Font Size: a A A

Study Of Outsourced Data Query Authentication Technology In Cloud Computing

Posted on:2016-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhouFull Text:PDF
GTID:2308330479489212Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing, it provides us with an open,on-demand services, scalable application platform and business model. Without the burden of local data storage an maintenance, users can store data in remote Cloud Server and enjoy high quality service. So it brings convenience and benefit to people.However, Cloud Service Provider is not fully trusted and it may distort, delete, add original data for some purposes. These bring new security challenges. So a reliable mechanism used for an efficient outsourced data query authentication in cloud computing is needed to ensure the integrity of query authentication.This thesis focuses on the study of outsourced data query authentication technology in Cloud Computing. By analyzing Papamanthou’s scheme, we point out it’s limited to single discrete query authentication with a great communication overhead between Cloud Server and Users. We propose a scheme for outsourced data query authentication in Cloud Computing. It not only support single discrete query authentication but also support accumulative discrete query authentication and range queries authentication.Security analysis shows, under Computational q-BSDH Assumption, the proposed scheme can provides Authenticity and Completeness of query authentication.Performance analysis and experiments show, compared with some existing schemes,the proposed scheme can reduces data storage space, reduces the amount of communication overhead between Cloud Server and Users.Based on the proposed outsourced data query authentication scheme, by using Hadoop, Zookeeper and HBase distributed clusters simulation environment, we designed and implemented a specific distributed outsourced data query authentication system, and demonstrates that the scheme is efficient and feasible.
Keywords/Search Tags:Bilinear-Map Accumulator Tree, Query Authentication, Cloud Computing, Outsourced Data
PDF Full Text Request
Related items