Font Size: a A A

Research On Secure Multi-party Computing And Auditing Technology Suitable For Cloud Environment

Posted on:2022-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y GuanFull Text:PDF
GTID:2518306740451724Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology,the phenomenon of data blowout has followed.Cloud computing,because of its powerful computing and storage capabilities,can mine and analyze large amounts of data,bringing great value to various fields and also triggering personal data privacy issues.Secure multi-party computing is a cryptographic protocol that can enable users to implement joint computing while protecting privacy in a distributed network environment that does not trust each other,and balances the issues of data security sharing and use.It is an important technology to ensure the security of cloud computing.Implement secure multi-party computing in a cloud computing environment,users store data on cloud servers,and data may be damaged or lost due to software and hardware failures,etc.Auditing can verify the integrity of cloud data and is an important technology to ensure cloud data security.This article has carried out relevant researches on dedicated protocols and algorithms on secure multi-party computing and auditing,the details are as follows:(1)In view of the low efficiency of the existing interval location relationship determination protocol,the inability to achieve fairness,and the need to call sub-protocols many times,this paper uses the idea of El Gamal multiplication homomorphic encryption and vector encoding to design a secure two-party interval confidential computing protocol.In the scheme,the interval is firstly encoded into a vector,and then El Gamal multiplication homomorphic encryption is introduced.The private key is shared by the participants,which effectively realizes fairness.Then,a method of re-randomization of ciphertext with semantic security is introduced,which effectively protects privacy.Finally,the final solution is constructed by analyzing the sorting and sum of related endpoints.This paper analyzes the correctness of the scheme,uses the ideal-realistic simulation example,and proves the safety of the scheme under the semi-honest model.At the same time,the performance and efficiency of the scheme are qualitatively analyzed,and the experiment gives a more intuitive Quantitative analysis,the analysis result shows that this scheme is better.(2)In view of the application scenarios where the existing interval calculation protocol cannot be applied to multiple participants,on the basis of the above,this article extends the secure two-party interval confidential calculation protocol to multiple parties,which can solve the multi-party interval confidential calculation problem without the help of any third party.This paper gives proof of the correctness and safety of the scheme,and points out that the scheme can resist collusion attacks.Subsequently,secure multi-party computing is applied to the cloud computing environment,and cloud computing resources are combined to design and implement secure multi-party computing protocols in the cloud environment.The introduction of cloud computing can greatly improve the performance and efficiency of the protocol,at the same time,it also provides solutions for confidential computing in the cloud environment(3)This paper analyzes an outsourcing scheme that can dynamically prove data ownership proposed by Guo et al.In this solution,the malicious cloud server only needs to save a few necessary data to forge data tags and generate valid data ownership certificates.The cloud server can arbitrarily delete or tamper with the user's stored data without being discovered.This article gives the specific attack process and makes improvements in the label generation stage and data audit stage.The improved solution can resist the forgery attack of the cloud server and supports all the features in the original solution.
Keywords/Search Tags:Secure multi-party computing, Data integrity auditing, Interval Privacypreserving Computing, Privacy protection
PDF Full Text Request
Related items