Font Size: a A A

Research On Certificateless Public Auditing Scheme With Data Privacy Preserving For Cloud Storage

Posted on:2022-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:R ZhouFull Text:PDF
GTID:2518306551482164Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid growth of data,the burden of data storage and computation bother a lot of users.Local storage has been difficult to meet the needs of users.The emergence of cloud storage technology solves this problem well.But once the data is uploaded to the cloud server,users lose direct control of the data,and many security issues arise.One of the most important security issues is the integrity of data which stored in the cloud.Cloud servers are semi-trusted.It can cause data corruption for various reasons,so users need an effective way to verify the integrity of data.An efficient integrity audit scheme can help users get integrity verification results with as little computing overhead as possible,so that users can discover the data security threats in time,take appropriate measures.In order to reduce the computational burden of users in the audit process and avoid disputes between the two parties,third-party auditors are often introduced in audit programs to achieve public audits.However,third-party auditors are also not completely credible.During the audit process,they are curious about user privacy and try to obtain relevant data.Therefore,it is necessary to preserve data privacy and user identity privacy in the process of data auditing.In order to achieve efficient auditing and privacy preserving for users,researching on the data integrity audit schemes,and construct an certificateless public auditing scheme with data privacy preserving:The audit scheme based on PKI has the defect of certificate management and the identitybased audit scheme has key escrow problems.Using certificateless technology to construct the audit scheme can avoid the problems;A forgery-resistant audit scheme is proposed to deal with the problem;As for the users' computing power is limited,the computing cost in the audit scheme should be transferred to the cloud server and the third-party auditors which own high computing power.Privacy protection is added to the audit process to protect user identity privacy and data privacy,that is,TPA cannot obtain user identity information data and data information data during the audit process.Reduce the computing overhead of the client to ensure the efficiency of the user audit.The user identity privacy is protected by generating random identities for the user,and the increased computational overhead is not borne by the user,which can make user auditing efficient.The data blinding method is adopted to protect data privacy.The data uploaded by users to the cloud is the blinded data.
Keywords/Search Tags:Cloud storage, Data integrity, Certificateless, Privacy-preserving
PDF Full Text Request
Related items