Font Size: a A A

Query Integrity Assurance For Encrypted Data On The Cloud

Posted on:2015-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhaoFull Text:PDF
GTID:2298330431462516Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The large scale of data storage and computation tasks stimulate the advent of cloudcomputing, and its security issues are attracting increasingly public attentions. Foroutsource data, especially data in cloud storage systems, the security problems appeal tobe more significant. There are some distinctive aspects for oursource data security, suchas cryptography, distributed storage, query and assurance. Five properties are covered inthis paper, listed as confidentiality, freshness, correctness, completeness and queryintegrity. Query integrity is a new property, refering to whether the cloud sever canfaithfully return the query data. The main contents are presented as follows:(1) We introduce the framework of query assurance system, which is divided intothe user part and the cloud sever provider part. The comparison between authenticatedverification and probabilistic verification is proposed and we select authenticatedverification to complete our work. We also explain five properties–confidentiality,freshness, correctness, completeness and query integrity–and propose the most feasiblesolution. Finally, by analyzing query assurance procedure, we suggest another efficientmethod.(2) We further our study on point query integrity, range query integrity andmulti-attribute query integrity. The study on point query integrity focuses on fouraspects as confidentiality, freshness, correctness and query integrity. Differences ofquery methods in range query bring up to different frameworks of leaf nodes, andfurther leads to the speciality in these five properties. The multi-attribute query is fromattribute trees and range query integrity. However, it processes five properties in eachattibute tree respectively, especially in the fields of the authentication of correctness andcompleteness. Finally, we summarize our work, and point out direction of our study.
Keywords/Search Tags:Cloud Computing, Query Assurance, Query Integrity
PDF Full Text Request
Related items