中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
design and implement of integrity checking schema under cloud storage model
Author: Fu Yan-Yan ; Zhang Min ; Feng Deng-Guo
Keyword: Communication ; Technology
Source: Tongxin Xuebao/Journal on Communications
Issued Date: 2011
Volume: 32, Issue:9 A, Pages:8-15
Indexed Type: EI
Department: (1) Institute of Software Chinese Academy of Sciences Beijing 100080 China
Abstract: In the cloud storage model, user need to confirm the file status while it's kept in the untrusted remote storage server. Then user could decide to restore the data or use the data for other purpose. By pre-random sampling from a file to form samples and sign them, provide users with a credible certification credentials. When user initiates a verification, the storage server re-generate a new signature in accordance with the same rules. By comparing the signatures, user can verify whether the file is complete. Analysis showed that, with this random sampling method, user can find file corruption with quite high probability. though a single verification may be not quite provable, user can send multiple challenge to get better credibility. Also, time required for verification has nothing to do with file size , but the credibility of the verification. Experimental results show that this schema work better under cloud storage model than other schema based on signatures and has a very high credibility.
English Abstract: In the cloud storage model, user need to confirm the file status while it's kept in the untrusted remote storage server. Then user could decide to restore the data or use the data for other purpose. By pre-random sampling from a file to form samples and sign them, provide users with a credible certification credentials. When user initiates a verification, the storage server re-generate a new signature in accordance with the same rules. By comparing the signatures, user can verify whether the file is complete. Analysis showed that, with this random sampling method, user can find file corruption with quite high probability. though a single verification may be not quite provable, user can send multiple challenge to get better credibility. Also, time required for verification has nothing to do with file size , but the credibility of the verification. Experimental results show that this schema work better under cloud storage model than other schema based on signatures and has a very high credibility.
Language: 中文
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/16059
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Fu Yan-Yan,Zhang Min,Feng Deng-Guo. design and implement of integrity checking schema under cloud storage model[J]. Tongxin Xuebao/Journal on Communications,2011-01-01,32(9 A):8-15.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Fu Yan-Yan]'s Articles
[Zhang Min]'s Articles
[Feng Deng-Guo]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Fu Yan-Yan]‘s Articles
[Zhang Min]‘s Articles
[Feng Deng-Guo]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2022  中国科学院软件研究所 - Feedback
Powered by CSpace