Research on data integrity verification of cloud Group
Source: Internet
Author: User
KeywordsCloud computing dynamic group identity privacy data integrity validation group sharing data
Research on data integrity verification of cloud Group
University Wang Boyang
In this paper, we design several different cloud groups to share data integrity verification scheme to solve several different key problems separately. Specifically, the main contribution of this paper can be summed up in the following aspects. (1) We propose a publicly verifiable data integrity detection scheme-–panda [1,4]. The scheme can efficiently detect the integrity of shared data stored in cloud groups and can support efficient user revocation. By using the technology of proxy re-signing, the user can outsource the cost of the user's revocation to the cloud under this scheme, which improves the efficiency of the user's revocation process fundamentally. Our security analysis is strictly proof of the security of the scheme. Compared with the existing work, experimental data show that the scheme can support effective user revocation on different platforms, such as PCs or mobile phones. (2) We designed a data integrity verification scheme to protect the privacy of group Users-–oruta [2,9]. The scheme can efficiently detect the shared data of the groups stored in the cloud, and protect the identity privacy of the group users-– that the public verifier is unable to know the identity privacy of the group user in verifying the integrity of the data. In addition, the scenario can support batch validation of multiple validation tasks (Batch auditing)-– that is to further improve the validation efficiency of multiple tasks by simultaneously validating multiple validation tasks. (3) We have constructed a privacy-protecting data integrity verification scheme-–knox[10]. Compared with previous scheme Oruta, the scheme can still protect the identity privacy of group users, and the scheme has better efficiency when the number of group users is high. In addition, the program can provide tracking functionality on the basis of secure identity privacy (i.e. trusted group managers can reveal the identity of group users when necessary). (4) Through the combination of dynamic broadcast encryption and proxy re signature, we design a scheme to verify the integrity of shared data of cloud Group [8]. Compared with the existing scheme, the scheme only needs to introduce a small communication overhead, and the scheme can effectively support the dynamic group (that is, the group user's revocation and the new user's joining). (5) by introducing a security intermediary (Securitymediator) into the system model, we propose a publicly verifiable data integrity detection scheme [5]. By using the idea of blind signature, the scheme can effectively protect the privacy of group users in the process of cloud data integrity verification. Compared with our previous scheme, this scheme has obvious advantages in storage cost, computational overhead and so on.
Research on data integrity verification of cloud Group
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.