Font Size: a A A

Research On Security Verification Mechanism Of Data Storage Location In Cloud Computing

Posted on:2018-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:S J DuFull Text:PDF
GTID:2348330518999450Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing and cloud storage,cloud storage brings convenience to users,but also brings serious challenges to the data security.In the cloud computing environment,the data are stored in the cloud without control.Cloud storage service providers in order to reap greater benefits,may be illegally transfer the data to the storage device located on the illegal location,even distort or remove the data in order to save the storage cost.The user must periodically verify the data location and check the data integrity.The present data location verification scheme without considering the adversary collusion attack cannot verify the cloud storage server's location and cannot provide the location authentication service in cryptology security.The data location verification mechanism in cloud computing is discussed in this paper.Firstly,the system model of data location verification is given,the security threats are analyzed and the security definition is formalized.Then,the security positioning protocol is combined with the provable data possession protocol and the data location verification protocol in one dimension is proposed.Based on the proposed protocol,the data location verification protocol in d(1?d?3)dimensions is constructed.Thirdly,according to the security definition and the security requirements,the theorem is given and the security of the proposed scheme is proved by the provable security theory.Finally,in three dimensions,the proposed protocol is tested and compared with the Lost protocol and the Geoproof protocol.The results show the proposed protocol based on the security positioning technology can verify the specific geographical location of the server,defend collusion attack of the adversaries and provide the location authentication service in cryptology security.
Keywords/Search Tags:Cloud computing, Position-based cryptography, Security positioning, Collusion attack, Data location verification, Data integrity check
PDF Full Text Request
Related items