest R L, et al. Introduction to algorithm[M] . 2nd ed. Cambridge:MIT Press, 2001.
[32] Wikipedia. B-tree[EB/OL] . (2016-11-23)[2016-12-01] . https://en. wikipedia. org/wiki/ B-tree.
[33] Wikipedia. B+ tree[EB/OL] . (2016-11-23)[2016-12-01] . https://en. wikipedia. org/wiki/ B+_tree.
[34] Li Feifei, Hadjieleftherious M, Kollios G, et al. Dynamic authenticated index structures for outsourced databases[C] //Proc of ACM SIGMOD International Conference on Management of Data. New York:ACM Press, 2006:121-132.
[35] USTC. USTC cloud[EB/OL] . (2016-11-23)[2016-12-01] . http://cloud. ustc. edu. cn/.
收稿日期 2017/3/30
修回日期 2017/5/8
页码 782-787
中图分类号 TP301
文献标志码 A