Font Size: a A A

Reseach And Application On Key Technologies Of User Data’s Privacy Protecting In Cloud

Posted on:2015-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhangFull Text:PDF
GTID:2308330473952974Subject:Information security
Abstract/Summary:PDF Full Text Request
With development of Internet and related technologies, people began to the find a method to realize resource sharing by Internet. Cloud computing is a popular computing method realizing resource sharing in IT world recent years. However, cloud computing faces enormous challenges from security in providing users with convenient computing and storage resources. Cloud computing has been put forward a few years, still made hundreds of security incidents. Several incidents in them have influenced worldwide network security.Confidentiality is a major requirement in the five basic elements of information security. Privacy protection of user data is an important branch of information confidentiality research. Internet advocates openness and sharing. But with the Internet more and more deep in people’s lives, it inevitably lead to the disclosure of user privacy. Cloud computing is a way of computing based on Internet. So it also has privacy protection problems. In cloud computing, users not only store data completely in cloud, but also make the whole computing progress in cloud. That lead to privacy protection in cloud computing has a more severe situation and stringent requirements than traditional web applications. Privacy protection has been one of main obstacles to the cloud computing development. Only with the problem of privacy protection being solved, cloud computing will be widely developed and applied.Our work focuses on solving the problem of user data’s privacy protection in the cloud. Mai work of this paper is as follows. Firstly we study the key technologies of privacy protection, like access control and cryptograph retrieval technology. On the basis of previous research, this paper propose a discretionary access control schema for cloud computing. This schema solves the problem that data owners, data users and data storage are separated in cloud. It also solves the problem of offline authorization. Then a privacy-preserving multi-keyword ranked search algorithm for dynamic data is proposed. This algorithm achieves the security cryptograph ranked search with nondisclosure of user privacy. In the end we provide a user data privacy-preserving framework for cloud computing. And realize a prototype system on the basis of the above research work. The prototype system validates practical effect of this paper’s research work on user data’s privacy protecting in cloud.This paper proposes a access control schema for cloud computing, a privacy-preserving multi-keyword ranked search algorithm and a privacy protection system architecture based on a secure proxy. Those work realizes users’ discretionary access control for the three parties in cloud. The work make user get an accurate cryptograph ranked search under a small loss of performance. Also protects data privacy from cloud service providers or attacker, and greatly reduces the local computation of users and third-party applications.
Keywords/Search Tags:cloud computing, privacy protection, access control, cryptograph search
PDF Full Text Request
Related items