Font Size: a A A

Research On Security Outsourcing Solutions In Cloud Computing Environment

Posted on:2019-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q SuFull Text:PDF
GTID:2438330566990188Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,cloud computing as a new industry,has been rapid developing.Outsourcing computation as one of important forms of cloud computing also receives people's wide attention.In outsourcing compute,terminal with limited resource can deposit expensive task to cloud server.The clients or the enterprises can avoid large capital outlays in hardware/software deployment and maintenance.Meanwhile,they can enjoy enormous computing resource provided by cloud server.In the process of outsourcing,user's data should be uploaded to the cloud server,but,it is difficult to find a public cloud which is completely trustworthy.So,the privacy of user's data should be considered and the security of user's data should be guaranteed.Besides,the user should shoud have the ability to verify the correctness of the result returned by the cloud server.Therefore,how to design an efficient and verifiable security outsourcing scheme is a worthy topic.This paper studies the secure outsourcing computation technology in cloud computing,and proposes three secure outsourcing algorithm to specific problems:(1)In order to solve the problem that the terminal with limited resource is difficult to carry out the inversion modulo operation,a scheme which meets the security outsourcing requirements is proposed based on two-server security model.Using the Chinese Remainder Theorem the inverse module operation is transformed into a set of congruence equations.By modular multiplication operation,the user's data can be blinded and the privacy of user's date can be guarantee.The security proof and experimental analysis demonstrate the security and efficiency of the algorithm.(2)It is a practical problem that the private key generation of RSA encryption algorithm is difficult to be independently implemented in resource-constrained terminals.A secure outsourcing algorithm is proposed which is suitable for the RSA private key generation process.This algorithm uses two-server security model to prevent cloud server accessing to user's information.At the same time,the correctness of algorithm can be guaranteed by Chinese Remainder Theorem.Through the security analysis,it is proved that the algorithm satisfies the outsource security requirements.(3)In order to solve the problem of large computation in matrix multiplication,an efficient security outsourcing algorithm is proposed,which takes advantage of the single-server security model.By using the multiplication of sparse matrix,the local computation is reduced.The performance analysis indicates that the algorithm not only meets the requirements of secure outsourcing,but also has the advantages of high computational efficiency and low verification overhead.
Keywords/Search Tags:Cloud Computing, Secure Outsourcing, Chinese Remainder Theorem, RSA Algorithm
PDF Full Text Request
Related items