Font Size: a A A

Research On Modular Exponential Outsourcing In Cloud Computing

Posted on:2018-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z X TaoFull Text:PDF
GTID:2428330566453923Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Based on the development of internet technology and distributed technology,many researchers focused on cloud computing.Cloud computing provides the mobile service.The user could access the data and service in the resource pool via internet by way of payment,if it has not enough resource.Resource pool is the large-scale cluster,with the properties of high scalable,shareable,distributed,and adjustable.It is processed by virtualization.Cloud computing is used based on research pool,and it contains the cloud server.The user could access the cloud server without the constraint of time,place and fund.Meanwhile,the user could pay attention to the development of the new business,and need not deal with the routine maintenance and management work.However,in cloud computing,the data and service expose on the internet.The malicious attack and data corruption are inevitable.Therefore,secure outsourcing paradigm is critical to cloud computing.An efficient,reliable and flexible secure outsourcing paradigm is the key to the development of could computing.By using the secure outsourcing paradigm,the mutual information would not be exposed to the cloud computing service,when the user interacts with the resource pool.One or more services are provided by the cloud computing service.There are a variety of methods for constructing secure outsourcing paradigm,including special functions and general functions.In this paper,we study the existing secure outsourcing paradigm,and focus on the analysis of the application of the special function of the modular exponentiation.Modular exponentiation is the basic operation in cryptography,and it is widely used in cryptography.In the secure outsourcing paradigm,the modular exponentiation is calculated using one or more cloud servers to build a complete solution.At present,there are still many difficulties in the calculation of the modular exponentiation secure outsourcing paradigm.In this paper,based on the in-depth analysis,the following work has been carried out:(1)The paper proposes an improved fast single modular exponentiation secure outsourcing paradigm.It can be used to secure outsourcing with limited computation and strong computing power.The proposed paradigm could ensure that sensitive information is not exposed to the external server,and the user can detect the possible false behavior in the server.The proposed paradigm has the high efficiency of encryption / decryption process,and has good verifiability.On the basis of the fast single modular exponentiation secure outsourcing paradigm,an improved fast simultaneous double modular exponentiation secure outsourcing paradigm is proposed.It greatly reduces the computational cost of users,and this scheme has a high probability of being verified when encountering malicious deception.(2)This paper presents an improved fast blind modular exponentiation secure outsourcing paradigm.On the basis of the use of the fast modular exponentiation secure outsourcing paradigm of two servers,by using the blind processing,only one server's outsourcing is realized.In this paradigm,only one server can be used to achieve complete privacy,and a high rate of verifiability can be obtained.(3)This paper gives a complete and detailed analysis about the proposed modular exponentiation secure outsourcing paradigm.The correct,reliability,private,verifiable,efficient and safe properties are all analyzed.All the analysis prove the effectiveness of the proposed paradigm.
Keywords/Search Tags:Cloud computing, secure outsourcing, modular exponentiation
PDF Full Text Request
Related items