Font Size: a A A

The Design And Analysis Of Data Integrity Checking And Public-Key Searchable Encryption For Cloud Computing

Posted on:2014-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:X T YanFull Text:PDF
GTID:2268330401976794Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Cloud computing is the focus of current information technology development. The main idea of cloud computing is to gather large number of hardware and software resources (such as servers, storage devices and applications, etc.), and then offer through the network dynamically. Relative to the self-built computing systems, cloud computing provides intensive, large-scale and specialized services, which has great advantage of performance and cost. So, the users can deal massive computing and data in real-time without lot of investment. However, due to the cloud environment, all of the data is uploaded to a remote cloud server, which is out of the physical control of owner and then cause a series of safety problems.This thesis mainly study the problem of integrity checking and public key searchable encryption for cloud computing security, and obtain the following results:1. Investigate the construction of integrity checking protocol for cloud computing based on special Message Authentication Function. By constructing a special Perfect Message Authentication Function and its equivalent function, we use synchronous verification value and the equivalent function to determine response message authentication value to detect integrity. Analysis results show that this new scheme can correctly check cloud file’s integrality with the difficulty of factoring large integer and only request constant computation, storage and constant network resource for the users, which is more computationally efficient than others’.2. Investigate the construction of integrity checking protocol for cloud computing based on hash tree. Firstly, based on hash tree and big integer operation, we proposed a new data structure, integrity checking tree. Then, we use this new structure to present a new interactive integrity checking protocol, which can check mass file’s integrality with less storage, compute and network resource. In addition, it also supports some data dynamic update.3. Investigate the construction of integrity checking protocol for cloud computing based on homomorphic encryption. Aim at improving compute efficiency and reducing communication of the original scheme, we proposed a new improvement remote integrity checking scheme. Analysis results show that this new scheme can check remote file’s integrality with the difficulty of factoring large integer and only request constant computation, storage and constant network resource for the users.4. Investigate the construction of public key searchable encryption for cloud computing without bilinear pairing. Based on the existing keywords searchable public key encryption, we present a new keywords-searchable public key encryption scheme without pairings. Then, we use this new encryption to propose a new interactive ciphertext retrieval protocol for cloud computing. Theoretical analysis and experimental results show that this new protocol can correctly search the ciphertext with keywords, satisfies indistinguishability against an adaptive chosen plaintext attack and the off-line keywords-guessing attack under the discrete logarithm assume and the decidability Diffile-Hellman assume and have an obvious advantages of efficiency compared to schemes which have the same security.
Keywords/Search Tags:Cloud computing, Data security, Remote Integrity checking, Keywords SearchablePublic Key Encryption, Provable Security
PDF Full Text Request
Related items