Font Size: a A A

Research On Outsourcing Storage Data Integrity Audit In Cloud Computing

Posted on:2018-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:W T ShenFull Text:PDF
GTID:2358330533962058Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud storage is becoming more and more popular because of its elasticity and pay-as-you-go storage service manner.However,the data stored in the cloud might be lost or corrupted due to the inevitable hardware/software failures and human errors,which makes it is very necessary to check the integrity of data stored in the cloud.In order to achieve this security goal,the concept of cloud storage data integrity auditing is proposed.Cloud storage data integrity auditing is an effective security mechanism which can help user to check the integrity of the data stored in the cloud.Aiming at a number of problems in the current schemes of cloud storage data integrity auditing,in this thesis,we propose the following three schemes with novel properties:(1)We propose the first scheme that enables cloud storage integrity checking for shared data with private key-recovery ability.In our scheme,when a group user's private key is unavailable,we can recover this user's private key with the help of t or more users in the group.At the same time,we design a random masking technology to guarantee the security of participating members' private keys.The user can also verify the correctness of the recovered private key.(2)We propose a novel public auditing scheme for shared cloud data in this thesis.Different from previous scheme,in our scheme,once the user in the group is revoked,then this user cannot any longer access the shared cloud data belonging to this group.To preserve data privacy and identity privacy,we propose a new random masking technique Furthermore,our scheme supports group dynamic(enroll a new group user and revoke an old group user)and batch auditing.(3)We propose a public cloud storage data integrity auditing scheme with lightweight authenticator generation.In this scheme,we introduce a new entity named as Authenticators generation center(AGC)to generate data authenticators for users.To reduce the computation burden at user side,in this scheme,the work of verifying the correctness of the authenticators generated by the AGC is completed by the cloud.In addition,our scheme can preserve data privacy.In conclusion,we summarize the achievement of this thesis and discuss the future research on cloud storage security.
Keywords/Search Tags:cloud storage, data integrity auditing, private key recovery, data privacy, batch auditing
PDF Full Text Request
Related items