电子学报 ›› 2017, Vol. 45 ›› Issue (10): 2484-2490.DOI: 10.3969/j.issn.0372-2112.2017.10.024

• 学术论文 • 上一篇    下一篇

基于简单随机抽样的大数据可信性验证方法

任正伟1, 孙小雁2, 王丽娜3, 王骞3, 徐明迪1, 张茂胜2,3   

  1. 1. 武汉数字工程研究所, 湖北武汉 430205;
    2. 玉林师范学院复杂系统优化与大数据处理广西高校重点实验室, 广西玉林 537000;
    3. 武汉大学计算机学院, 湖北武汉 430072
  • 收稿日期:2016-03-07 修回日期:2017-05-05 出版日期:2017-10-25 发布日期:2017-10-25
  • 通讯作者: 孙小雁
  • 作者简介:任正伟,男,1986年4月出生,湖北武汉人.2014年于武汉大学获工学博士学位.现为武汉数字工程研究所工程师,主要从事应用密码学、数据安全、可信计算等方面的研究工作.E-mail:zhengwei_ren@163.com
  • 基金资助:
    国家自然科学基金(No.61373169,No.61502438);国防预研项目(No.JCKY2016207A055,No.6140242010103);复杂系统优化与大数据处理广西高校重点实验室基金(No.2016CSOBDP0005);广西自然科学基金(No.2014GXNSFBA118010,No.2014GXNSFBA118268)

A Trustworthiness Verification Approach for Big Data Based on Simple Random Sampling

REN Zheng-wei1, SUN Xiao-yan2, WANG Li-na3, WANG Qian3, XU Ming-di1, ZHANG Mao-sheng2,3   

  1. 1. Wuhan Digital and Engineering Institute, Wuhan, Hubei 430205, China;
    2. Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing, Yulin Normal University, Yulin, Guangxi 537000, China;
    3. School of Computer Science, Wuhan University, Wuhan, Hubei 430072, China
  • Received:2016-03-07 Revised:2017-05-05 Online:2017-10-25 Published:2017-10-25

摘要: 针对大数据的可信性验证问题,本文提出了一种大数据可信性验证方法以验证数据来源和数据内容的可信性.本文首先通过验证数据属主的身份证书来实现数据来源可信性的验证,再在简单随机抽样和可聚合的广播签名方案的基础上,设计了一个交互式质询-应答协议,使得用户只需抽样少量数据就能以高置信率验证数据内容的可信性.理论分析和实验结果表明,本文方法是安全的,且性能开销在合理范围内,能够实现大数据的可信性验证.

关键词: 大数据安全, 可信性验证, 认证标签, 安全协议

Abstract: In this paper,we propose an approach to verify the trustworthiness of big data including the trustworthiness of data source and data content.The trustworthiness of data source is achieved by verifying the identity of data owner based on public key certificate.We design an interactive challenge-response protocol to verify the trustworthiness of data content on the basis of simple random sampling test and aggregated signature-based broadcast encrypting scheme.The protocol can make the users who know the public parameters of the data owner validate the verification result with high probability by sampling only a small amount of data.Formal security analysis and experimental evaluations are also conducted,showing that the proposed scheme is practical to achieve the design goal for big data.

Key words: big data security, trustworthiness verification, verification tag, security protocol

中图分类号: