Font Size: a A A

Research And Implementation Of The Privacy Protection Method For Tenants In Cloud Environment

Posted on:2013-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y GuFull Text:PDF
GTID:2308330482468163Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In 21st century, Cloud computing is a great revolution in the field of Internet world. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). Cloud computing brings high quality and low cost services to tenants, but it also poses pressing challenge to the security and privacy protection of tenants’ data. Tenants privacy problem is one of the most important factors to the development of cloud computing. In cloud environment, tenants submit the data and computing tasks to the global servers, thus the data are out of control. It not only faces with the traditional privacy threats, but also faces with cloud service provider to tenants’ data. Traditional data security protection technology cannot fully adapt to the cloud environment application. Now there are more and more researches on tenants’data security protection in the cloud environment. However, there isn’t an effective feasible technical scheme for data protection in cloud environment because of the diversity of threat and uncertainty of threat sources. In this paper, we study the data security and privacy leakage threats in the cloud environment. By improving the traditional privacy protection technology such as t-closeness, Rijndael, private information retrieval protocol, we design a third party data security protection model.Our main work and contributions are as follows:1. Through searching on adaptable vertical partitioning algorithm, we design an adaptable vertical partitioning algorithm based on privacy constraint. It splits the data before uploading to the cloud data center and keep high efficiency;2. We study the method of setting the security level for fragments, and use data confusion or data encryption technology to protect the data. Through the implementation of difference technology on data improving the data processing ability;3. We modify the computable private information retrieval protocol. With the help of a keywords index table, we realize a private information retrieval algorithm that is a scheme for keyword search in cloud computing. It is privacy-preserving against a curious cloud provider and ensures data security during the searching process;4. With the above algorithms, we design a third party data security protection model to provide the data upload and data retrieval service for tenants.Through the experiment validation, this model can meet the tenant’s data security protection requirements, and has a good system performance.
Keywords/Search Tags:cloud computing, data privacy, vertical partitioning, security level, private information retrieval
PDF Full Text Request
Related items