Font Size: a A A

Study On Provable Data Possession Scheme

Posted on:2021-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:W C ShiFull Text:PDF
GTID:2518306470982989Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Cloud computing is a burgeoning paradigm,where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources.However,in the process of cloud service data sharing,due to the improper operation of the cloud server,the integrity of the data is facing a serious threat.The provable data possession technology guarantees the data integrity of cloud server,provides users with reliable cloud services,and promotes the development of cloud computing.Therefore,it can be proved that the research of provable data possession schemes has very important theoretical value and practical significance,and is a hot topic in cryptography research.This paper studies the provable data possession schemes.The details are as follows:(1)Due to the PKI-based provable data possession scheme suffers the management issue of the certificates and the identity-based provable data possession scheme causes an inherent key escrow problem,based on certificateless cryptography and elliptic curve cryptography,an efficient privacy-preserving certificateless provable data possession scheme is proposed.This scheme solves the problems of certificate management and key escrow,completes the integrity verification of cloud storage data through the third party auditor,and protects the data privacy and identity privacy of users.The security analysis shows that the scheme has been proved to be unforgeable against adaptive chosen message attacks based on the elliptic curve discrete logarithm assumption in the random oracle model.The performance analysis shows that compared with the known scheme,the proposed scheme achieves high efficiency of computing cost and communication cost,and is more suitable for cloud storage data integrity verification?(2)Due to the issue of provable data possession with data transfer and privacy-preserving problem,based on bilinear parings,an identity-based provable data possession with data transfer scheme is proposed.This scheme supports the data transfer of the cloud server,completes the integrity verification of cloud storage data through the third party auditor,and protects the data privacy.The security analysis shows that the scheme has been proved to be unforgeable against adaptive chosen message attacks based on the computational DiffieHellman assumption in the random oracle model and scheme satisfies the probabilistic detection of the data integrity of the cloud server.The performance analysis shows that compared with the known scheme,the proposed scheme achieves high efficiency of computing cost and communication cost.
Keywords/Search Tags:Provable data possession, Identity-based cryptography, Certificateless cryptography, Privacy preserving, Data transfer
PDF Full Text Request
Related items