Font Size: a A A

Research And Implementation Of Data Assured Deletion In Cloud Storage

Posted on:2019-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ChenFull Text:PDF
GTID:2348330545455607Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of cloud computing technology,more and more users choose to upload personal data to the cloud for data storage in order to reduce costs.However,cloud storage brings convenience to the majority of users,it also poses some security risks.On the one hand,data is outsourced to the cloud,resulting in the separation of data's ownership and management;On the other hand,the cloud service provider is not credible,so it exists possibility of active or passive leakage of user data.As a result,users have some mistrust in the security of storing data in the cloud.When a user initiates a delete request,the cloud service provider can not guarantee that he has deleted the user's data and all its copies immediately.Once the attacker gets the key,the stored data which has not been deleted will no longer be safe.This paper focuses on the method of data assured deletion in cloud storage.Firstly,the existing methods for both national and international are analyzed.Then,a method of data assured deletion based on bit stream transformation and information hiding technique is proposed.Moreover,a system is designed and implemented based on this method.The main work of this paper is as follows:Firstly,this paper analyzes the key issues that the deletion of the key in the current scheme is not immediate,the cloud storage cipher text is complete,the security assumption is too ideal and so on.Next,an algorithm of bit stream transformation based on one-dimensional Logistic model is proposed.Secondly,a new cloud data assured deletion based on bit stream transformation and information hiding technology is proposed.The proposed scheme does not introduce any other third-party regulatory agency in order to avoid other potential security risks.In addition,the cloud storage cipher text is not complete.Even if the key is inadvertently leaked,this scheme can still guarantee the user data security.And it can ensure that the user data deletion is real-time.The security of the proposed scheme is analyzed and proved.The parameters of proposed scheme and the consumption of time performance are also verified through experimental tests.Compared with other schemes,the experimental results have achieved the expected results.Finally,a system is designed and implemented based on the proposed method.The technical methods used in each module are analyzed and described in detail.
Keywords/Search Tags:Assured deletion, Bit stream transformation, Chaos Sequence, Information hiding
PDF Full Text Request
Related items