Font Size: a A A

Design And Analysis Of Secure Data Storage Protocols For Cloud Computing

Posted on:2014-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:J N ZhaoFull Text:PDF
GTID:2268330401964456Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With its great power to integrate resources, Cloud Computing can offer individualsand orgnizations the convenient and on-demand computing and storage service. As theincreasingly influence on everyday life, its structural safety problem emerges. Due tothe loss of physical control towards data, the users’ data safety only relys on the cloudserver unilaterally. Thus, whether we could improve users’ storage efficiency and meetits requirement of correctness, integrity, privacy and scalability conditions thedevelopment and industrialization of cloud computing in real application.Based on the current problems, our desertation chooses secure cloud data storageauditing protocol as the main researching object. With the basic theory and tools ofcryptography, based on provably secure theory, we analyze the existing works fordetailed security, efficiency and scalability research. MeanWhile, we focus on the keytechnology of secure data verification, i.e. data aggregate signature algorithm. Our maincontributions are as follows:1. Research on Wang et.al’s cloud data storage auditing scheme and its attackscheme proposed by Xu et.al. With the analysis and comparsion, we come to themethods of eliminating security flaw and lowering the computational overheads.2. Based on the current efficient identity-based aggregate signature, we propose thefirst identity-based public verification for secure cloud data storage, ofprivacy-preserving and batch-task under multi-user environment. Our scheme is fullyprovable secure under random oracle model, based on our formally-defined securitymodel. Compared with schemes based on certificate system, our scheme does notrequire the public key to bind with certificate, which will reduce the communicationoverheads.3. Research on the key technology of secure cloud data storage auditing scheme, i.e.data aggregate signature algorithm. After analysis of existing works, we come with anew identity-based aggregate signature scheme, where each user keeps less number ofprivate keys and the computational complexity. Further more, we propose a newefficient identity-based aggregate signature scheme with both advantages of batch-verfication signature and aggregate signature. It could offer large scale of dataverification in the multi-user setting with high efficiency. In particular, this scheme isquite suitable for data verification in multi-user and multi-cloud settings of cloudcomputing.4. Based on the newly proposed high efficient identity-based aggregate signaturescheme in our dissertation, we construct a new efficient identity-based publicverification scheme for secure data cloud storage. In the scheme, the maintance ofusers’ key can be simplified further and computational and commnunication overheadscan be reduced.
Keywords/Search Tags:cloud computing, data integrity, public auditing, identity-based aggregatesignature
PDF Full Text Request
Related items