Font Size: a A A

Research That Can Prove Data Holding Technology

Posted on:2021-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:X R LiFull Text:PDF
GTID:2438330611992864Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of the big data technology,the amount of the data owned by users is getting larger and larger.These massive amounts of data may exceed the storage capacity of individual users,making it difficult for users to achieve the goal of completely storing massive amounts of data locally.In this context,cloud storage technology came into being and was widely accepted.Cloud storage technology can store users’ massive amounts of data on cloud servers,reducing the local storage burden on users.Currently,more and more users choose to store their data on cloud servers.While bringing a lot of convenience to users,cloud storage technology also creates new security issues.As users upload data to the cloud server,they lose direct control over the data.How to detect the integrity of data stored on the cloud safely and efficiently becomes an important security issue.Provable data possession(PDP)technology has been a research hot topic of cloud storage security in recent years.It can detect the integrity of cloud data without downloading all the data.This article mainly researches the PDP technology,including:(1)Aiming at the key escrow problem in identity-based provable data possession technology,a certificateless provable data possession scheme was proposed.Identity-based provable data possession technology can effectively simplify complex certificate management operations.In this technology,the user’s identity replaces the public key.And the user’s private key is calculated by the Key Generation Center(KGC)according to the user’s identity.However,this technology has the problem of key escrow,that is,KGC can fully know the user’s private key.In order to avoid key escrow,a novel key generation strategy is given in the proposed scheme.The user’s final private key is expressed as the product of two parts by the technology of the multiplication sharing,one part is generated by KGC according to the user’s identity,the other part is generated by the user alone.Through this strategy,KGC cannot obtain the user’s final private key,thereby solving the key escrow problem.(2)Aiming at the problem that data can be uploaded arbitrarily in the case of data group sharing,a certificateless provable data possession scheme with data upload management and control is proposed.This solution uses secret sharing and authority management technology,which can effectively implement the management and control of data upload,avoid the behavior of random data upload,and use certificateless cryptography to solve the problem of complex certificate management and key escrow.The performance analysis of the scheme is also given.The analysis results show that the proposed scheme is efficient.(3)A security analysis was performed on a provable data possession scheme proposed by Fan et al.The analysis results show that as long as the cloud has a valid data block and its corresponding verification signature,it can arbitrarily delete or modify otherdata files,and forge the proof successfully which can pass the the auditor’s verification.Therefore,this solution is completely insecure.
Keywords/Search Tags:Cloud storage, PDP, Replay attack, Certificateless, Data upload control
PDF Full Text Request
Related items