Font Size: a A A

Research Of Efficient Data Integrity Verification Mechanism On Cloud Computing

Posted on:2017-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:S Y WangFull Text:PDF
GTID:2308330485485113Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing, which is a new computing paradigm, has increasingly become a research focus in academia and industry. Cloud storage, one of the core services of cloud computing, is a developing trend for the future storage technologies, which can provide convenient and low-cost mass storage for cloud computing services. Therefore,more and more users demand cloud storage as their storage modes. When users’ personal data are stored in the cloud servers, the burden of local data storage can be greatly reduced. In addition, users can access the data stored in the cloud servers whenever and wherever.Due to the fact that users do not have the power to control their cloud data, they cannot guarantee that their data are correctly stored into the cloud servers. Therefore, to ensure the correctness of the users’ data stored in the cloud servers, we need to perform integrity verification for the cloud data. In this study, integrity verification schemes for cloud computing, proposed by domestic and foreign researchers, were systematically studied and summarized, and then we introduced the basics of integrity verification schemes, including system model, security model, data structures and common mathematical tools. Main lines of this thesis are:1) We have proposed a hierarchical auditing scheme for data storage in cloud computing with data dynamics by incorporating the idea of Merkle Hash Tree and bilinear pairings technology. Here, the basic block has been divided into a number of smaller blocks by utilizing the hierarchical index structures, and every leaf of the Merkle Hash Tree was associated with multiple blocks, reducing the length of the Merkle Hash Tree effectively. On one hand, the proposed scheme can meet the security demands of cloud storage services for data integrity; on the other hand, it can also guarantee user performing multi-granular dynamic operations. In addition, the communication costs of dynamic operations derived from the user and auditing operations derived from the auditor have been greatly reduced. Finally, security analysis and performance analysis showed that our proposed scheme is both secure and efficient.2) On the basis of theoretical research of existing proxy integrity verification, we have proposed a proxy auditing scheme for the cloud data with dynamics by incorporating the idea of Merkle Hash Tree and bilinear pairings technology. Theproposed scheme not only meets the security requirements of cloud storage services for data integrity, but also guarantees user performing the dynamics for the cloud data, such as inserting, deleting and appending. Finally, security analysis and performance analysis showed that our proposed scheme is both secure and efficient.3) We have designed a prototype system of integrity verification for cloud computing by utilizing the HDFS. Here, the system mainly consists of two components,data management and data integrity verification. Therefore, the system has met the function requirements, such as uploading, downloading, and deleting; moreover, it can also verify the integrity of the users’ data stored in the cloud servers. Finally, we have predicted that the designed system will play an important role in the commercialization of the integrity verification for cloud computing.
Keywords/Search Tags:auditing, cloud storage, dynamic operating, integrity verification
PDF Full Text Request
Related items