Font Size: a A A

Research On Application Of Data Auditing Technology In Data Sharing Environment

Posted on:2022-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:L S ChenFull Text:PDF
GTID:2518306602494554Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the explosive growth of data,the urgent need for open sharing of data is increasing day by day.Data storage realizes the work of data collection,and data trading not only bring benefits to those who have data but also provide a method for those who do not have data to obtain data.But whether it is data storage or data trading,data security issues need to be resolved urgently.Data auditing technology emerged at the historic moment,which can probabilistically detect the integrity of data.Since the development of this technology,it has not only expanded its functions but also optimized the security.However,these data auditing protocols are still inefficient in detection and are vulnerable to collusion attacks and key leakage attacks.This article focuses on how to improve the effectiveness of data auditing protocol detection and the security of the protocol.It also designs a safe and fair data trading protocol based on data auditing technology.This article specifically conducted the following research:(1)Improving the detection efficiency of data auditing technology and ensuring the security of the scheme.Researching the current large amount of data auditing schemes found that data auditing schemes based on simple random sampling are often accompanied by detection inefficiencies.Besides,the collusion problem in the scheme cannot be ignored.Based on the above problems,this paper designs an efficient data auditing scheme.First,a novel random sampling verification algorithm is designed so that the challenge sets of each audit do not overlap with each other,to avoid the emergence of inefficient audit situations.Secondly,the working nodes in the smart contract act as third-party auditors to perform audit tasks,providing data owners with a "pay as you go" payment model,and avoiding collusion problems.At the same time,the doubly-link information table and location array are used to realize the dynamic audit function,which provides convenience for users to update data.Finally,based on the computational Diffie-Hellman problem,the security of the scheme is proved.Experimental research shows that this scheme can achieve the same probability of successful detection as other related schemes under the condition of auditing fewer data blocks.(2)Improving the security and efficiency of atomic data trading schemes and strengthening the system's dispute handling capabilities.Researching many data trading schemes found that the use of key reconstruction technology makes the scheme unable to compromise on security,efficiency,and dispute handling capabilities.To solve the above problems,this paper designs an atomic and accountable data trading scheme.First,the self-certified public keys technology is used to generate keys for users to achieve the security goal of resisting the key leakage attack.At the same time,non-interactive key exchange technology is used to generate session key encrypted messages for the system to reduce the overhead of the system in maintaining communication security.Secondly,a special data auditing scheme suitable for trading scenarios is constructed and combined with smart contracts,so that data buyers can,with the help of data sellers,realize the self-buy service process from selecting keys,purchasing encrypted data,and decrypting to get data,which not only guarantees the atomicity of the trading but also ensures the integrity of the data.Besides,based on the public auditability of data audit technology,a fair accountability mechanism is also designed to resist collusion attacks and handle user disputes.Finally,performance analysis shows that this scheme can not only achieve atomic data transactions as efficiently as existing schemes using key reconstruction technology but also achieve privacy protection and identity traceability with ideal efficiency.
Keywords/Search Tags:Data auditing, Data trading, Smart contract, Anti-collusion attack, Anti-key leakage attack
PDF Full Text Request
Related items