Font Size: a A A

Design And Analysis Of Rational Security Outsourcing Computing Protocol

Posted on:2020-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:C Y YueFull Text:PDF
GTID:2428330596473001Subject:Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of big data,resource-limited organizations,companies and individuals are unable to perform complex task computing and large data storage locally,and large computers with powerful computing and storage capacity are very expensive.However,with the rise of cloud computing service model,these resourcelimited entities are no longer limited by their own computing and storage capacity,and can use relatively cheap outsourced cloud servers to complete costly computing tasks at any time and anywhere.But the service brings convenience as well as faces many security threats and challenges.Once the task is outsourced,the client will lose the control of the outsourcing task and the protection of privacy data;or because of their own behavior and preferences may lead to the outsourcing of computing tasks security risks,clients often can't rely on the cloud server back results.Yet,in the traditional outsourcing computing scheme,the proof of the correctness of the user verification result is complex,the computing overhead is large and the communication cost is high,which is one of the important factors restricting the efficiency and practicability of cloud computing services.Moreover,the paid cloud computing services will deviate from the protocol at any time driven by interests.Therefore,it is especially necessary to combine outsourcing computing with game theory to study the new outsourcing computing model.This thesis takes game theory as the theoretical tool,and USES the thought method of provable security theory to carry out a preliminary research on the rational outsourcing computing model of security.The research content mainly includes the game theory mechanism of rational outsourcing computing,the rational outsourcing computing protocol and the rational outsourcing verification protocol.The specific work is as follows:(1)Game theory mechanism of rational outsourcing computing.Firstly,the rational outsourcing calculation model is designed by using the extensive game theory,and the payment matrix and utility function of each participant are defined.Secondly,the formal definition of rational outsourcing computing model is given according to the Nash equilibrium solution of the model.Finally,the optimal selection condition of the linear function in the model is studied by simulation experiment.The experimental results show that the rational outsourcing computing model under this condition can ensure the correctness of the calculation results and greatly reduce the cost of clients.(2)Secure rational outsourcing of computing scheme in the cloud setting.Firstly,a secure rational outsourcing computing scheme is proposed by combining the partially decrypted switchable homomorphic encryption algorithm with the game theory.the game model between the client and the server is designed with the game theory,and the utility of the participants in both dual-server and single-server scenarios is analyzed.Finally,the performance analysis results show that the proposed scheme can effectively implement the outsourcing calculation and ensure the correctness and privacy of the calculation results.(3)Rational outsourcing verification protocol.Firstly,using the game theory and smart contract to construct a rational outsourcing verification protocol based on the three mechanisms of prisoner,collusion and betrayal.Secondly,analyze and define the utility of participants under different mechanisms.Based on the designed utility function,the minimum threshold of the deposit paid by each participant in the prisoner and collusion mechanism is proved theoretically.Finally,the protocol analysis results show that the protocol can guarantee the correctness of verification results,and the client can do this without verification.Thus reducing the client's computational overhead,and also ensuring the privacy of sensitive data.
Keywords/Search Tags:Rational Outsourcing Computing, Game Theory, Nash Equilibrium, Correctness, Security
PDF Full Text Request
Related items