Font Size: a A A

Study On Secure Privacy Preserving Protocols In Distributed Cloud Storage System

Posted on:2016-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:C YaoFull Text:PDF
GTID:2308330473456960Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As more and more users are using cloud computing services, security issues in cloud computing are increasingly prominent, especially privacy protection problems. This paper studies the privacy protection problems and challenges in cloud.The comprehensive analysis of privacy protection in cloud computing has great significance for using and spreading cloud computing. This paper studies three security protocols on the protection of privacy: a secure distributed cloud storage protocol from threshold encryption, a secure integrity checking protocol in cloud and public batch auditing based on privacy protection protocol in mobile cloud. With these three protocols, we can significantly improve system security, confidentiality, robustness and efficiency. These specific protocols are as follows:1. A secure distributed cloud storage protocol from threshold encryption:confiden-tiality of data is one of security issues. We propose a decentralized cloud storage system from threshold encryption. Under the premise of providing better priva-cy protection, our scheme can maintain the system structure of decentralization and can resist adversaries from obtaining the decrypted ciphertext in the public channel.2. A secure remote data integrity checking protocol in cloud:we propose an integri-ty verification protocol to detect cloud service provider’s actions of modifying or deleting the user data in the interaction process between the user and cloud service provider, and we take advantage of the distributed storage technology and encryption technology to improve the system robustness and confidentiality.3. Batch public (?) for distributed mobile cloud computing protocol:consider-ing the large amounts of data auditing and quantity of mobile devices, we pro-pose a scheme which can realize secure public batch auditing protocol from privacy protection in the distributed cloud storage environment. This protocol can realize different multiple auditing tasks from the same user and improve cloud computing system auditing efficiency.
Keywords/Search Tags:Security, Distributed Storage, Integrity Check, Privacy Protec- tion, Threshold Encryption, Batch Auditing
PDF Full Text Request
Related items