Font Size: a A A

Operational-Behavior-Log Auditing For Cloud Data Security

Posted on:2018-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ChenFull Text:PDF
GTID:2348330536972643Subject:Engineering / Computer Technology
Abstract/Summary:PDF Full Text Request
As an important branch of cloud computing,cloud storage enables individuals and enterprises to enjoy large-scale and distributed storage capability,which provides an efficient way for storage and management for massive data in big data era.It has become a main trend in the development of the future storage.In recent years,with the wide application of cloud storage services,cloud storage service not only brings a lot of convenience,but also many potential security threats.One of the biggest obstacles is a lack of mutual trust between the cloud service provider and users.As an effective mean to enhance the mutual trust between cloud service provider and users and to improve the quality of cloud services,secure auditing for operational behavior logs in cloud storage became a research hotspot in the field of cloud security.Thus,based on the traditional computer and network secure logging and auditing technologies for operational behavior log,this paper explores and puts forward several kinds of methods for operational behavior logs auditing in cloud storage environment.The main contributions of this paper can be summarized as follows:First,a novel third party public auditing model for operational behavior logs based on cloud storage environment is proposed.This model provides secure protection mechanism for audit of users' operational behavior logs,which solves the problem of privacy leaking during auditing process in cloud storage.Second,a secure Merkle hash tree based auditing scheme for operational behavior logs in cloud storage is proposed,in which the Merkle hash tree is employed as the data structure for log storage.The proof value can be generated from the Merkle hash tree for public verification to prevent manipulation from the attackers.The experiment results show that the method can avoid privacy leakage during the auditing process and has high auditing efficiency.Third,a secure BLS based auditing scheme for operational behavior logs in cloud storage is proposed,in which BLS signature is used to generate auditing tags for users' operation behaviors and random mask is introduced proof generation to prevent privacy leakage during the auditing process.Theory and experiment results show that the proposed scheme can provide stateless public auditing,selective auditing and error detection.Fourth,a secure certificateless auditing scheme for operational behavior logs in shared cloud is proposed,in which the basic idea is to use the certificateless key distribution mechanism to solve complex certificate management and user identity privacy protection issue.BLS signature and random mask technologies are also used to ensure the privacy security of operational behavior logs.
Keywords/Search Tags:Cloud storage, Public auditing, Operational-behavior, Privacy preserving, Secure logging
PDF Full Text Request
Related items