Font Size: a A A

Design And Optimizing Of Data Integrity Verification Scheme In Cloud Storage Environment

Posted on:2017-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:W P LiuFull Text:PDF
GTID:2348330533950181Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud storage breaks through the concept of the traditional data storage mode and changes the way users to store data, it is treated as a new branch of cloud computing. It provides a way to store and access the remoted data, users can access the data stored in the cloud easily. However, there are some disadvantages of cloud storage, and the security of data is the most important one. Data integrity verification is one of the ways to solve the security problem of cloud storage, users can use appropriate ways to verify the integrity and availability of data stored in the cloud. Our work mainly focuses on the problem of data integrity verification in hybrid cloud. The specific contents are as follows:1. Verifier receives multiple user authentication request at the same time to verify the integrity of the validation data stored in the cloud. Therefore, this thesis proposes a scheme of batch and collaborative provable data possession for integrity verification in hybrid cloud, and uses RSA signature and homomorphism verifiable tags. It involves data interaction between cloud service providers in different cloud environment. In order to better protect the safety of the users' data, this thesis introduces combiner in the clouds, and combiner effectively locks the details of the cloud storage data. This thesis uses the concept of the homomorphism aggregation and the validation of multiple users' cloud data at the same time, to reduce the computational cost and communication cost in the process of validation, and improve the verification efficiency of the scheme.2. Most existing data integrity verification schemes are lack of an efficient key management mechanisms to manage the key produced in the process of verification. This thesis proposes a scheme which supports the verification of key managers. In this scheme, key manager is mainly responsible for two tasks, one is receiving the request of users who need to generate key pairs, and generating signature public and private key pairs for users. The other one is helping users to manage the private data produced in the process of data initialization. The key managers added in the scheme reduces the cost in the process of data integrity verification, improves the verification efficiency. In this scheme, when data blocks generate labels, it binds themselves with the identity of the user. Before authentication performing the data integrity verification in the cloud, it needs to verify the identity of users, only the verifications successful, the subsequent integrity verification could be continued. It prevents unauthorized users from operating the data by indentity verification, and protects the security of users' data.
Keywords/Search Tags:Cloud computing, cloud storage, hybrid cloud, multi-user, cooperative verification
PDF Full Text Request
Related items