Font Size: a A A

Research On Trust-based Self-destructing Scheme In Cloud Computing

Posted on:2016-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:S C WuFull Text:PDF
GTID:2308330464458752Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the deepening of the study in cloud computing, cloud storage concept is gradually accepted by people and widely applied. Cloud storage is known by that its scalable storage space, the data access speed and low price. With cloud storage services are becoming diversified, more and more users want to make their data can be readable only in authorized time, which data are outsourcing to the cloud storage.However, the security problems restrict the development of the cloud storage mode, especially the data leakage after authorization time. Due to the uncertainty delete of data provide by cloud storage service, users are worried about their outsourcing data security. The new attack and increasingly frequent emerge let fear intensified. The purpose of this paper is to design a set of efficient, reliable self-destruction mechanism in cloud computing.Based on the previous research, we design Trust-based Self-destructing Scheme in Cloud Computing(TSS). The core idea of TSS is: privacy content owner encrypt data in the local, then store the mixture ciphertext components in DHT network. When privacy data’s authorized access time expires, without any third party participation and control case, DHT network remove the mixture ciphertext components, which can make the data storage in cloud is unreadable. This is the data destruction process.Compared with the previous research scholars on the self-destructing mechanism in cloud computing, this paper has the following technical innovation:(1) In this paper, we built frame without any trusted third party. In other words, we assume that any third party is not credible. we use key derivation tree to generate and manage keys and DTrust to select DHT nodes which are more believable. When privacy data’s authorized access time expires, DHT network can automatically delete the mixed ciphertext components, to achieve data destruction.(2) In this paper, we establish a trust mechanism for DHT(DHT Node Trust,DTrust). In order to solve the unbelievable problem of DHT nodes, we built DTrust mechanism. The mechanism build a global trust model, calculate the trust values of nodes. In the process of trust value calculation, we introduce the concept of feedback trust to make trust value more accurate. The trust mechanism prevent the mixture ciphertext shares unreadable effectively, which lead by private data storing in unbelievable network nodes.Finally, we verify the feasibility of the system by simulation experiment and compared with traditional mechanism for data self-destructing. The experimental results show that, compared with the previous schemes, TSS is better in safety of the system, the mixed ciphertext components availability, resisting malicious attacks, although TSS reduced the time efficiency in encryption and nodes selecting.
Keywords/Search Tags:Self-destructing Scheme, Trust mechanism, DHT, key derivation tree
PDF Full Text Request
Related items