4.6 Article

Public audit for operation behavior logs with error locating in cloud storage

期刊

SOFT COMPUTING
卷 23, 期 11, 页码 3779-3792

出版社

SPRINGER
DOI: 10.1007/s00500-018-3038-8

关键词

Public auditing; Operation behavior log; Secure logging; Privacy preserving; Binary audit tree; Cloud storage

资金

  1. National Natural Science Foundation of China [U1405254, U1536115]
  2. Natural Science Foundation of Fujian Province of China [11181067]
  3. Program for New Century Excellent Talents in Fujian Province University [MJK2016-23]
  4. Program for Outstanding Youth Scientific and Technological Talents in Fujian Province University [MJK2015-54]
  5. Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security [AGK201710]
  6. Research Project for Young Teachers in Fujian Province (Program for High-Education Informationization) [JAT170055]
  7. Promotion Program for Young and Middle-aged Teacher in Science and Technology Research of Huaqiao University [ZQN-PY115]
  8. Program for Science and Technology Innovation Teams and Leading Talents of Huaqiao University [2014KJTD13]

向作者/读者索取更多资源

To ensure the creditability of audit for operation behaviors in cloud storage scenarios, it is indispensable to verify the integrity of log files prior to forensic analysis. Thus, in this paper, we mainly focus on how to achieve effective public audits for operation behavior logs. To achieve this goal, we first propose a new block-based logging method to satisfy all necessary requirements for security and performance, i.e., tamper resistance of log files, non-repudiation of behaviors and selective verification of log blocks. Next, we give a privacy-preserving public auditing method for a single log block, which can support an unlimited number of effective auditing operations. Further, we present a binary auditing tree-based public auditing method, which can achieve error locating while supporting selective verification for multiple log blocks. The security of the proposed scheme is formally proven. Moreover, its performance for verification is evaluated by comprehensive experiments and comparisons with existing schemes. The experimental results demonstrate that our scheme can efficiently achieve public verification for operation behavior logs in the cloud storage scenario and outperforms the existing ones in computation and communication costs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据