中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 5
Sep.  2020
Turn off MathJax
Article Contents
ZHANG Xun, BAI Wanrong, WEI Feng, WANG Rong, TIAN Xiuxia, LIU Tianshun. An integrity auditing scheme based on MHT for power equipment images stored in the cloud[J]. Journal of East China Normal University (Natural Sciences), 2020, (5): 33-43. doi: 10.3969/j.issn.1000-5641.202091012
Citation: ZHANG Xun, BAI Wanrong, WEI Feng, WANG Rong, TIAN Xiuxia, LIU Tianshun. An integrity auditing scheme based on MHT for power equipment images stored in the cloud[J]. Journal of East China Normal University (Natural Sciences), 2020, (5): 33-43. doi: 10.3969/j.issn.1000-5641.202091012

An integrity auditing scheme based on MHT for power equipment images stored in the cloud

doi: 10.3969/j.issn.1000-5641.202091012
  • Received Date: 2020-08-12
    Available Online: 2020-09-24
  • Publish Date: 2020-09-24
  • This paper proposes an integrity auditing scheme suitable for power equipment images stored in the cloud with the aim of addressing the risks of being attacked, tampered with, or lost. First, each image is cut into four image blocks, and then a Scale Invariant Feature Transform (SIFT) algorithm is used to extract features from the image blocks. The four image blocks for each image are subsequently used as a leaf node to construct a Merkle Hash Tree (MHT). Finally, access level bits and update status bits are added to the nodes of the tree. Theoretical analysis and experimental results show that the proposed image integrity auditing scheme has lower computational overhead and higher audit efficiency compared to existing approaches; hence, the scheme can accurately locate the incomplete area of an image and is suitable for auditing integrity of power equipment images in a cloud storage environment.
  • loading
  • [1]
    姜哲. 无人机巡线电力设备故障的视觉检测技术 [D]. 西安: 电子科技大学, 2017.
    [2]
    何道敬, 杜晓, 乔银荣, 等. 无人机信息安全研究综述 [J]. 计算机学报, 2019, 42(5): 1076-1094.
    [3]
    冯朝胜, 秦志光, 袁丁. 云数据安全存储技术 [J]. 计算机学报, 2015, 38(1): 150-163.
    [4]
    冯登国, 张敏, 张妍, 等. 云计算安全研究 [J]. 软件学报, 2011, 22(1): 71-83.
    [5]
    WAZID M, DAS A K, KUMAR N, et al. Secure three-factor user authentication scheme for renewable-energy-based smart grid environment [J]. IEEE Transactions on Industrial Informatics, 2017, 13(6): 3144-3153.
    [6]
    谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展 [J]. 计算机学报, 2015, 38(1): 164-177.
    [7]
    XU J, WEI L, ZhANG Y, et al. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures [J]. Journal of Network and Computer Applications, 2018, 107: 113-124.
    [8]
    PENG S, ZHOU F, LI J, et al. Efficient, dynamic and identity-based remote data integrity checking for multiple replicas [J]. Journal of Network and Computer Applications, 2019, 134: 72-88.
    [9]
    SEBÉ F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
    [10]
    WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 22(5): 847-859.
    [11]
    张庆功, 赵现昌. SIFT算法在无人机遥感影像特征提取中的应用 [J]. 河南水利与南水北调, 2019, 48(11): 63-65.
    [12]
    郭会, 邓伦治. 一个基于双线性映射的无证书多接收者签密方案 [J]. 贵州师范大学学报(自然科学版), 2018, 36(6): 98-105.
    [13]
    许钟华, 张龙军. 基于MHT的云环境下数据完整性检验方案 [J]. 计算机与网络, 2014, 40(19): 63-66.
    [14]
    苏迪, 刘竹松. 一种新型的Merkle哈希树云数据完整性审计方案 [J]. 计算机工程与应用, 2018, 54(1): 70-76.
    [15]
    LI L M, YANG Y H, WU Z H. FMR-PDP: Flexible multiple replica provable data possession in cloud storage [C]//International Symposium on Computers and Communications. 2017: 1115-1121.
    [16]
    李晨. 云存储数据的安全审计技术研究 [D]. 西安: 电子科技大学, 2018.
    [17]
    秦志光, 王士雨, 赵洋, 等. 云存储服务的动态数据完整性审计方案[J]. 计算机研究与发展, 2015, 52(10): 2192-2199.
    [18]
    PAPAMANTHOU C, TAMASSIA R, TRIANDOPOULOS N. Optimal authenticated data structures with multilinear forms [C]//International Conference on Pairing Based Cryptography. Springer, 2010: 246-264.
    [19]
    HARIHARASITARAMAN S, BALAKANNAN S P. A dynamic data security mechanism based on position aware merkle tree for health rehabilitation services over cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2019(7): 1-15.
    [20]
    ERWAY C, PAPAMANTHOU A C, TAMASSIA R. Dynamic provable data possession [J]. ACM Transactions on Information and System Security, 2015, 7(4): 1-29.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(12)

    Article views (121) PDF downloads(8) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return