Font Size: a A A

Information Security And Privacy Research In Cloud Storage

Posted on:2016-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z P LuoFull Text:PDF
GTID:2308330470473735Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet technology, the amount of data is in the way of explosive growth and the traditional way of storage to manage data is more and more difficult. Therefore, companies began looking for better technology to maintain and manage data. In recent years cloud storage technology is developing quickly and it is well used in maintaining and managing data. More and more companies have started using cloud storage technology to manage and maintain enterprises’ data. Common users also choose to upload their own personal data to the cloud storage systems which are provided by some companies in order to solve the shortage of local storage space. Cloud storage system has convenient, low-cost advantages, but it also can make user’s data leak. User’s unencrypted data uploaded and stored in the cloud storage system, once the data leaks, it will inevitably lead to the disclosure of user’s privacy. In order to effectively protect enterprise users’ and common users’ data, to encrypt the data stored in the cloud became a natural choice. After data is encrypted, cloud storage system will lost the function like data retrieval and so on, making cloud storage system becomes a simple place to store data. In order to make cloud storage system with both privacy security and operability, this paper advances to apply the full homomorphic encryption algorithm to cloud storage system.Full homomorphic encryption technology is a powerful technology, which can make us do any operations on encrypted data, and the operations will be mapped to the corresponding plaintext. The operated result is still encrypted. Full homomorphic encryption technology can do homomorphic operations on the data. Using fully homomorphic encryption technology can pass the data in encrypted form to any untrusted server to compute ciphertext to ensure the security of data and information. Full homomorphic encryption algorithm has a very great potential, for example, the full homomorphic encryption algorithm can be used in cloud security, ciphertext information retrieval, network coding, query encryption with search engine, encrypted database and so on.Using homomorphic encryption algorithm we can statistical, analysis and retrieval on the encrypted data, and the processed results are also encrypted. Therefore, in order to balance the security and the service for the cloud storage, this paper will combine the homomorphic encryption technology and cloud storage technology together. By the study of the latest homomorphic encryption schemes, a full homomorphic encryption algorithm has been improved to make it be more suitable for building encrypted cloud storage system, so that the encrypted data stored in the cloud also can be operated by the encrypted cloud storage system. This paper’s main research work includes the following aspects:1 Analyze the cloud storage safety at the present stage, especially some existed risks and new challenges in the security. Then introduced the origin of full homomorphic encryption algorithm, results of the research, research status at the present stage and the application of full homomorphic encryption algorithm.2 On the basis of research and analysis full homomorphic encryption algorithm over the integer, two improved full homomorphic encryption algorithm are presented. Verify the homomorphic characteristic of the two improved full homomorphic encryption algorithm and design program demonstrates the encryption and decryption process of the full homomorphic encryption algorithm.3 On the basis of analysis full homomorphic algorithm, cloud storage security scheme based on full homomorphic encryption algorithm is presented, and a detailed design analysis is carried out for the scheme.
Keywords/Search Tags:Cloud storage, Cloud computing, Full homomorphic encryption, Security
PDF Full Text Request
Related items