Font Size: a A A

Research On Data Security Mechanism Based On Privacy Protection In Cloud Environment

Posted on:2020-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:R R CuiFull Text:PDF
GTID:2438330602953139Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,the rapid development of cloud computing technology has brought great convenience to computer users.In essence,cloud computing is a network computing method with the characteristics of ultra-large scale,high virtualization,flexible expansion,and high computing speed.However,while users enjoying the convenience brought by cloud computing technology,also facing the data security problem of privacy data leakage,which is also one of the biggest problems hindering the development of cloud computing technology.When computer users use cloud computing technology,they will encounter problems such as low credibility of cloud servers,improper use of cloud server private data resources by illegal users,and theft of private data by attackers during data transmission.Therefore,when users use cloud services,the cloud platform must protect private data.This article studies the data security mechanism based on privacy protection in the cloud environment to improve the security and reliability of the data,and provides privacy-based data security in the cloud environment.The mechanism provides a more secure and efficient solution.The research content and innovations of the thesis mainly include the following aspects:Firstly,this paper analyzes the development trend of cloud computing and the data security issues facing cloud computing technology,elaborates the research status of searchable encryption mechanism and access control mechanism at home and abroad,discusses the security problems of the two data security mechanisms,and describes in detail The models and implementation processes of these two data security mechanisms are described.Secondly,aiming at the problem of low security of keywords encountered by users when traversing data files,a searchable encryption mechanism based on keywords was researched,and a multi-keyword searchable encryption scheme based on elliptic curve encryption was given.This solution divides keywords into two parts.The elliptic curve encryption is used to encode and encrypt the private keyword parts.The system use TF-IDF formula to calculate the correlation score between keywords and data files.The cloud server returns the document that best meets the query requirements based on the relevance score.Then the program uses encrypted keyword information to establish a secure inverted sorting index structure to improve file traversal speed and security,at the same time the system hand over most operations to the cloud server side to reduce the burden on the user side.By comparing the experimental results with other schemes in the same environment,it is shown that the proposed scheme has higher security and retrieval efficiency when traversing files.This article provides a more secure and reliable scheme for protecting user data privacy.Thirdly,aiming at the problems of privacy leakage and attribute deletion in the access control mechanism,this paper provides an access control scheme with hidden user attributes and user attributes flags.This scheme maps the user's attribute flags and attribute values to the access matrix of the linear secret sharing scheme,and combines them with the bloom filter to form an attribute bloom filter.This structure is used to hide the user's attribute flags and attribute values to protect user privacy.When using cloud data,the positioning algorithm in the bloom filter is used to determine whether the access permissions are met.In the system only the legal users can get date files and decrypted them.Legal user can find the user's attribute flags to delete them by the positioning algorithm.The deletion operation can prevent the leakage of user attributes during the deletion process,and set the corresponding location information of the attribute bloom filter to avoid the system from repeatedly deleting the attributes.The experimental results and security analysis show that the proposed scheme is superior in protecting user privacy attributes.
Keywords/Search Tags:Cloud computing, Privacy protection, Data security, Searchable encryption mechanism, Access control mechanism
PDF Full Text Request
Related items