Font Size: a A A

Research For The Model Of Provable Data Possession In Cloud Storage

Posted on:2014-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:H N LiuFull Text:PDF
GTID:2248330398478332Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The cloud era comes rapidly! As the next-generation architecture of the IT industry, cloud computing is not just a simple large-scale data center for gathering application software and databases, but a new scheme that is with greater flexibility to allow any cloud endpoint to join in service interaction. Such a new trait is greatly reflected in the cloud storage service:the service-providing entities may be the integration of the provider of a variety of nature. These heterogeneous and not fully trusted storage providers will bring many new security risks that have not yet been recognized thoroughly. Integrity verification for outsourcing data stored in the cloud needs to be solved.All the present schemes for PDP either lack of publicly verification operation or do not take full account of the new features of cloud storage. Our solution explores on these two aspects. Our research focuses on building a proper solution for integrity verification in cloud storage environment.The article first describes the new features of the cloud environment comparing to the traditional P2P environment; then analyzes how to make verification for users effectively and safely in the new environment.i.e. building a model suitable in a cloud storage environment.In particular, we added a trusted third-party cloud storage proxy CSPP to build the bridge of the interaction between cloud users and a wide range of cloud storage providers.; next, we continue to explore how to ensure the security of cloud storage providers proxy as a third-party, through taking advantage of trusted computing, by adding into hardware protection technology to build CSPP. In detail, CSPP uses trusted platform module TPM and audit logs to ensure its own security and credibility.This paper carried theoretical and experimental analysis for the algorithm in the proposed model. The algorithm is proved to be correct through theoretical derivation. As long as the storage provider stores the user’s original data, it can be successfully pass the integrity verification. In terms of security, the algorithm also meets the requirements of completeness and privacy. If some storage service provider does not store the original data which is challenged, it will, even with forging the possession proof, be authenticated by the challenger at very low probability. Meanwhile, any third party cannot extract additional private information from the interactive data. The model uses a probability-based authentication, leading to the time consumed to produce proof independent from file size and improving performance in a certain degree. The model has some effects of reducing costs from computing, communications and storage. In addition, CS-PDP model supports public authentication and allows infinite verification challenges.
Keywords/Search Tags:cloud storage, provable data possession, cloud storage providerproxy
PDF Full Text Request
Related items