Font Size: a A A

Data Privacy Protection In Cloud Computing

Posted on:2014-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:L J ChenFull Text:PDF
GTID:2248330395984003Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Since first proposed in2006, cloud computing has been a research hotspots both at home and abroad. However, the security of cloud service is the issue to restrict its development all the time. On the one hand, users’private data is transferring between the client and the server when they are experiencing the convenient cloud service, then how to ensure the security of the private data is the most important factor for providing reliable service. On the other hand, users worry about that whether they would lose the data stored in cloud server when it suffers from attacks. That whether cloud computing is with backup fault-tolerance is another important factor for the promotion of cloud service. What’s more, users would lose the control on the data when it’s uploaded to the cloud server. Thus how to prevent the data from being accessed without permission is also necessary to be considered.In this paper, to solve the data privacy leakage that is one of the core security issues, polynomial-based homomorphic public key encryption algorithm is taken to ensure the security attributes like data security, and threshold-based key management strategy is taken to ensure the integrity and security of the key. What’s more, grade the data operating authorities with role-based authorized access mechanism, and determine the corresponding authorities of different levels after the consultation of cloud computing service providers, data owner and data user to prevent the data from being misused or illegal operated, thus to ensure the security of user privacy. After proposing the detailed steps of related scheme, relevant analysis is made from the two aspects of correctness and security to prove the feasibility and security of the scheme. The scheme is with low computer complexity, high performance and low consumption.
Keywords/Search Tags:cloud computing, privacy protection, homomorphic encryption, threshold, role
PDF Full Text Request
Related items