Font Size: a A A

The Research Of Verifiable And Searchable Encryption Scheme And Verifiable Data Streaming Scheme In Cloud Computing

Posted on:2019-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:P P HanFull Text:PDF
GTID:2428330542999820Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
With the development of information era,the amount of data people need to deal with is growing explosively.Now many people have no the ability to store these massive data locally and they choose the way of cloud storage.That is,they store data in the cloud and search them when there is a need.Cloud storage not only reduces the storage burden of data owner,but provides every data user with efficient remote database service.But there are some security problems in outsourced database of cloud,such as the privacy problem and integrity problem of stored data,the integrity problem of search result.These problems have become research hotspots of cloud computing security.To guarantee the confidentiality of outsourced data,people choose to encrypt data and upload them to the cloud.To achieve the search functionality of ciphertext,many searchable encryption schemes are proposed in succession.To verify the integrity of search result,many verifiable and searchable schemes are proposed in succession.These schemes can solve the outsourced storage problem of data in various degrees.Data can be divided into two types,bulk data and streaming data.Different data types have different schemes of outsourced storage correspondingly.This thesis for master degree researches the schemes of outsourced storage under these two data types respectively and introduces our work.For the outsourced storage of bulk data,this thesis for master degree proposes two outsourced database models which can achieve the confidentiality of outsourced data,verify the query integrity and protect the search privacy of data searcher effectively.These two models allow to perform exact select of one attribute and its union with projection,support the insert and delete of data.They have higher security properties and more functionalities compared with other existing such schemes under the premise of similar computation cost.In the light of streaming data,this thesis for master degree proposes a verifiable data streaming scheme based on minimum dynamic chameleon authentication tree.The data source in the scheme can append an arbitrary number of streaming data to outsourced database and modify them.The searcher can query and verify outsourced data.The proposed scheme has smaller cost of computation and storage compared with other similar schemes in the mass.The minimum dynamic chameleon authentication tree this thesis for master degree introduces has smaller cost of computation for data insert,verification and modification compared with other authentication trees.The scheme and authentication tree proposed satisfy corresponding requirements of security.Lastly,we summarize the already work and propose the future research work.
Keywords/Search Tags:cloud computing, search privacy, query integrity, streaming data, minimum dynamic chameleon authentication tree
PDF Full Text Request
Related items