Font Size: a A A

The Research Of Privacy Protection Method Oriented Cloud Environment

Posted on:2015-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:R LiFull Text:PDF
GTID:2298330452468095Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the growth of information network, cloud computing is becoming more andmore popular. Consequently, cloud security events are emerging in endless stream,which pose a serious threat to the privacy safety of the user data in the cloudingcomputing. In order to improve the reliability of cloud computing services and preventmalicious activities like malicious attacks, combined attacks, unauthorized access, datatampering and information stealing from happening, the effective methods must be usedto protect user’s privacy. Enterprises or individuals should consider two aspects whenthey use cloud computing services:(1) through perfecting management mechanism anddeployment mechanism of cloud computing source pool to improve the reliability andusability of cloud computing services;(2)strengthening the protection of data privacy inthe cloud to improve the confidentiality of data privacy and to reinforce the safety ofcloud computing system. This paper is focused on the protection methods of the dataprivacy.The main contents of the paper are as follows:(1) In this paper, we study user-privilege management strategy and improve thealgorithm of Ciphertext-Policy Attribute-Based Encryption. The clustering algorithmhas been used to classify the user attributes according to different tasks in this paper.The user privileged access management is implemented by matching the attributes of task group and privilege management strategy. We also propose an access controlpolicy based on Multi-Tenancy authorized management.(2) From the perspective of security storage, the confusion theory is used in cloudstorage in this paper, The confusion relationship among the user’s privacy data slices toensure storage security for the user data. The cloud storage model is built based onconfusion theory and the feasibility of the model is proven through analysis andexperiments.(3) An access control policy based on Multi-Tenancy authorized management aspresented in this paper is built, and the core algorithm of this model is implemented invirtual environment. The security of model and efficiency of system access are proventhrough logical deduction and simulation experiments.
Keywords/Search Tags:Cloud service, Confusion theory, Cloud storage, CP-ABE, Authorizationmanagement
PDF Full Text Request
Related items