| With the development of cloud computing,cloud computing has affected all aspects of mod-ern life,and cloud storage has become one of the most important applications of cloud computing technology.Because cloud storage uses cloud computing systems to store and manage user data,it can provide highly scalable and inexpensive storage services.But with transferring data from traditional servers to the cloud,users have lost direct control of the data.For cost savings or other malicious purposes,Cloud storage service providers may delete or falsify data,even transfer user data to illegal data center.For partially sensitive data,such as civic health records and insurance records.Since these data often involves cit-izens 'personal privacy and related laws,there is a limit to the actual storage location of it normally.Therefore,it is especially important to provide an efficient and secure data storage location verification mechanism.However,there is less research on the practicality of data storage location verification mechanism,and the experimental results of existing solutions are mostly based on the North American or European network environment.In this thesis,based on the application scenarios of cloud storage we studied the data storage location verification mechanism.Firstly,we constructed the system model of the cloud data storage location verification scheme,analyzed the attack that the scheme may suffer and we proposed the security target of our scheme.Based on the existing data integrity verification technology and IP location technology,we propose a cloud data storage location verification scheme and analyzed the security of it.And we designed experiments to measure and ana-lyze the domestic network environment.Using the result of the measurement and analysis,we implement our scheme in the domestic network environment.Then,we analyzed the main factors that may affect the verification accuracy and security of the scheme.Finally,we analyzed the performance of the scheme on computation overhead,storage overhead,communication overhead and location verification accuracy,and compared with the existing classical data location verification scheme.Through analysis and comparison,we think our scheme can resist the single adversary attack and meet the security target proposed in our thesis.And the location verification accuracy is better than the existing classical data location verification scheme.In the domestic network environment,our scheme can provide users with secure regional-level cloud data storage location verification services. |