Font Size: a A A

Research On Authentication And Privacy-Preserving Technology In Cloud Computing

Posted on:2013-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:S D YanFull Text:PDF
GTID:2248330395956540Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the advance of computer technology and the spreading of network application, cloud computing has got an unprecedented development and research. It brings kinds of conveniences, but also brings a lot of security problems. For example, authentication problem, privacy preserving problem, privileged user access problem, data separation problem, and so on.In this paper, from the perspective of authentication and privacy preserving, we do research on security in cloud computing. Our major work is as follows;(1) To solve the problem of authentication in trusted cloud computing platform (TCCP), from the perspective of security and implementation efficiency, we improve the original protocol. By introducing dual discrete logarithm, we improve the security of the original protocol. Using bilinear pairing technology of ECC, we improve the implementation efficiency of the original protocol.(2) On the basis of the trusted cloud computing platform (TCCP), to solve the problem of using the removable storage medium secure inside LAN, a monitoring method of the removable storage medium in the trusted cloud computing environment is proposed, which meets the dual authentication, remote monitoring, trusted authentication, and file encryption.(3) To solve the problem of privacy preserving in cloud computing, from the perspective of homomorphism encryption technology, we propose a homomorphism encryption algorithm that has a multiplication property of ECC, combined with secure multi-party computing, we presents a practical application based on the cloud computing——a secure two-party division protocol.
Keywords/Search Tags:Cloud computing, Trusted computing, Homomorphism encryptiontechnology, Secure multi-party computing
PDF Full Text Request
Related items