Font Size: a A A

Research On De-duplication Mechanism In Secure Cloud Storage

Posted on:2016-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y WangFull Text:PDF
GTID:2308330473965513Subject:Information security
Abstract/Summary:PDF Full Text Request
With the powerful computing and storage capacity, cloud storage provide users with convenient and low-cost storage business. Typically, there is a lot of duplicate data in the cloud storage system with many users, so the de-duplication becomes an important direction in cloud storage studies. It can effectively improve the utilization of storage space and system performance, but it also brings problem of data security and user privacy. Normal encryption methods have confliction with deduplication, and some scholars have proposed convergent encryption to resolve the conflict, however, this method has semantic security problem. In addition, cloud storage is generally considered to be semi-credible, because of its possible usage of user data and disclosure of privacy.To solve the above problem, we present a new cloud storage based de-duplication mechanism, which uses security proxy and random storage strategy to separate storage services and security services. In this way, we can solve the conflict between de-duplication and data encryption, and prevent the illegal use of user data and privacy. As for the fingerprint database closely related to the user data, we use CP-ABE scheme to prevent the unauthorized access. Additionally, we use sourcebased de-duplication and load-balancing technology to optimize system performance, which improves bandwidth utilization and data access speed.
Keywords/Search Tags:Cloud Storage, De-duplication, Convergent Encryption, Security Proxy, Attribute-based Encryption
PDF Full Text Request
Related items