Font Size: a A A

Research On Data Integrity Verification In Cloud Computing Environment

Posted on:2018-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:J J FengFull Text:PDF
GTID:2348330536988343Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the continuous development of cloud storage,cloud storage security issues gradually,a perfect data integrity checking protocol can effectively improve the security of cloud storage,and a reliable accountability mechanism can improve the reliability of cloud platform.This paper studies efficient data integrity detection protocols and security accountability protocols.Specifically,the main contents can be summarized as the following three aspects:(1)We design a data integrity verification protocol which supports dynamic operations.The protocol can detect effectively the integrity of the stored data in the cloud server by hash function,which makes the detectors to detect the integrity of the latest data when users update the data.The protocol improves the practical application.Our security analysis proves the feasibility and security of the protocol,and shows that the proposed scheme has lower communication and computation cost.(2)We propose a scheme to verify the integrity of data by using the properties of homomorphism.This scheme can support public verification and privacy protection which previous schemes do not support.Our scheme also support trusted third party verification.Compared with the existed schemes,our scheme only needs small amount of computation,communication and storage.(3)We build an agreement to support accountability.We can investigate the responsibility of the faulty parties by credential mechanisms and the participation of trusted third parties after users detect the fault data.At the same time,under the encryption and trusted third party access control mechanism conditions,we can ensure data privacy security.Based on the protection of users privacy,the proposed scheme can investigate the fault of the party.
Keywords/Search Tags:Cloud storage, Data security, Provable data possession, Security accountability
PDF Full Text Request
Related items