Font Size: a A A

Research On Identity-based Data Auditing Technology In Cloud Computing

Posted on:2018-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:K QianFull Text:PDF
GTID:2348330521950251Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing and big data technology,more and more individuals and businesses choose to store their data on the cloud server.With cloud stor-age service,resource-constrained users can acquire huge storage space and professional data management in a pay-as-you-go manner.However,due to the separation of ownership and management of data and the cloud server being not fully trusted,cloud storage faces many new security challenges inevitably,like the outsourced data being tampered with deliber-ately,deleted or lost and so on.Although provable data possession technique enables the data owners to verify the integrity of remote data without the need of downloading the entire data,most of the existing constructions suffer from the issue of complex certificate manage-ment based on public key infrastructure(PKI).Recently,identity-based remote data integrity checking has attracted considerable interest.A trusted key distribution center(KGC)gen-erates a secret key for each user corresponding to his identity,and alleviates the burden of user's certificate validation and management.However,consider that the data auditor is not fully trusted in cloud computing,it may execute only a fraction of data audit task and/or re-turn an incorrect result of it in order to save its computation or communication cost.In order to solve these problems,we study existing data auditing schemes and propose an identity-based public auditing against malicious auditor scheme based on the special property of Bitcoin block.The main result has been accepted by the international journal International Journal of Embedded Systems(El source journal).The main contributions of this thesis are as follows:(1)We analyze the existing data auditing schemes in detail and compare their advantages and disadvantages.We propose an identity-based public auditing scheme against malicious auditor in the cloud,which can solve the problem of key management and reduce computa-tion cost of auditor.Besides,based on the special property of Bitcoin block,the scheme can prevent the attack from the malicious auditor.(2)We analyze the security and efficiency of our scheme.We prove that the proposed scheme can ensure correctness and resist forge attack,replace attack and malicious audit attack.We point out our scheme advantages compared with the existing schemes.Finally,we realize our algorithm by using J-pairing-based cryptography(JPBC)library and adopt B/S model.
Keywords/Search Tags:Cloud storage, Remote data auditing, Provable data possession(PDP), Identitybased cryptography
PDF Full Text Request
Related items