Font Size: a A A

Research On Data Transaction Protection Methods In Mobile Cloud Computing

Posted on:2019-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y YuanFull Text:PDF
GTID:2438330545993151Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology,data exponentially explosive growth in demand for storage capacity that people have become more sophisticated.However,in recent years,incidents of leakage of data stored on the cloud server by users have occurred from time to time,making people question the security of their data in cloud storage.Mobile users will inevitably encounter various data security problems in the process of data exchange and transmission using in the cloud.To ensure the smooth implementation of applications and services,it is necessary to adopt some data protection strategies to ensure the security of key data.Therefore,it is particularly important to study how to protect data security in mobile cloud computing.The main research content of this article is as follows:1.In the development of mobile cloud computing,in order to break through the limitations of lower mobile terminal storage space and computing power,reduce the communication overhead of cloud and mobile users,but also to reduce the user's computing burden,a new multiple-files data integrity verification scheme with five participants of User,Proxy Party,SSP,Key Generation Center and Verifier for mobile cloud computing was proposed in this paper,and PDP technology is used by the Verifier to verify the integrity of the data.Under the random oracle model,the feasibility and security of the scheme are analyzed respectively.2.In order to find the cause of the incident and pursue the responsibility of the offender while the integrity of the data is damaged,a data integrity accountability scheme based on an implicit trusted third party has designed in this paper with three participants of User,SSP,and auditors with implicit trusted third-party.Integrating trusted hardware as a trusted third party with the SSP effectively protects the user's data privacy.In this scheme,the data structure of the voucher and voucher linked list is constructed,six interactive protocols are introduced to generate irrevocable vouchers and form a linked list of vouchers to provide evidence support for audit accountability.In order to reduce the user's storage overhead,the vouchers generated by the interactive protocol are saved on the SSP.The security,communication,and storage overhead of the solution are effectively analyzed.
Keywords/Search Tags:Mobile cloud computing, Data integrity, Proxy signature, Implicit trusted third party, Audit accountability
PDF Full Text Request
Related items