Font Size: a A A

Research On Data Integrity Audit Method For Cloud Storage With Privacy-preserving

Posted on:2022-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:L DingFull Text:PDF
GTID:2518306542962899Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the massive growth of data,many users choose to use the cloud server to store data,which reduces the burden of local storage data.However,using the cloud server to store data will lead to the separation of the control and use rights of data.In addition,the cloud server may damage user data due to software and hardware failure.Therefore,users need to perform integrity audits on outsourced data from time to time.However,with the development of cloud computing,the untrusted cloud server may disclose the private information in outsourced data.Therefore,data integrity audit of privacy protection has gradually become the focus of research.Especially in the internet of things environment,facing the outsourcing data of cross domain storage,how to achieve the integrity audit of privacy protection becomes a challenge.In addition,with the development of information technology,the demand for data sharing is also increasing.How to achieve efficient data sharing under the premise of protecting the private information has become research difficult.Therefore,based on the above requirements of outsourcing data integrity audit,the main research contents are as follows:1)Proposing a cross-domain data integrity audit scheme based on certificateless.The outsourced data is stored in the cloud server in the form of ciphertext,which effectively protects the private information in the outsourced data.Subsequently,during the audit phase,the Third Party Auditor(TPA)can aggregate the data holding proof generated by the cloud server in different domains,so as to achieve batch verification to determine the integrity of cross domain outsourcing data.Finally,the security and performance analysis show that the security and efficiency of the scheme are acceptable.2)Proposing a privacy-preserving audit scheme for the shared data integrity.The data owner and the sanitizer jointly sanitize the private information in the shared data,which effectively protects the privacy of the shared data.At the same time,the Diffie-Hellman key exchange protocol is used to ensure the safe transmission of the shared data between the data owner and the sanitizer.In addition,in the shared data phase,sharing users need to obtain the authorization of the sanitizer to access the shared data.Finally,security and performance analysis show that the security and efficiency of the scheme are acceptable.
Keywords/Search Tags:Integrity audit, Cross-domain audit, Privacy-preserving, Data sharing, Access control
PDF Full Text Request
Related items