Font Size: a A A

Research On Data Integrity Verification Technology In Cloud Storage

Posted on:2020-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:J HanFull Text:PDF
GTID:2438330602951653Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The cloud storage is a key technology in the development of cloud computing.With the pay-as-you-go,users can enjoy the variety of storage services offered by remote cloud platforms.However,the data security problems have been becoming the main concern of users and the bottleneck in the development of cloud storage.Thus,how to verify the integrity of remote stored data in the cloud has been be-coming a hotspot in academia.Nowadays,relevant scholars have proposed many public cloud auditing schemes that can realize various functions.But they all share some shortcomings,such as using time-consuming pairing operations when auditing,lacking of an efficient mechanism to identify the corrupted data files once the batch auditing fails.Based on the existing researches,this paper proposes the following new aspects:1.This paper proposes a lightweight public cloud auditing scheme,which sup-ports dynamic revocation of users and real-time dynamic updates of storage data.First of all,this scheme uses the multi-use unidirectional proxy re-signature tech-nology,enabling users to dynamically revoke at any time(including replacing their public and private keys).Second,this scheme gives the concept of virtual index,which ensures that the stored data can be dynamically updated in real time(for ex-ample,inserting,deleting and modifying).Finally,the cloud server replaces current user to re-signature in the storage phase,and Third Party Auditor(TPA)performs integrity verification of the stored data on behalf of the current user in the audit phase,which greatly reduce the computation overhead of the users and the commu-nication overhead of the cloud storage system.2.This paper proposes a lightweight and privacy-preserving public cloud audit-ing scheme that does not require bilinear pairings.Firstly,this scheme utilizes the characteristics of the Homomorphic MAC(HomMAC)to avoid the time-consuming bilinear pairing operations.Secondly,this scheme allows the TPA to replace the user to generate data authentication meta set,reducing the computational burden of the user.Furthermore,it also protects data privacy against the TPA and the Cloud Service Provider(CSP)by using the random masking technique.3.This paper constructs an efficient batch auditing model based on the Lucas sequence.First,this model utilizes the self-query technique and the polynomial commitment technique,which reduce the communication complexity of the batch auditing phase from linear to a constant scale.In addition,according to the recursion and the ratio of the gold section of the Lucas sequence,we design a novel search method for identifying corrupted data files efficiently when the batch auditing task fails,which has a clear advantage over Binary search in the searching time of the corrupted data files.Based on the above contents,our paper gives detailed security analysis and performance analysis.These detailed analysis clearly show that these proposed schemes are secure and superior to the existing similar public cloud auditing schemes in terms of efficiency and performance.
Keywords/Search Tags:cloud storage, data integrity, public cloud auditing, batch auditing, lightweight
PDF Full Text Request
Related items