Font Size: a A A

Data Audit Method For Resource Constrained Users Under The Cloud Edge Environment

Posted on:2022-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiFull Text:PDF
GTID:2518306527950489Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of cloud storage outsourcing data services,uploading a large amount of Internet of Things device data to cloud storage has also been favored by increasing end users,but users have also lost direct control over the data.How to ensure the cloud integrity verification of user data in the server has become a hot issue that needs to be solved urgently in the academic field.For semihonest cloud servers,although many cloud data integrity verification schemes have been proposed,the audit process is inefficient.Most of the schemes require end users to perform complex high-calculation operations,and users are supporting dynamic operations.The cost of the data integrity verification process is relatively large,resulting in a heavy computational burden on the user for the entire data integrity verification process.Especially for resource-constrained users,data integrity verification brings huge challenges to it.Although the traditional data integrity audit method can perform data integrity verification operations by renting a third-party auditor to help users share the pressure of audit calculations.However,due to the particularity of resource-constrained users,they cannot afford high-complex calculations such as data signature calculations and data deletion verification caused by audits.Therefore,traditional audit schemes cannot be directly applied to this scenario.In order to solve these problems,combining edge computing technology,an efficient and secure lightweight data integrity verification method combined with cloud and edge is proposed.The whitch method is of great significance to data security and privacy protection.It mainly carried out the following research work:1)Aiming at the lightweight characteristics of resource-constrained users,a lightweight integrity audit framework RU-Audit combined with cloud and edge is proposed.This framework can ensure that the proposed system has the conditions to achieve high-frequency and low-latency characteristics from the hardware level.In addition,the RU-Audit operation steps are introduced through the implementation process,and the red-black tree structure based on the index is proposed to realize the audit verification requirements of the RU-Audit model.Finally,the effectiveness of the structure and the efficiency of the scheme are proved through experimental evaluation.2)In response to the efficient and dynamic needs of resource-constrained user data,under the proposed lightweight data integrity audit framework,an efficient and dynamic audit method based on bloom's hash tree is proposed.First,a Bloom Hash Tree data structure and dynamic operation steps that support dynamic auditing are defined to ensure the efficiency of auditing.Secondly,different allocation methods are adopted for each audit entity,and data evidence and label evidence are used to verify the correctness and completeness of the data.Finally,security analysis and performance evaluation prove that the program has data confidentiality,audit reliability,audit correctness and high efficiency.3)In response to the security threat of cloud servers deleting resource-constrained user data,under the proposed lightweight data integrity audit framework,a red-black tree-based data security audit protocol based on bloom buckets is proposed.First,the bucket-based red-black tree structure is used to efficiently realize the dynamic update of shared data,and then the counting bloom filter structure and obfuscation technology are used to support the effective deletion and public verifiability of data.In addition,in order to achieve the efficiency of the audit,it supports batch audit operations on shared data.Finally,security analysis and simulation experiments show that the method can effectively protect data privacy while improving audit efficiency.
Keywords/Search Tags:cloud storage, resource-constrained user, dynamic update, verifiable deletion, data integrity audit
PDF Full Text Request
Related items