Font Size: a A A

Secure Verifiable Integrity Security Protocols For Outsourced Data In Cloud Storage

Posted on:2020-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:T X ZhangFull Text:PDF
GTID:2558307109474414Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of cloud storage technology,a large amount of data is stored in the cloud server.While cloud storage technology offers a lot of convenience,a fully trusted cloud service provider doesn’t exist.The availability and integrity of data uploaded by user is not guaranteed by the cloud server.In order to prevent data resources from being maliciously falsified,the data needs to be periodically checked by the user for integrity verification to ensure data availability and integrity.In this regard,a number of verifiable integrity audit protocols have emerged.Current audit protocols can be divided into three main categories:integrity-based auditing schemes based on message authentication codes,RSA and bilinear pairings.The corresponding solutions are provided by these security models and solutions according to different threat models to meet the different requirements of data storage integrity in cloud storage.However,these solutions still have security risks.The neglect of counter-rejection and interaction fairness is the most significant.The cloud server or user can deny what they are doing.In this way,there will be unfair situations on both sides of the agreement.Therefore,this paper focuses on the issue of non-repudiation and interaction fairness in audit protocols.Main tasks as follows:1)Aiming at the problem of non-repudiation security guarantee in the existing cloud storage auditable scheme,a secure cloud storage protocol based on blockchain-based verifiable integrity is provided by the author.Blockchain technology was introduced by the author.A transaction log that is irresistible to both parties is effectively recorded by this program.The fairness of both parties in this agreement is guaranteed in the static data integrity verification protocol.Both parties to the agreement conduct mutual verification through the smart contract.In this way,the operation of the other party is honest and cannot be tampered with.Under the standard model,this paper discusses the correctness of the scheme,the unchangeability of the audit and the fairness of the interaction.The experiment was simulated.In contrast,the memory footprint of the protocol has a disadvantage,but it is greatly enhanced for the original program in terms of non-repudiation and fairness of the two parties.2)A secure cloud storage protocol based on blockchain-based verifiable integrity for dynamic data was constructed by the author.Dynamic operations for user data modification,deletion,and addition have been added to the protocol.The file can still be safely verifiable integrity checked after these operations.Complete revision records can be checked by the user and these records are not tamperable.In the new scheme,the modified records and file modification records of the dynamic data index are packaged into transactions.The transaction is then posted to the blockchain network.The unchangeable modification of the revised record was achieved by our program.The security of the dynamic audit protocol is analyzed by the author in the case of forged attacks,replay attacks,and auditor attacks in the server.Finally,we carried out an experimental simulation of the program.In contrast,memory footprint has no significant gap with the solution.Our solution implements a dynamic audit of the data with a similar memory footprint.The agreement is more in line with the actual needs of the cloud environment.
Keywords/Search Tags:cloud storage, audit, block-chain, nonrepudiation, verifiable
PDF Full Text Request
Related items