Font Size: a A A

Research On Data Integrity Verification In Cloud Storage

Posted on:2018-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y P ZhangFull Text:PDF
GTID:2348330518488055Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In the information era,how to store mass growth data has become a headache for many users,but the cloud computing paradigm provides users with a feasible and inexpensive way of storage and computing.As an extension model of cloud computing,the cloud storage has the skill of remote storage data,and this new storage paradigm has been widely used.More and more users upload their larger data files on the cloud storage servers to reduce the local storage requirement.With the advantage of cloud storage development,the security of cloud storage also has been the hot issue of people.Especially in cloud storage,when the users lose the possession of the data,malicious attackers and unsecured cloud service providers are the major security issues that cause the corruption of users' data.Therefore,in order to solve this security problem,many researchers proposed the data integrity verification method.The works done in this paper are as follows.1.A new data integrity verification scheme against active attack.Inability to resist active attacks against Sookhak et al.'s methods,our improved method in this paper introduces MD5 hash function to make the data not easily tempered in the transmission process.At the same time,in order to prevent unsafe cloud service providers forging proof information,the improved method guarantees the generation of proof information completed by users and cloud service providers.In order to improve the dynamic update data capability,our method improves the Divide and Conquer Table in the original scheme to Divide and Conquer Link,which can greatly reduce the calculation pressure of the cloud server.Our method still uses the original scheme label generation method to generate shorter labels,which can help users reduce the pressure of local storage data.Therefore,our improved scheme completes the dynamic data integrity verification,not only ensures the efficiency that is not reduced,but also improves the security of the original scheme,and the ability of dynamic update data.2.A new data integrity verification scheme completed by a third party.Although many validation implementations with labels complete the dynamic data integrity verification,the first process of creating tags for data blocks gives users some degree of computational pressure,which is the efficiency issues in many existing schemes.Aiming at the problem of efficiency,our improved method in this paper introduces the third party to replace users to achieve the generation of tags,thereby reducing the computational pressure of users,and the method still uses the signature generation method with algebraic properties to reduce the pressure of the third party storage data.In the improved method,the user encrypts the original file to ensure the data privacy,so that the trusted third party can not involve the user's privacy data,thereby ensuring the security of user's data.At the same time,the improved method introduces bilinear map properties to do the last verification,which improves the security of the method to some extent.Therefore,our improved method in this paper further reduces the computational pressure of users under the premise of efficient completion of dynamic data integrity verification.
Keywords/Search Tags:cloud storage, data integrity, hash function, algebraic property tag, third party, bilinear map
PDF Full Text Request
Related items