Font Size: a A A

Research On Data Integrity Verification In Cloud Storage

Posted on:2019-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:K LuFull Text:PDF
GTID:2428330572952045Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Cloud storage is an increasingly popular application which can provide outsourcing data services for both organizations and individuals.However,users may not trust the cloud storage provides in that it is difficult to determine whether the cloud storage provides meet their expectations for security.Therefore,it is critical to develop efficient verification techniques to strengthen users' trust and confidence in cloud storage.Nowadays,researchers have put forward many solutions to solve the problem of data integrity verification in cloud storage,but the schemes still have drawbacks in the security and performance.This paper has finished the following researches on how to achieve secure and efficient data integrity verification.1.This paper presents a public data integrity verification scheme based on the algebraic signature and elliptic curve.we utilize algebraic signatures to calculate data tags and combine the elliptic curve and algebraic signatures to achieve integrity verification.In addition,the combination of the elliptic curve and algebraic signatures can effectively prevent a malicious cloud storage server from the forgery attack,replacement attack,and replay attack.We design a new data structure——Divide and Conquer Hash List.It combines the advantages of divide and conquer hash table and linked list to reduce the various costs of data updating,thereby improving the efficiency of data updating.In order to further improve the verifying efficiency of the third party auditor,we extend our scheme to support batch verification,which can handle multiple verification requests from different users at the same time.In addition,we encrypt the outsourced data to ensure the data privacy.On the one hand,it can ensure the data stored in the cloud;on the other hand,it can guarantee that the third party auditor cannot obtain any private information from challenge proofs during the process of verification.Finally,through security analysis and real simulation experiments,we can prove that the proposed scheme is provably secure and practical in practical applications.2.This paper proposes an identity-based public data integrity verification scheme.Most of the existing data integrity verification schemes are based on PKI systems.For these schemes,users need to manage the key certificates generated by the Key Generation Center(KGC).For public data integrity verification scheme,the verifier needs extra costs to verify the authenticity of the key certificates when verifying the integrity of the data,which results in complicated key management and expensive key certificate generation,verification,renewals issues,especially when the entire enterprise uses the same cloud storage service.In identity based public data integrity verification scheme,the third party auditor can utilize user's identity as a public key to verify the integrity of data,which eliminates the complex key management problem and reduces the verification cost of the scheme.Besides,we use elliptic curve to generate data tags and verify data integrity,which reduces the computational and communicational cost,thereby improving the efficiency of verification.Finally,we present the security analysis and real simulation experiments to make the scheme more convincing.
Keywords/Search Tags:Data integrity, Cloud storage, Algebraic signatures, Elliptic curve cryptography, Identity-based cryptography
PDF Full Text Request
Related items