Font Size: a A A

Research And Application Of Cloud Computing Security Technology In Ambient Intelligence

Posted on:2019-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:M YuanFull Text:PDF
GTID:2428330596960616Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The rapid development of computer technology has changed all aspects of human life.Ambient intelligence(AmI),as a good vision of people's future life,has attracted more and more attention.AmI systems can use various information devices to collect and process contextual information of the environment and support people in daily life.However,the AmI systems also bring many data security issues when storing and analyzing user's privacy data.Many scholars at home and abroad have researched cloud computing.In terms of security issues in cloud computing,many scholars have researched and designed corresponding security protocols to solve related security problems,such as access control strategies,encrypted search protocol,data integrity verification scheme and so on..Actors in the AmI systems collect and upload data information to the Information Manager(IM)for storage.How to ensure the integrity of the data information stored in the IM is the main research content of this thesis.At present,there are many data integrity verification schemes in cloud computing(cloud storage).However,Actors in AmI systems usually include a wide range of devices,the computing power and storage capacity of Actors vary greatly.Most data integrity verification schemes in cloud storage are computationally expensive.They are not suitable for AmI systems.In addition,a practical integrity verification scheme not only needs to guarantee the most basic integrity verification requirements,but also faces many security challenges,including third-party audit centers spying on outsourced data,key updating,dynamic grouping and privacy information leakage.This theis combines cloud computing security technologies and focuses on the data integrity verification scheme that can be effectively applied to the AmI system,and expand the capabilities of the schemes.Specifically,the main research contents of this thesis are as follows:1.This thesis analyzed the application scenarios of data integrity verification based on the instance of the environment intelligent system,and described the integrity verification challenges encountered in single-user and multi-user scenarios.At the same time,according to the current data integrity verification scheme model in cloud storage,this theis introduced the integrity verification scheme model in the AmI system.2.This thesis proposed an efficient integrity verification scheme for supporting key update in AmI system under single-user data integrity verification scenario.In the new scheme,data block signatures are calculated based on hash operations,and third-party audits are introduced to help Actor achieve integrity verification,which effectively reduced Actor's computational overhead.In addition,the scheme ensures that third party auditor cannot obtain private data through CDH security assumptions and supports data owner's key updating operations through proxy re-signature technology.3.This thesis proposed an agent-based group data integrity verification schemes in AmI system under multi-user data integrity verification scenario.In the system model,proxy is introduced to help the group Actors calculate the data block signature,which effectively solved the security problem of identity privacy leakage when members in the group sharing data,and can effectively supported the dynamic group.At the same time,blind signature technology is introduced in the scheme,proxy provided blind signature services for group members.Proxy cannot obtain user's data content,so our scheme can ensure data privacy.4.This thesis presented the security proof and performance analysis of the two schemes according to the defined safety goals.And this thesis proved the correctness and effectiveness of the proposed schemes.
Keywords/Search Tags:ambient intelligence, data integrity verification, key updating, group sharing data
PDF Full Text Request
Related items