期刊
SOFT COMPUTING
卷 23, 期 11, 页码 3779-3792出版社
SPRINGER
DOI: 10.1007/s00500-018-3038-8
关键词
Public auditing; Operation behavior log; Secure logging; Privacy preserving; Binary audit tree; Cloud storage
资金
- National Natural Science Foundation of China [U1405254, U1536115]
- Natural Science Foundation of Fujian Province of China [11181067]
- Program for New Century Excellent Talents in Fujian Province University [MJK2016-23]
- Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University [MJK2015-54]
- Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security [AGK201710]
- Research Project for Young Teachers in Fujian Province (Program for High-Education Informationization) [JAT170055]
- Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University [ZQN-PY115]
- Program for Science and Technology Innovation Teams and Leading Talents of Huaqiao University [2014KJTD13]
To ensure the creditability of audit for operation behaviors in cloud storage scenarios, it is indispensable to verify the integrity of log files prior to forensic analysis. Thus, in this paper, we mainly focus on how to achieve effective public audits for operation behavior logs. To achieve this goal, we first propose a new block-based logging method to satisfy all necessary requirements for security and performance, i.e., tamper resistance of log files, non-repudiation of behaviors and selective verification of log blocks. Next, we give a privacy-preserving public auditing method for a single log block, which can support an unlimited number of effective auditing operations. Further, we present a binary auditing tree-based public auditing method, which can achieve error locating while supporting selective verification for multiple log blocks. The security of the proposed scheme is formally proven. Moreover, its performance for verification is evaluated by comprehensive experiments and comparisons with existing schemes. The experimental results demonstrate that our scheme can efficiently achieve public verification for operation behavior logs in the cloud storage scenario and outperforms the existing ones in computation and communication costs.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据