Font Size: a A A

Research On Integrity Checking Of The Remote Data In Cloud

Posted on:2019-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:P Y LiFull Text:PDF
GTID:2428330545490078Subject:Mathematics
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of information technology,higher requirements for data storage and data processing are proposed.The traditional local data storage mode can no longer meet the requirements of big data storage.As an on-demand storage method,cloud storage has the advantages of low cost,superior technology,and advanced operating mode.They are valued by companies and experts once proposed.More and more data holders choose to store their private data in the cloud in order to save local storage costs.However,when the data is outsourced to the cloud,the users lose the control of the data and the data faces enormous challenges.How to ensure the integrity of data in cloud storage is a technology that ensures the security of outsourced data.The main purpose of the data integrity inspection is to detect whether the outsourced data is completely stored in the cloud to ensure that the cloud data has not been tampered with or even deleted.For data users,it is a resource-constrained entity.If data integrity testing is performed periodically,it will impose a heavy burden on data users.In order to ensure unbiased data validation of user data,a professional and competent third-party auditor can be introduced to implement the integrity inspection of outsourced data.However,this also may have certain risks:If the third party is passive and lazy and does not detect the data in the storage cloud,it will declare that the data is completely stored in the server,and therefore will deceive the data holders.In order to solve the above problems,this paper analyzes the basics of the existing data integrity and designs a solution that enables data holders to strengthen the control of third-party auditors.The key point of this paper is to design a scheme based on whether bilinear pairing detection data is complete.The new scheme increases the protection of data privacy by introducing a bilinear map.The data holder conducts batch auditing through the value returned by feedback.The self-service verification of cloud data integrity has been implemented,enabling data holders to increase control over third-party auditors.This scheme can be proved to be safe and feasible in the random oracle model.
Keywords/Search Tags:cloud storage security, data integrity verification, bilinear pairing, autonomous verification
PDF Full Text Request
Related items