Font Size: a A A

Data Privacy-Preserving Schemes For Cloud Computing

Posted on:2013-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:H Y SuFull Text:PDF
GTID:2218330371957346Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, cloud computing applications get further development by global efforts, but there exists a certain gap between a wide variety of cloud computing applications and the corresponding cloud computing security. There are not enough reliable solutions for cloud compting security and privacy protection. In cloud computing, untrusted cloud computing service providers are significant threats for data privacy protection. In order to solve cloud computing privacy issues, identity management and encryption mechanism are two keys to deploy the relevant security measures.Considering the distributed characteristic of cloud computing, this thesis uses secret sharing strategy to establish the encryption scheme. Meanwhile in order to facilitate the unified management of cloud computing users'identities, the scheme deploys the secret sharing strategy in identity based public encryption algorithm ( IBE ). This sheme aims to protect cloud computing data privacy from untrusted cloud computing service providers. Thus we use threshold value in secret sharing scheme to reduce the single untrusted service provider's threat. Furthermore, the data providers authorize the access of cloud computing privacy data. In this thesis, the scheme analyzes the correctness and security of three key steps. Then we use MIRACL cryption library simulates the three key steps. The statistics corresponding to the consumimg time proves that this scheme has certain efficiency.
Keywords/Search Tags:Cloud Computing, Privacy Preserving, IBE Algorithm, Secret Sharing
PDF Full Text Request
Related items