Font Size: a A A

Research On Cloud Storage Data Security Deduplication Technology Based On Ownership Management

Posted on:2021-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:B WuFull Text:PDF
GTID:2518306470963189Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,cloud computing is developing rapidly,more and more enterprises and individuals choose to outsource their data to cloud service provider(CSP),which greatly alleviates the pressure of local data storage caused by explosive growth of data.however,with the increasing user scale,the rapid growth of the cloud data volume brings great pressure to CSP.How to efficiently manage and maintain the cloud data,optimize the cloud storage service,and reduce the cloud duplicate data becomes extremely important.Data security deduplication technology is mainly used to improve cloud storage efficiency,and reduce the occupation of storage space by removing redundant data in the cloud.Deduplication technology faces the data privacy and trust crisis in cloud storage,as the CSP may steal or leak the user data,it is not credible(honest but curious).To protect the data privacy,users typically encrypt their data locally and out source it to the cloud as ciphertext.In the process of data deduplication,there may be many problems and threats,such as data privacy disclosure,ownership revocation,illegal access,pollution attack,collusion attack,etc.For the manage problem after cloud users revoke ownership,it is necessary to ensure that users who revoke ownership cannot correctly decrypt ciphertext,protect data privacy.How to realize efficient data security deduplication and guarantee data privacy has become a research hotspot in the field of cloud storage.In addition,the user loses the direct control over the data after the encrypted data is outsourced to the cloud.If the cloud data is damages and the data is incomplete,the user will lose the data.Therefore,it is particularly important to validate the integrity of the cloud data over which users lose direct control.In view of the above problems,this paper mainly has the following two aspects of the work:1.Aiming at the problems of dynamic ownership management,access control in current security deduplication schemes,we propose a deduplication scheme based on RCE.The key ciphertext is re-encrypted by updating group key,the management problem after cloud users revoke ownership is realized,and the correct decryption ofciphertext by users who revoke ownership is prevented.We construct the proof of ownership based on bloom filter.In the process of dynamic ownership management,for frequent repeat upload,download operation,lazy-upadte strategy is applied to further reduce computation overhead and achieve efficient dynamic ownership management.We give the detailed security analysis and performance analysis,which proves that this scheme has high security,at the same time,reduces the computational overhead.2.Aiming at the problem of data integrity in current security deduplication schemes,we propose a method of data integrity verification.The Pow protocol of the challenge-response model is applied to verify whether the subsequent uploaded user is the real owner of the data.And a Third party audit(TPA)is added to encapsulate the encryption key by using blind signature.Meanwhile,TPA performs public integrity verification of data on behalf of the user,to realize the security deduplicaiton of the encrypted data and verify the integrity of the cloud data.We give a detailed security analysis and performance analysis,which proves that our scheme can improve security while balancing the computational overhead.
Keywords/Search Tags:cloud storage, security deduplication, dynamic ownership management, integrity audit, access control
PDF Full Text Request
Related items