Font Size: a A A

Study Of Outsourced Data Integrity Verification In Cloud Computing

Posted on:2014-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y C LinFull Text:PDF
GTID:2298330392964014Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Though cloud computing is a good platform for data outsourcing, it brings a seriesof challenges in data security since the cloud environment is untrusted. In order toprotect the integrity of outsourced data from being altered or deleted maliciously, it isnecessary to establish a safe data integrity verification mechanism. Verifyingoutsourced data integrity in cloud computing environment has bright applicationfuture.In the light of the technology of verifying outsourced data integrity in cloudcomputing environment, the main contributions of this paper are as follows:By analyzing the BADSSL scheme, pointing out there are some security risks inthat scheme. According to the hierarchical relationship of skip list, a newauthentication data structure Verifiable Tower based Skip List is designed, which canbe construction and update easily. With this new authentication data structure, acomplete verification scheme for outsourced data integrity is proposed andimplemented. Performance analysis and experimental results show that it overcome thesecurity risks in the BADSSL, also reduce the computation and the running time bothserver and client efficiently.Most of the existing authentication data structure only suit for one-dimensionaldata verification. In order to verify the integrity of multi-dimensional data, Verifiablek-dimensional Skip List is designed. The new multi-dimensional authentication datastructure breaks the limitation of only suit for one-dimensional data verifying, and canbe construction and update easily. With this new multi-dimensional authentication datastructure, a complete outsourced data integrity authentication scheme is proposed andimplemented. Performance analysis and experimental results show that it is moreeffective than VKDtree, which spends less running time and takes less computation.With the two authenticated skip list above, a distributed data integrity verificationprototype system in the cloud computing environment is designed. The prototypesystem is implemented base on the open source database HBase under Hadoop. Thesystem runs properly which demonstrates that the scheme is efficient and feasible.
Keywords/Search Tags:authenticated skip list, query verification, multi-dimensional dataverification, database outsourcing, cloud computing
PDF Full Text Request
Related items