Font Size: a A A

Research Of The Data Integrity Checking Protocols In Cloud Computing

Posted on:2015-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y C ZhangFull Text:PDF
GTID:2268330428464031Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The emergence of the cloud computing has pointed out a new way for the development of the computer industry. The cloud computing may integrate the free resources effectively and distribute them reasonably. The emergence of the cloud computing is also an important technology innovation. With the convenience the cloud computing has taken to people’s life, it also brings some risks to the data’s security. If the hidden danger could not be removed quickly, it would hinder the development of the cloud computing.The existing function of the cloud computing can be divided into three aspects: Interface as a Service (laas), Platform as a Service (Paas) and Software as a Service (Saas); the cloud storage belongs to the Interface as a Service in the service classes. The data in the cloud storage service are different from that in other services which will be stored for a few seconds or less in the server, but would be stored in the server for quite a long time. So the cloud storage is considered to be the first object to be attacked.Tampering, deleting and embezzlement are the normal attack methods to the storage service. Fortunately, the data integrity checking can judge whether the data have been tampered or not. If the lost data do not exceed certain limitation, they can be recovered by the codes technology which has been processed in the data preprocessing before. The data integrity checking in the cloud computing can be divided into two-side checking protocol and public verifiability protocol according to the number of the participants.The paper’s main contentsFirstly, we introduce the characteristics, functions, construction of the cloud computing, the existed services provided by the business cloud and the risk in the cloud computing. We illuminate the importance of the data integrity checking in the cloud computing by analysis. After the illustration of the existed models of the data integrity checking and the existed attack methods, we introduce some existed protocols and analyze the advantages and disadvantages of them. At last, we work out the suitable environment and models for the existed protocols by analyzing their characteristics.Secondly, we provide a novel big data integrity checking protocol for cloud. The current known protocols for Data Integrity Checking are not suitable for Big Data which are so large and complex that it becomes difficult to check their integrity. In this paper, a new Data Integrity Checking protocol for Big Data in the cloud storage is proposed by improving Juel’s protocol in which it only allows the data detection within limited times. We bring the erasure coding in the Data Integrity Checking, which could improve the restorability a lot. The correctness of the protocol is based on the probability of a lot of the data tampered while the sentinel is integrity approaching zero without any knowledge of the sentinel’s distribution and a little tampered data can be recovered by the erasure codes technology. Through the theory analysis, our protocol has the advantages in the calculation and the user’s memory space.In this paper, we also provide a new integrity checking protocol based on secure multi-part computation with public verifiability, and we have different ways to control the checker’s action. In our model, the data owner is one of the computing operators in the protocol, so the data owner can control the security of the checking action and defense the attacks coming from the cloud server and the illegal checker. We provide a two-side secure module computing and bring secure multi-part computation into the Data Integrity Checking; thus, the Data Integrity Checking in the protocol can be realized among the three sides distrusting one another and without leaking any secrets. Our protocol can make the user’s privacy safer by increasing the computing cost and communication cost. The protocol has great advantages in computing cost over the exiting protocols which also support public verifiability; on the aspects of communication cost and users’memory space, our protocol is equal to others.In the end, we summarize the contribution of this paper and analyze the problems existing in the Data Integrity Checking which need to be investigated and solved in the future.
Keywords/Search Tags:Data Integrity Checking, Cloud Computing, Secure Multi-partComputation, Big Data, Secure Module Computing
PDF Full Text Request
Related items