Font Size: a A A

Research Of Data Integrity Verification Technology In Cloud Storage

Posted on:2018-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:H LuoFull Text:PDF
GTID:2348330512988998Subject:Engineering
Abstract/Summary:PDF Full Text Request
Clients lose their physical control about the file when they submit the file to cloud storage because the cloud storage server is out of their range.Cloud storage servers are often attacked by hackers because cloud storage servers contain much valuable data and many valuable files,and cloud storage servers can be access from Internet usually.It's necessary to verify the integrity of files that store in cloud storage servers.The verifier must control the whole file physically if verifier uses the traditional integrity checking technology to verify the integrity of files that store in cloud.It will lead expensive I/O cost and network bandwidth cost.The researches about file integrity checking in cloud storage environment recently usually base on the traditional data integrity checking technologies to propose data integrity checking protocols.Those protocols have some shortcomings such as inefficiency or can`t support dynamic operation.A data integrity protocol is proposed based on the research recently to overcome the shortcomings mentioned above.This protocol is more practicable.The main innovations are:1.A data structure based on skip lists that can be used for data integrity checking is proposedA data structure(ACSL)can be used for integrity checking is proposed.It is based on skip lists and Merkel Hash Tree.This data structure can insert or delete nodes efficiently.There is no stationary relationship between nodes of ACSL,and use reachable count to replace index so ACSL can solve the problem about node insertion and deletion with high efficiency.2.A data integrity checking protocol for cloud storage systems that can support public verification is proposedThe Dynamic Data Integrity Verifying(DDIV)protocol based on ACSL is proposed.DDIV can check the integrity of files that store in cloud storage servers efficiently and execute dynamic operations efficiently.The DDIV use Asymmetric Encryption to sign the key information so every file readers can verify the integrity of file without the Third-Party Auditot(TPA).DDIV can remove one of the performance bottlenecks compared to some protocols that support public verification.
Keywords/Search Tags:Cloud storage, Integrity checking, Dynamic operation, Security protocol
PDF Full Text Request
Related items