Font Size: a A A

Research And Implementation Of Cloud Storage Security

Posted on:2024-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhaoFull Text:PDF
GTID:2558307136495774Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and the widespread use of technologies such as cloud computing and the Internet of Things,people have an increasing demand for data processing and storage capacity in their daily life and work.However,traditional computer equipment and storage devices often cannot meet these demands.With the development of cloud computing,complex computing outsourcing services based on cloud computing have gradually emerged.For cryptographic applications,some computations(such as modular exponentiation and bilinear pairing operations,etc.)are too expensive.In this case,due to the small size design of most terminal devices and the requirement of power economy,the computing capacity is limited.Therefore,local users with limited resources can outsource the heavy computing tasks to cloud servers with strong computing power.However,since the cloud server is not completely trustworthy,there will inevitably be serious security issues when data is outsourced to the cloud server,such as the cloud server is vulnerable to forgery attacks,data loss or leakage,and whether the cloud server maintains the integrity of user data.Therefore,this thesis mainly focuses on secure outsourcing algorithms of modular exponentiation operations and remote data integrity verification schemes based on identity.The specific work is as follows:(1)New design of secure outsourcing algorithms for modular exponentiation operations.The efficient algorithm proposed by Ren et al.for dual servers secure outsourcing of modular exponentiation operations is analyzed,and it is found that users cannot actually verify the results returned by the cloud server based on the scheme.To address this problem,this article uses Euler’s theorem to propose a secure outsourcing scheme for modular exponentiation operations based on a two-server model.The new scheme has better execution efficiency and verifiability than the original scheme.(2)New design for remote data integrity verification scheme based on identity.The security of the remote data integrity verification scheme based on identity and cloud storage proposed by Li et al.is studied,and it is found that the scheme is vulnerable to forgery attacks.To address this problem,this article proposes an improved remote data integrity verification scheme based on identity based on Li et al.’s scheme.Through experimental simulation analysis,the new scheme can meet the security requirements of robustness and privacy,and the computational overhead is essentially consistent with the original scheme.(3)Implement the improved remote data integrity verification scheme based on identity.Based on the scheme proposed in work(2),a cloud storage management system is implemented using the Vue.js framework,Java Script language,Java language,and Spring Boot framework.The system not only implements basic functions such as user file uploading,downloading,and deletion,but also provides the function of verifying the integrity of user data stored in the cloud storage server according to the scheme.
Keywords/Search Tags:Cloud storage, Modular exponentiation, Data integrity, Privacy preserving, Data security
PDF Full Text Request
Related items