Along with the popularity of the network,the scale of the data grows ecplosively,,the required costs of construction and maintenance in traditional data storage model also grow rapidly.As an extension and application of cloud computing,cloud storage technology can reduce the storage costs and provide the convenient,fast and flexible data services.These properties make cloud storage technology be paid more attentions.At a new stage of network development,the security and availability of data are widely concerned.The users store the data in the cloud storage provider for economizing the local costs,while they lose control of the data.In order to ensure that the data is not learned by cloud storage provider,the users will encrypt data locally before uploading to the cloud storage environment to ensure the confidentiality of the data.However,in this way,the users cannot guarantee the data integrity.Therefore,the users need a verification method to determine whether data is complete.Data should be integrate and available at the same time when stored in cloud and the searchable encryption technolegy solves the problem of encrypted data availability.In this paper,a new framework achieving data integrity and availability protection is proposed,which includes the two models and protocols.The specific research is described as follows:First,for requirement of searching over the encrypted data stored in cloud,a data integrity verification scheme with searchble encryption is proposed.In the scheme,the user verifies the data integrity before searching some files.After the verification,the user can directly obtain the data;for all the data stored on cloud storage provider,the user authorizes the neutral third party to works on verifying data integrity,then the data security is improved;in order to improve the efficiency of verification in the scheme,the bilinear pair mapping is used to reduce the computation overhead;the scheme introduces the time variable and determines the time of the integrity evidence generation through the time parameter.Second,adopting a new role to complete the data integrity verification,a verification framework is provided,which can optimize the functions of all roles in system.The new framework constructs an application environment where can add trusted server.The trusted server distributes and keeps secret keys for all the users and returns the secret keys according to different requirations.In this scenario,the local trusted server is regard as user proxy which is in charge of integrity verification of all user data and the search results. |