Font Size: a A A

Data Integrity Audit Scheme For Data Deduplication And Privacy Protection In Cloud Storage

Posted on:2024-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:K D ZhaoFull Text:PDF
GTID:2568307172951679Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud storage services offer advantages such as large storage space and high efficiency,resulting in low-cost management of large amounts of data.However,the integrity of most users’ data is not always guaranteed.To check the integrity of user data without downloading it,many remote data integrity auditing schemes have been developed.Third-party auditing agencies(TPAs)are often employed to audit data integrity to enhance the efficiency of integrity auditing for shared data among user groups.Unfortunately,TPAs are not completely trustworthy and may attempt to access users’ data and identity privacy during the auditing process.Additionally,revoking users in a shared group leads to significant computational and communication costs.Moreover,most existing solutions ignore the problem of duplicate file deduplication on cloud servers,leading to a significant reduction in storage efficiency.This article proposes two solutions to address these issues.Firstly,a data integrity auditing scheme that protects users’ privacy and security in cloud storage is proposed.This scheme uses group signature technology to protect users’ identity privacy,ensuring that third-party auditors cannot obtain users’ identity information.During the data integrity auditing process,the cloud server applies hash processing to the data,making it impossible for third-party auditors to calculate users’ data.Furthermore,during the file upload process to the cloud service,clients can perform file deduplication processing to avoid duplicate file storage on the cloud server.When dishonest users appear in the group,the administrator can quickly trace their identity.Theoretical analysis shows that the proposed scheme is effective and feasible for practical applications.Secondly,a publicly auditable data integrity scheme based on certificateless technology for group sharing is proposed.This scheme uses certificateless signature technology for authenticator generation,avoiding the disadvantage of traditional public key infrastructure(PKI)bearing a huge certificate burden while also avoiding the difficulty of key hosting in identity-based cryptography(IBC).The publicly auditable data integrity scheme also supports user revocation.The cloud server recalculates and generates the authentication block for revoked users,thereby reducing computational costs on the user side.The security of the proposed scheme is analyzed,and it is shown to be resistant to forgery attacks.Finally,the performance of the proposed scheme is analyzed in detail,and experimental results show that it has low computational and communication costs and is feasible and effective in practice.
Keywords/Search Tags:Data Integrity Audit, Shared Data, Identity Privacy Protection, User Revocation, Deduplication Storage
PDF Full Text Request
Related items