Font Size: a A A

Research On Efficient Traceable Data Sharing Scheme In Mobile Cloud Computing

Posted on:2018-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y WangFull Text:PDF
GTID:2348330518488063Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapidly development of information technology,the information exchange between different departments or regions is gradually increasing.The maturity of network and communication technology provides a guarantee for information transmission,so data sharing has become a trend.At the same time,intelligentize makes mobile terminals become a key entrance of many Internet services quickly,data sharing via mobile devices is becoming more and more popular.However,the limited resources(such as battery capacity,computing power and storage capacity)have been restricting the development of mobile devices.Moreover,the combination of mobile Internet and cloud computing prompts the rise of mobile cloud computing.In mobile cloud computing,mobile terminals can take advantage of the powerful computing and storage capacity of cloud computing to compensate for their own shortcomings.With the help of mobile cloud computing,intelligent terminal users can access and share the vast amounts of data stored in the cloud server in real time without being limited by their geographic locations.Therefore,the data sharing in the mobile cloud computing has attracted wide attention from academia and industry.Despite of its benefits,mobile cloud computing can also bring some security challenges.Firstly,since the cloud server is not fully trusted,the data should be encrypted before uploading to the cloud server to preserve privacy,however,the data sharing under ciphertext is a challenge,so it's an urgent to design a secure and efficient data sharing mechanism;Secondly,the shared data are stored in the cloud server,users lose physical control of them,so design a secure access control mechanism is a crucial means to ensure the security of the shared data;Finally,dishonest users may collusion under the drive of economic interests or some other reasons,which may do great harm to the data sharing system,so introduce traceable technology to a data sharing system is a key link to enhance the security of the shared mechanism.In this thesis,we mainly study the security and efficiency issues in data sharing under mobile cloud computing.The main contributions of this thesis are two folds:(1)We propose an efficient traceable data sharing scheme in mobile cloud computing.Compared with the traditional ones,our scheme adopts convergence encryption technique,with which we solved the problem that the leakage of the symmetric encryption key results in system crash,and it can be used under the environment of massive amounts of data;Our scheme is based on the Lagrange polynomial reconstruction technique to avoid the expensive bilinear pairing operation,which makes users' computation overhead reduced a lot,and is more suitable for the resource-constrained mobile devices;We exploit traitor tracing technique to achieve traceability,which can further enhance the security of our system.The main results have been accepted by the International Journal of High Performance Computing and Networking(EI source journal).(2)We use Android Studio and Samsung Galaxy S3 to carry on the simulation of our scheme.We have a detailed assessment of the scheme from the two aspects of security and efficiency,and then analyze the computational overhead of the mobile users,at last we compare our scheme with Shao et.al's scheme.The experimental results show that our scheme is efficient,and is more suitable for the resource-constrained mobile devices.
Keywords/Search Tags:Data Sharing, Mobile Cloud Computing, Convergent Encryption, Polynomial Reconstruction, Traitor Tracing
PDF Full Text Request
Related items