云存儲中數(shù)據(jù)完整性的聚合盲審計方法研究
[Abstract]:Cloud storage is an important service in cloud computing that allows data owners to host their data in a cloud server and provide data access to users through the network. Through the outsourced service of this data, it can bring a lot of convenience to the data owners: 1) reduce storage management pressure; 2) reduce storage hardware and software and data dimension. At the same time, cloud storage also brings new security problems. When data is stored in the cloud, the security is highly dependent on cloud service providers. In fact, cloud service providers are not completely trusted. First, natural disasters, hardware failures, and software reasons. Barriers and hacker attacks inevitably cause data loss. Secondly, cloud service providers may take untrusted behavior for data owners' data, such as saving storage space by discarding data that is not or rarely accessed, or concealing data damage events to maintain their reputation. The integrity of data owner data is not guaranteed. The integrity verification method based on the traditional signature or message validation code needs to download all the original data from the cloud server first, and then verify the correctness of the corresponding signature or message authentication code. In the cloud storage environment, the method is very inefficient because of the large amount of data. The third party audit method is the research hotspot in recent years. The data owner blocks the data file and calculates the corresponding data labels for each data block. The data block and label are stored in the cloud. The auditor checks the integrity of the data by sampling the matching of the part of the data block to the label. The advantages are: 1) no need to download all the original data.2) to delegate the audit to the auditor, reduce the burden of the data owner.3) to provide a fair and credible audit result for the data owner and the cloud server. In the third party audit process, the auditor must be blinded on the premise that the data is not available. Otherwise, it will bring new security issues to the owner's data. When many users in the group can access and modify the same data file in the cloud, the integrity audit of shared data is faced with new challenges, such as identity privacy protection and user revocation. Data owners are concerned with their data integrity. At the same time, cloud service providers also pay attention to storage efficiency. When considering duplication of data deletions and integrity audits, the integrity audit of heavy censored data faces new challenges, such as repeated data deletions and repeat label deletions under the case of ciphertext, and how to carry out integrity audits after heavy censoring. When inspecting the cloud end When data is destroyed or lost, data owners are more concerned with whether the data being destroyed or lost can be repaired. When considering the integrity audit of the regenerated code storage data, it faces new challenges, such as the integrity audit and error location of the distributed storage, the pollution attack of the repair process, and the support for the update of the coded data. This paper studies the audit of data integrity in the cloud storage from four aspects, such as personal data, shared data, ciphertext censored data and regenerative code storage data, and puts forward the different key problems in different cases. The main work of this paper can be summarized as follows: (1) a blind audit method of personal data integrity based on bilinear map encryption is proposed. First, the framework of the personal data blind audit scheme is designed and the corresponding definition is given. The definition is composed of 5 algorithms. Using the properties of the bilinear pairing, the data evidence and the label evidence are encrypted and consolidated on the cloud server side. The present auditor performs a blind audit without knowing the content of the data. Secondly, the efficient index mechanism is designed to support the data updating, so that the data update operation does not lead to a large amount of additional computing and communication overhead and realizes the dynamic audit. Finally, the different methods of aggregation of evidence are designed to support multiple audit requests. The batch audit of multi cloud server multiple files makes the communication overhead of batch audit unrelated to the number of audit requests. The theoretical analysis and experimental results show that the method is proved to be safe. Compared with the existing schemes, the proposed scheme effectively improves the audit efficiency. (2) a kind of shared data integrity based on proxy re signature is proposed. The framework of the blind audit scheme of the shared data is designed and the corresponding definition is designed. The definition is composed of 6 algorithms. Combining the characteristics of the shared data, the identity privacy protection and the user revocation problem in the audit process are focused on. The proxy resignature method is used to calculate the label evidence when the labels of other users are transferred. This method also makes the audit cost unrelated to the user data. This method also implements the user direct revocation without recalculating the label of the revoked user's signature. Detailed security analysis shows that the scheme of this chapter is proved to be safe. Compared with the existing scheme, The efficiency of audit and user revocation is improved. (3) a blind data integrity audit method based on agent re encryption is proposed. The framework of the blind audit scheme of ciphertext re censoring data is designed and the corresponding definition is given. The definition is composed of 7 algorithms. In the same framework, the repeated data deletion of the client ciphertext is realized. And cloud data integrity audit. Using the agent re encryption method, there is no restriction on the encryption key of the owner. A new label generation method is designed to realize the tag deletion, which makes the storage cost unrelated to the number of the owners. At the same time, the auditor can verify the integrity of the deleted data on behalf of the owner of the data. The detailed security analysis shows that the scheme of this chapter is proved to be safe. Compared with the existing schemes, it improves the efficiency in audit and censoring. (4) a blind audit method of data integrity for regenerated codes based on incremental matrix is proposed. The framework of the regenerated code storage number based blind Audit Scheme is designed and the corresponding definition is given. The definition is composed of 10 algorithms. The auditor can not only verify the integrity of the data stored on different servers, but also quickly locate the wrong server. The integrity check is carried out to prevent the cloud server from launching pollution attacks. In order to support the dynamic audit, the incremental matrix and index machine are proposed. The data update method makes the data update without the need to re download and code the cloud data. Detailed security analysis shows that the scheme is proved to be safe. The experimental results verify the efficiency of the scheme.
【學位授予單位】:武漢大學
【學位級別】:博士
【學位授予年份】:2016
【分類號】:TP333
【相似文獻】
相關期刊論文 前10條
1 李師謙;基于雜湊函數(shù)的數(shù)據(jù)完整性研究[J];山東理工大學學報(自然科學版);2003年03期
2 高春玲,張新顏;數(shù)據(jù)完整性機制的認識與應用[J];洛陽大學學報;2003年04期
3 武立福,毛宇光;多級安全數(shù)據(jù)庫保密性和數(shù)據(jù)完整性研究[J];計算機工程與應用;2004年08期
4 溫一軍;數(shù)據(jù)完整性應用的深入研究[J];沙洲職業(yè)工學院學報;2004年01期
5 郭艷光,于慶峰,胡敏,高明堂;淺析數(shù)據(jù)完整性問題及應用[J];內(nèi)蒙古石油化工;2004年06期
6 劉慧娟,張奕黃;嵌入式系統(tǒng)中閃存數(shù)據(jù)完整性處理方法[J];儀器儀表學報;2004年S1期
7 張華偉;楊凱;;Microsoft SQL Server 2000中的數(shù)據(jù)完整性機制探討[J];河南科技;2007年03期
8 龍映宏;;淺析數(shù)據(jù)完整性及其實現(xiàn)[J];電腦編程技巧與維護;2009年24期
9 張俊楷;谷小婭;;空氣質(zhì)量監(jiān)測系統(tǒng)數(shù)據(jù)完整性研究[J];電腦知識與技術;2013年19期
10 閃四清;數(shù)據(jù)完整性[J];個人電腦;1999年08期
相關會議論文 前5條
1 劉慧娟;張奕黃;;嵌入式系統(tǒng)中閃存數(shù)據(jù)完整性處理方法[A];第二屆全國信息獲取與處理學術會議論文集[C];2004年
2 曹丹陽;;數(shù)據(jù)完整性的檢測研究[A];中國計量協(xié)會冶金分會2008年會論文集[C];2008年
3 曹丹陽;;數(shù)據(jù)完整性的檢測研究[A];2008全國第十三屆自動化應用技術學術交流會論文集[C];2008年
4 彭涼;賴繼宏;梁余發(fā);;MES中數(shù)據(jù)完整性的解決方案[A];冶金企業(yè)MES和ERP技術實踐論文集[C];2005年
5 吳愛珍;;CICS與數(shù)據(jù)完整性[A];中國航海學會內(nèi)河船舶駕駛專業(yè)委員會學術年會論文集[C];2004年
相關重要報紙文章 前3條
1 記者 劉學習;NonStop拒絕宕機惡夢[N];計算機世界;2003年
2 本報記者 周蕾;期待NonStop的新成長[N];網(wǎng)絡世界;2003年
3 賽迪評測硬件與網(wǎng)絡事業(yè)部網(wǎng)絡通信實驗室;十項考驗煉“真金”[N];通信產(chǎn)業(yè)報;2004年
相關博士學位論文 前4條
1 張新鵬;云數(shù)據(jù)完整性與可用性研究[D];電子科技大學;2016年
2 何凱;云存儲中數(shù)據(jù)完整性的聚合盲審計方法研究[D];武漢大學;2016年
3 郝卓;遠程數(shù)據(jù)完整性和認證技術研究[D];中國科學技術大學;2011年
4 周強;無線傳感器網(wǎng)絡安全數(shù)據(jù)融合技術研究[D];南京郵電大學;2014年
相關碩士學位論文 前10條
1 董慶運;基于存儲證據(jù)的云端數(shù)據(jù)完整性驗證機制研究[D];河北大學;2015年
2 陳科;基于動態(tài)變色龍認證樹的流式數(shù)據(jù)完整性驗證研究與應用[D];東北大學;2014年
3 孟奕光;橋梁長期監(jiān)測數(shù)據(jù)完整性研究[D];石家莊鐵道大學;2016年
4 王士雨;高效的云端數(shù)據(jù)完整性驗證機制研究[D];電子科技大學;2016年
5 陳陽;云環(huán)境下基于身份的數(shù)據(jù)完整性證明的研究及應用[D];電子科技大學;2016年
6 吳遠棟;云存儲下數(shù)據(jù)完整性和安全性研究[D];長安大學;2016年
7 楊光洋;云計算外包存儲中數(shù)據(jù)完整性審計的研究[D];青島大學;2016年
8 鄭平;在藥品生產(chǎn)質(zhì)量管理體系中的數(shù)據(jù)完整性[D];上海交通大學;2015年
9 孫志峰;云存儲中能量有效的數(shù)據(jù)完整性校驗算法研究[D];東華大學;2016年
10 于美麗;云存儲數(shù)據(jù)完整性校驗中數(shù)據(jù)抽樣算法的研究[D];東華大學;2015年
,本文編號:2144086
本文鏈接:http://www.wukwdryxk.cn/shoufeilunwen/xxkjbs/2144086.html