FANG Rui,LIAO Yong,FANG Xin,et al.Data Integrity Checking Algorithm Research in Outsource Data based on B+Tree of the Linked List[J].Journal of Chengdu University of Information Technology,2016,(04):377-381.
外包数据中基于链表的B+树数据完整性检测算法研究
- Title:
- Data Integrity Checking Algorithm Research in Outsource Data based on B+Tree of the Linked List
- 文章编号:
- 2096-1618(2016)04-0377-05
- Keywords:
- outsource data; linked list; B+tree; integrity checking; algorithm; data structure definition; data security
- 分类号:
- TP309.2
- 文献标志码:
- A
- 摘要:
- 外包数据是数据拥有者将自己的数据存储在第三方服务提供商的服务器上,数据完整性检测的目标是防止存储在不可信的第三方服务器上的数据被篡改,验证数据是否可信。在基于B+树完整性检测算法的研究基础上,提出一种基于链表的B+树完整性检测算法,给出算法的数据结构定义及分析验证过程。该算法数据结构是通过单循环链表与B+树相结合,动态的获取链表中数据的验证信息,同时在B+树的叶子结点存储一个链表,增加了存储空间效率。实验表明,当数据增大时,基于链表的B+树与B+树在查询时间上相比略有优势,在插入数据时,优势明显。
- Abstract:
- Outsourcing data is what the users store their own data in a third-party service provider's server,and the goal of data integrity checking protection is to prevent data which is in storage in a distrusted third-party server from being tampered and verify the data whether it is credible or not.Based on B+tree integrity checking algorithm in this paper,a data integrity checking algorithm based on B+tree of the linked list has been put forward and the data structure definition of algorithm and the verification of analysis have been given.The scheme obtains the authentication information dynamically in linked list by means of combining single circular linked list with B+tree,at the same time,it can increase the storage space and efficiency by means of storing a linked list in leaf nodes of the B+tree.Experiment shows that when the data increases, the B+tree based on linked list has a slight advantage in comparison to B+ in the query time,while when inserting data, the advantage is obvious.
参考文献/References:
[1] Rao J, Ross K A. Cache Conscious Indexing for Decision-Support in Main Memory[C]//Processdings of the 25th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc.1999:78-89.
[2] Li F F,Hadjielefttheriou M, kollios G. Dynamic authenticated index structures for outsourced databases[C] //Proc of ACM SIGMOD 2006. New York:ACM,2006:121-132.
[3] 咸鹤群,冯登国.外包数据库模型中的完整性检测方案[J].计算机研究与发展,2010,47(6):1107-1115.
[4] 耿纪昭。云存储中数据完整性验证机制的研究与实现[D].成都:电子科技大学,2013.
[5] 耿庆田,狄婧,常亮,等.基于B+树的数据索引存储[J].吉林大学学报:理学版,2013,(11).
[6] 孙岚,吴英杰,罗钊,等.路由环境下防止重放攻击的位置隐私保护算法[J].华中科技大学学报,2013,(12).
[7] 胡传福.从链表的实现论C/C++与数据结构教学[J].东莞理工学院学报,2013,(6).
[8] 王宏俊,丁群.RSA公钥算法研究与快速模幂运算设计[J].黑龙江大学工程学报,2013,(5).
[9] 张敏.外包存储环境下数据共享的安全方案研究[D].成都:电子科技大学,2010.
[10] 孔范新.云环境下的数据安全研究[D].济南:山东大学,2014.
[11] 文辉灰.基于动态累加器的直接匿名证明方案研究[D].兰州:兰州大学,2014.
[12] 姚戈.云存储数据完整性验证机制研究[D].北京:北京交通大学,2016.
[13] 王东.基于动态结点流行度的B+树索引研究[D].郑州:郑州大学,2014.
[14] 苏兰.面向计算的数据完整性检验方法研究与实现[D].成都:电子科技大学,2013.
[15] 江捷斯。云环境下远程数据完整性认证数据结构研究[D].广州:华南理工大学,2014.
备注/Memo
收稿日期:2016-07-06