Font Size: a A A

Research On Cloud Storage Date Integrity Audit Strategy Based On Third Party Audit

Posted on:2022-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:T HanFull Text:PDF
GTID:2518306521995009Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As a new computing service mode,cloud computing has been widely used in the field of new generation information technology.Security issues in cloud computing environment mainly include three directions: data security storage,data security audit and encrypted access control.As the most important application field of cloud computing,cloud data storage technology has been widely used and deeply studied.Data storage in the cloud computing environment mainly consists of three parts: data holder,cloud service provider and data tenant.When data holder stores locally controllable data resources in the cloud,they will lose control over data integrity and availability.For the cloud user,CSP is an untrustworthy data holder,which may destroy the data stored in the cloud or forge and cheat the integrity proof of the damaged data.Therefore,effectively implement data security integrity audit has become the top priority of cloud data storage security research,in order to ensure the security and availability of data proof.This paper mainly studies the integrity audit of data security in cloud storage environment.Based on the analysis of data retention proof(PDP)and recovery proof(POR)of current data security audit,a cloud computing data storage integrity audit strategy based on third-party audit is proposed.The main work of this paper is as follows:(1)In view of the data integrity audit problems caused by CSP internal attacks in cloud data storage,a CSP attack cloud data integrity audit method based on the combination of MHT and DSA signature is studied and proposed.This policy can verify the integrity of cloud user data during data processing and auditing in cloud,and locate the exact location of missing or corrupted data blocks.Experiment proves that this method can effectively implement the integrity audit of cloud storage data.It can also effectively reduce the system computation and communication time cost at the same time.(2)Aiming at the problem of data recovery after the corrupted data integrity detected in cloud data storage,an optimal storage cloud data recoverability audit method based on regenerative code is proposed.The scheme not only supports the third-party audit institution to verify whether the data block is corrupted or not,and locate the exact location of the damaged data block,but also realizes the recovery function of data integrity.In the process of data processing and auditing,the privacy of data is guaranteed.Experimental results show that the scheme is safe and valid.
Keywords/Search Tags:Cloud data storage, Integrity audit, Proof of possession PDP, Recoverability proof POR, Tamper detection and localization
PDF Full Text Request
Related items