Font Size: a A A

Research On Data Integrity Verification And Data Recovery In Cloud Storage

Posted on:2015-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z PengFull Text:PDF
GTID:2298330467461812Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Today, the explosive growth of data poses great challenges to the capacity of data storage. Cloud storage, as an on-demand service which has no restrictions on the data size, meets the market demand greatly.Also it widespread concerned by the industry and academia. However, Cloud Storage not only makes the users enjoy the digital life, but also brings some great security challenges. Some significant problems, such as how to ensure that users’ data not stolen by illegal third party, how to recovery user’s data once it’s been destroyed or tampered, and how to make sure that user’s data is truly deleted when the users migrate their data or stop to use the service, have made a great obstacle for the further development of Cloud Storage.To solve the problems above, this paper puts forward a data recovery system in the context of Cloud Storage, which combines the fountain code with provable data possession. In the system, the users upload the encoded data by fountain code, the hash values of every data block, and the challenge-respond labels encrypted by AES function. Then, after upload successfully, the users performs immediately a challenge to the server to ensure the integrity of stored data. After that, the user can freely verify the integrity of data stored in the server, once the verification fails the server is asked to execute the data recovery. Compared with previous relevant schemes, our scheme presents a more efficient encoding method, and supports data update.
Keywords/Search Tags:Provable Data Possession, Data recovery, Fountain Code, Detectiontampering data, Cloud Storage
PDF Full Text Request
Related items