| As the volume of data explodes,it becomes particularly difficult for users to store and manage these massive amounts of data themselves.The widespread adoption of cloud storage services has become an inevitable trend in order to alleviate the range of overheads associated with local data storage and maintenance.Although cloud storage improves data sharing efficiency and greatly reduces the burden of local data management.However,any software or hardware failure or human error can lead to data loss and corruption.To make matters worse,some cloud storage providers may have the malicious behavior of deleting data for their own benefit.Therefore,it is especially important to construct a secure data integrity verification scheme.In this thesis,we propose two data integrity auditing schemes with special properties under a reasonable security model with data integrity auditing as the core,and the main contributions are as follows.1.To address the problems of user revocation efficiency and auditors stealing users’ original data in shared data auditing,a privacy-protecting data auditing scheme with user revocation mechanism is constructed based on the idea of zero-knowledge proof.The scheme significantly reduces the computational overhead of generating a new revocation user data label from a new one by updating part of the user’s private key by the group manager.In addition,it avoids the malicious behavior of auditors stealing the original user data during the data integrity audit by blinding the proof information through the cloud storage service provider.2.To address the efficiency of outsourced data deduplication and its security,a data integrity auditing scheme with deduplication is proposed through the non-tamperability of blockchain.The scheme is trusted by the trustworthy feature of blockchain for deduplication,which greatly reduces the storage burden of cloud storage service providers.In addition,data privacy is additionally protected by smart contracts,which avoids the auditing third party from recovering the user’s original data through the proof information responded by the cloud storage service provider. |