Font Size: a A A

Design And Analysis Of Cloud Storage Integrity Audit Scheme

Posted on:2022-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:X GaoFull Text:PDF
GTID:2518306566490934Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the growing size of data,it is difficult for users to manage and store these massive amounts of data.Cloud servers have powerful computing resources and storage resources that ordinary users do not have.Therefore,more and more users choose to outsource their files on the third-party cloud server.However,data outsourcing brings a series of security issues: Both the hardware failure of the cloud server and the hacker intrusion will damage the user's data.What's worse,the cloud server may hide the data damage incidence for its own reputation,and even may forge the user's data.Therefore,we need a mechanism to check the integrity of the user's data.In the public cloud data auditing schemes,the Third Party Auditor(TPA)checks the integrity of user data in the cloud on behalf of the user.In recent years,efficient and privacypreserving cloud data auditing schemes have received great number of attentions from researchers.In this paper,we novelty proposed two cloud data auditing schemes as follows:First,this paper proposed a novel cloud data auditing scheme with file and authenticator deduplication.The proposed scheme can not only check the integrity of the cloud file,but also reduce the storage overhead of the cloud server.In the proposed scheme,for duplicated files,the cloud only needs to store one copy of the data block and authenticator.Besides,for the low-entropy file,the cloud cannot forge any authenticator to pass the auditing verification.The proposed scheme is the first practical one that truly achieves low-entropy security.The proposed scheme is user-friendly.Users do not need to keep interacting with the TPA during each auditing task.As a result,users are relieved from the tedious auditing task.The detailed security proof shows that the proposed scheme is secure.Comprehensive experiments show the efficiency of the scheme?Second,this paper proposed an integrity auditing scheme based on the keyword with sensitive information privacy for encrypted cloud data.For the practical scenario that users only concern the integrity of a portion of encrypted cloud files that contain his/her interested keywords,we design an effective scheme.In the proposed scheme,the TPA could check the integrity of all encrypted cloud files containing one specific keyword only with the search trapdoor.Only if the cloud correctly stores all of the encrypted files that contain this keyword,it can generate a valid auditing proof.In addition,the TPA cannot obtain any sensitive information,for example,which files contain the specific keyword and how many files contain the specific keyword.In order to realize these salient features,this paper proposed a novel label called Relation Authentication Label(RAL).The RAL can not only authenticate the relation that files contain the queried keyword,but also be used to generate the auditing proof without sensitive information exposure.Concrete security analysis show that the proposed scheme satisfies correctness,auditing soundness and sensitive information privacy.Detailed experiments show the efficiency of the proposed scheme.
Keywords/Search Tags:Cloud data auditing, deduplication, searchable encryption, privacy preserving
PDF Full Text Request
Related items