Font Size: a A A

Research On Group Key Management Scheme And Its Application In Cloud Storage

Posted on:2015-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:M DuFull Text:PDF
GTID:2298330431959945Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Since most group applications take place over the suspect and wide-open network,the the realization of communication of confidentiality, data integrity andnon-repudiation is a vital topic. The fundamental guarantee of the realization the threesecurity service is the safety of the secret key in the modern password system andagreement. We hope to establish safe communications subject which should be able torun safe agreement among the group members. At the same time, the group in thenetwork can easily get access to networks by attacker. Identity authentication isnecessary to prevent unauthorized and illegal users getting access to network. ThisReport focuses on identity authentication and secret key management technology and itsapplication in the Cloud Storage. Paper main research works are as follows:(1) Brifly introdueed the researeh work about the group key management. Then weclassified existing key management schemes, among which, the three typical schemesare compared and analyzed, and the problems in existing schemes are also given.Finally, aiming at its application environment, the security requirements of cloudstorage are described.(2) It is necessary to protect the identity information to initiator under theenvironment of group communication. A scheme was proposed based on ECCencryption algorithm and hash function to realize bidirectional authentication process.The security of this scheme was analyzed finally. The scheme is more secure than theformer schemes and can protect the privacy of users and non-repudiation, and has lowercomputational cost.(3) Based on the Paillier homomorphic cryptography system, we present a safe andeffective homomorphism key management scheme, and focused on the key updatemechanisms when the group member joined or left. The homomorphism operations onthe ciphertext improve the efficiency of renewing the group key when the externalnodes join the group and the internal members leave the group. The security andcorrectness of our scheme are discussed in this paper. Compared with other approaches,this new scheme has less interaction frequency, a smaller communication and memorycost and a stronger security.(4) Using the identity authentication and the Key agreement technology, wedeveloped the secure cloud storage system, which guarantees the security of user data. Itcomprehensively tested the function and safety, which designed based on the secure cloud storage system.
Keywords/Search Tags:Group Key Management, Homomorphism, Authentication Protocol, Secure Cloud Storage
PDF Full Text Request
Related items