Font Size: a A A

Research On Data Deduplication Method For Privacy Protection In Cloud Storage Environment

Posted on:2022-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:J G WangFull Text:PDF
GTID:2518306539463044Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Cloud storage services attract a large number of users due to its convenient storage and low price.However,there are many duplicate data in the massive data uploaded by many cloud storage users.In order to save storage costs,reduce network bandwidth consumption and other reasons,cloud storage service providers(CSP)will use data deduplication technology.In order to protect private data from being stolen by others,users generally encrypt the data before uploading it to the cloud for storage.Due to the different encryption keys,the ciphertext obtained after the same file is encrypted is different,so traditional data deduplication technology is often not suitable for cloud storage data deduplication.At the same time,as cloud storage users share storage space,ensuring user data privacy and security is also an important topic that needs to be studied in cloud storage deduplication.Therefore,while protecting user data privacy from being stolen,achieving reliable deduplication in cloud storage systems is a research hotspot in cloud storage services.In this regard,the main contributions of this article are as follows:(1)A deduplication scheme based on CP-ABE:Guided by the CP-ABE principle,the user's access control tree is constructed,in the form of group key management,group keys are assigned to users with the same attribute set,so that only users who meet the access attributes can decrypt related data.Combining the group key and the file to generate the file encryption key,so that the ciphertext data has higher confidentiality;using a trusted third-party server as the key management server,making the key management more secure;uploading the file The block processing makes the system have higher deduplication efficiency.When users perform operations,strict identity verification provides a guarantee for data security and at the same time protects users' private information.(2)Propose a de-duplication scheme based on differential privacy:Apply the concept of differential privacy to the cloud storage deduplication scheme,The third-party trusted server is used as the middleware for communication between users and servers,instead of the direct communication mode between semi-trusted cloud servers and users.In the third-party trusted server,design appropriate security algorithms according to the definition of differential privacy,The data finally transmitted to the cloud conforms to the definition of differential privacy,and the differential privacy security of the transmitted data can be realized.Compared with the scheme of setting a random threshold for the number of stored files,this scheme only needs to store one copy of the file,which improves storage efficiency and reduces the storage space consumption of the cloud storage system.
Keywords/Search Tags:cloud storage, data privacy, deduplication, CP-ABE, differential privacy
PDF Full Text Request
Related items