Font Size: a A A

Research And Implementation Of Data Sharing Scheme In Cloud Computing

Posted on:2022-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:J J BaoFull Text:PDF
GTID:2568307049459684Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The emergence of cloud computing technology has prompted more and more companies and individuals to adopt this new IT model and outsource their data and services to the cloud.However,in the cloud storage of sensitive data,privacy leakage still exists.In order to reduce the risk of data leakage,data will be encrypted in outsourced storage.In order to protect user privacy,while ensuring that users can obtain the information they want more accurately,conveniently,and safely,and realize data sharing among users on the cloud platform,this paper focuses on the disadvantages of existing schemes that malicious users are difficult to be tracked,the data retrieval mode is inflexible and so on,proposes a cloud platform data sharing system scheme which is suitable for practical application scenarios.The main work of this paper is as follows:(1)For existing schemes,during the multimedia data sharing process,fine-grained access control of multimedia data is not supported,only limited user attributes and number of users are supported,data owners are difficult to track,and multimedia data sources are difficult to identify,the cloud is difficult provide immediate service and so on,this paper proposes a new data sharing and secure traceability scheme that supports fine-grained access control in fog-cloud computing network.First,this paper uses fog computing technology to transfer part of the computing overhead from the cloud to the fog server to improve communication efficiency,reduce network congestion,and adapt to application scenarios that require real-time data processing.Second,uses attribute-based encryption technology to achieve fine-grained access control to multimedia data files.Third,the algorithm designed in this scheme supports an extensible user attribute set and number of users to meet the needs of various practical application scenarios.Fourth,this scheme records the upload and modification history of encrypted multimedia files,and the data source can be easily verified,and the verification result is undeniable.When a user raises an objection to the validity of multimedia data,the key generation center can use a secure traceability algorithm to trace back to the identity information of the data owner based on the signature information of the file.Fifth,this paper has carried out system realization and performance analysis of this scheme,which verifies the correctness and practicability of this scheme.(2)In view of the existing schemes that still have the risk of a single point of failure,and cannot achieve flexible and efficient keyword search and user tracking in distributed scenarios,this paper proposes a dual traceable distributed attribute-based encryption scheme with subset keyword search.First,the system structure of this scheme includes a central certification authority and multiple attribute certification authorities.The attribute certification authority verifies the legitimacy of the user’s attributes and generates the attribute key,which greatly reduces the computational burden of the central certification authority.Second,this scheme achieves fine-grained access and search authority control,and uses polynomial interpolation to design more flexible subset keyword searches,which solves the problem that the existing scheme can only support single-keyword search or multi-keyword search.Third,this scheme uses zero-knowledge proof to simultaneously realize the anonymity and traceability of data owners and data users.Fourth,the scheme provides a lightweight verification mechanism to verify the correctness of the partial decryption work performed by the cloud server.Fifth,this paper has carried out system realization and performance analysis of this scheme,which verifies the correctness and practicability of this scheme.
Keywords/Search Tags:Cloud-fog Computing, Secure Provenance, Access Control, Distributed Attribute-Based Encryption, Subset Keyword Search
PDF Full Text Request
Related items