Font Size: a A A

Research On Big Data Audit Protocols That Support Privacy Protection

Posted on:2018-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhaoFull Text:PDF
GTID:2358330542478330Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of big data,it's value appears gradually on the development of human society.In order to store the big data,it uses the cloud storage services by cloud computing.But,as for big data,it is not necessarily safe if it is stored in cloud storage services,it may be subject to various types of attacks,as a result,the information of big data may be leaked.The most important issue is that how to keep the data safety on the cloud storage services,and make sure that it is not be tampered.The easiest way to check the integrity of data integrity is to download the entire data and check it.However,due to the data characteristics of large data,it is unrealistic and feasible to download the entire data file,so a data integrity audit protocol is proposed.There are still a lot of shortcomings in the current data integrity audit protocol.This paper further explores the method of large data audit protocol in cloud storage environment,mainly from the following aspects:(1)Dynamic update of single-copy integrity verification:This article has improved the audit protocol for the integrity of cloud storage data in a large data environment by using random values and hash functions to ensure that the proposed single copy.The data integrity protocol protects the privacy of user data at the cloud storage server(CSP)and the third party audit organization(TPA),and uses the MHT to enable users to dynamically manipulate the data.In addition,the agreement is secure and can resist tamper attacks and lost attacks.(2)Dynamic update of multi-replicas integrity verification.Based on the Barsoum algorithm to improve the program,it not only support the integrity of the data validation and public audit,but also support the user dynamic updates to data.Through the random value and hash function to ensure that the cloud storage server and third-party audit institutions will not disclose the privacy of user data.At the same time,the structure of multi-replicas merkle hash tree was completed by improved MHT,and it was used to support the dynamic updating of user data.In addition,the proposed algorithm for multi-replica integrity verification is secure,and the proposed can resist conspiracy attacks,loss attacks,and tamper attacks.(3)Through the experimental results show that,in this paper,compare the improved single copy and multi-replicas integrity dynamic update strategy with the traditional strategy,the computing and privacy protection effect have been improved.
Keywords/Search Tags:Provable Data Possession, PDP, MHT, Privacy Preserving, Multiple replicas
PDF Full Text Request
Related items