DOI QR코드

DOI QR Code

계수행렬을 이용한 외부 스토리지 무결성 검증 기법

Outsourced Storage Auditing Scheme using Coefficient Matrix

  • 은하수 (한양대학교 컴퓨터공학과) ;
  • 오희국 (한양대학교 컴퓨터공학과) ;
  • 김상진 (한국기술교육대학교 컴퓨터공학부)
  • 투고 : 2013.10.07
  • 심사 : 2013.11.02
  • 발행 : 2013.11.30

초록

사용자들은 외부 스토리지를 사용함으로써 언제, 어디서나 자신의 데이터에 접근할 수 있다. 하지만 자신의 데이터가 어떻게 관리되고 있는지는 알 수 없다. 심지어 자신의 데이터에 손상이 발생하여도 인지할 수 없다. 이와 같은 불편을 해결하기 위해 외부 스토리지 검증기법들이 제안되었다. 대부분의 기법들이 준동형 검증 태그(homomorphic verifiable tags)를 사용하고 있지만, 이는 데이터를 지수로 하여 계산하기 때문에 효율성에 한계가 있다. 본 논문에서는 외부 스토리지 무결성 검증의 새로운 접근 방법으로써 계수행렬을 이용한 기법을 제안한다. 제안하는 기법은 데이터를 계수행렬의 형태로 변환하여 검증에 사용한다. 검증과정은 선형연립방정식의 해를 구하는 형태로 진행되며, 검증자는 수식에 해벡터를 대입함으로써 쉽게 검증을 수행할 수 있다. 제안하는 기법을 사용하면 검증자는 sqrt(n) 크기의 데이터로 크기가 n인 데이터를 검증할 수 있다.

Users can access their data anywhere, at any time by using outsourced storage. But they cannot know how service provider manage the data. Even user cannot know when data damaged. To solve these problems, the outsourced storage auditing schemes has been proposed. Most proposed schemes are based on Homomorphic Verifiable Tags. But it has computational efficiency limitation because data used to exponent. In this paper, we propose a novel approach to outsourced storage auditing scheme using coefficient matrix. In the proposed scheme, data used to auditing by coefficient matrix form. Auditing procedures are proceed as solving the linear simultaneous equation. The auditor can audit easily by solving the equation using solution vector. The auditor can audit the n size data using sqrt(n) size data through out proposed scheme.

키워드

참고문헌

  1. Y. Deswarte, J.-J. Quisquater, and A. Saidane, "Remote Integrity Checking," in Integrity and Internal Control in Information Systems VI. Vol.140, S. Jajodia and L. Strous, Eds., ed: Springer US, 2004, pp.1-11.
  2. D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptology ePrint Archive, Vol.2006, pp.150, 2006.
  3. G. Yamamoto, S. Oda, and K. Aoki, "Fast integrity for large data,"" in Workshop on Software Performance Enhancement for Encryption and Decryption (SPEED 2007), 2007, pp.21-32.
  4. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, et al., "Provable data possession at untrusted stores," presented at the Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2007.
  5. H. Shacham and B. Waters, "Compact Proofs of Retrievability," presented at the Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Melbourne, Australia, 2008.
  6. W. Cong, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers, Vol.62, pp. 362-375, 02/01 2013. https://doi.org/10.1109/TC.2011.245
  7. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Probable Data Possession," Proceedings of the 16th ACM conference on Computer and Communications Security (CCS '09), pp.213-222, Nov., 2009.
  8. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proceedings of the 14th European conference on Research in computer security (ESORICS '09), pp.355-370, 2009.
  9. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proceedings of IEEE INFOCOM 2010, pp.1-9, 2010.
  10. Q. Wang, C. Wang, K. Ren, and W. Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, pp.847-859, Mar., 2011.
  11. K. Yang and X Jia, "Data storage auditing service in cloud computing challenges, methods and opportunities," World Wide Web, Vol.15, pp.409-428, 2012. https://doi.org/10.1007/s11280-011-0138-0
  12. B. Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," Applied Cryptography and Network Security (ACNS), LNCS 7341, pp.507-525, 2012.
  13. B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," 2012 IEEE Fifth International Conference on Cloud Computing, pp.295-302, 2012.
  14. K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing," IEEE Trans. on Parallel and Distributed Systems, Vol.24, No.9, pp.1717-1726, Sept., 2013. https://doi.org/10.1109/TPDS.2012.278