期刊文献+

云存储中支持XOR旋转编码的可恢复性验证方案 被引量:1

Verification scheme of retrievability supporting XOR rotated erasure codes for cloud storage data
原文传递
导出
摘要 为了提高云存储数据的容错性和可靠性,设计了一个能对云存储文件进行容错编码的可恢复性验证方案。该方案改进现有旋转里德-所罗门码(reed solomon,RS)编码为异或(XOR)旋转编码,并提出一种对编码矩阵的列向量标签快速模幂运算的验证方法。性能和安全性分析表明,该方案具有较低的通信代价和计算代价,以及高效的数据恢复功能。 To improve fault tolerance and reliability of cloud storage data,a verification scheme of retrievability is designed for cloud storage encoded files.In the scheme,a present rotated RS code named XOR rotated code is improved,and a verification method is proposed,which can perform the tags of column vectors of coding matrix with fast module multiplication.Performance evaluation and security analysis show it has a lower computational cost and communication cost and more efficient data recovery guarantee.
出处 《重庆邮电大学学报(自然科学版)》 北大核心 2012年第6期682-686,707,共6页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市自然科学基金(2011jjA1350) 重庆邮电大学自然科学基金(A2009-59)~~
关键词 云存储 异或(XOR)旋转编码 持有性证明 可恢复性 cloud storage XOR rotated codes provable possession retrievability
作者简介 宋秀丽(1972-),女,湖北天门人,讲师,硕士,研究方向为网络与信息安全。E—mail:songxl@cqupt.edu.cn。 陈龙(1970-),男,重庆人,教授,博士,研究方向为信息安全。 肖敏(1971-),女,湖北宜昌人,副教授,博士,研究方向为信息安全。
  • 相关文献

参考文献9

  • 1王意洁,孙伟东,周松,裴晓强,李小勇.云计算环境下的分布存储关键技术[J].软件学报,2012,23(4):962-986. 被引量:280
  • 2DESWARTE Y, QUISQUATER J J, SADANE A. Remote integrity checking[C]// SUSHIL JAJODIA AND LEON STROUS. In 6th working conference on integrity and in- ternal control in information systems (IICIS). New York, USA : Springer US, 2004 : 1-11.
  • 3ATENIESE G, BURNS R, CURTMOLA R, et al. Prov- able data possession at untrusted stores [ C ]//ACM. CCS '07 : Proceedings of the 14th ACM conference on comput- er and communications security. New York, USA: ACM, 2007 : 598-609.
  • 4CURTMOLA R, KHAN O, BURNS R,et al. MR-PDP: Muhiple-replica Provable data possession[ C ]//IEEE. In 28th IEEE ICDCS. New York, USA:IEEE Press, 2008 : 411-420.
  • 5JUELS A, KALISKI B S. PORs: Proofs of Retrievability for large files [ C ]//ACM. CCS'07 : Proceedings of the 14th ACM conference on Computer and communications security. New York, USA:ACM, 2007 : 584-597.
  • 6SHACHAM H, WATERS B. Compact proofs of retriev- ability[ C ]//Springer. Proceedings of the 14th Interna- tional Conference on the Theory and Application of Cryp- tology and Information Security: Advances in Cryptology. Berlin, Germany:Springer-Verlag,2008 : 90-107.
  • 7罗象宏,舒继武.存储系统中的纠删码研究综述[J].计算机研究与发展,2012,49(1):1-11. 被引量:94
  • 8KHAN Osama, BURNS Randal, PLANK James S, et al. Rethinking Erasure Codes for Cloud File Systems: Mini- mizing I/0 for Recovery and Degraded Reads [ C ]// USENIX. FAST 2012: 10th USENIX Conference on Fileand Storage Technologies. USENIX Association,2012.
  • 9AYAD F. BARSOUM M. Anwar Hasan. Provable posses- sion and replication of data over cloud servers[ EB/OL]. (2010) [ 2012-09-09 ]. http://cacr, uwaterloo, ca/ techreports/2010/cacr2010-32, pdf.

二级参考文献39

  • 1Layman P, Varian H R. How much information 2003? [EB/OL]. [2010 10-18]. http://www2, sims. berkeley. edu/research/proiects/how-mueh-info-2003.
  • 2Pinheiro E, Weber W D, Barroso L A. Failure trends in a large disk drive population [C] //Proc of the 5th USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2007 : 17-28.
  • 3Schroeder B, Gibson G A. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you? [C] //Proc of the 5th USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2007: 1-16.
  • 4Bairavasundaram L N, Goodson G R, Pasupathy S, et al. An analysis of latent sector errors in disk drives [C]//Proc of 2007 ACM SIGMETRICS Int Conf on Measurement and Modeling of Computer Systems. New York: ACM, 200: 289-300.
  • 5Hafner J M, Deenadhayalan V, Rao K, et al. Matrix methods for lost data reconstruction in erasure codes [C] // Proc of the 4th USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2005: 183-196.
  • 6Hafner J M, Deenadhayalan V, Kanungo T, et al. Performance metrics for erasure codes in storage systems, RJ 10321 [R]. San Jose, [A] IBM Research, 2004.
  • 7Li M, Shu J, Zheng W. GRID Codes: Strip based erasure codes with high fault tolerance for storage systems [J].ACM Transon Storage, 2009, 4(4): 1-22.
  • 8Blaum M, Brady J, Bruek J, et al. EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures [J].IEEE Trans on Computer, 1995, 44 (2) 192-202.
  • 9Corbett P, English B, Goel A, et al. Row-diagonal redundant for double disk failure correction [C] //Proc of the 3rd USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2004:2-15.
  • 10Xu L, Bruck J. X-code: MDS array codes with optimal encoding[J]. IEEE Trans on Information Theory, 1999, 45 (1) : 272-276.

共引文献360

同被引文献8

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部