当前位置:主页 > 科技论文 > 软件论文 >

云计算中外包数据可验证删除关键技术研究

发布时间:2023-04-01 13:04
  云计算通过外包技术将计算、存储、网络等虚拟资源以按需付费的方式提供给用户,降低用户资源的使用和管理成本。云存储是云计算提供的最具吸引力的服务之一,它允许资源受限的用户将本地无法储存的数据外包到云服务器,从而大大减轻本地的存储负担。然而,云存储中外包数据所有权和管理权的分离,使得用户失去了对外包数据的物理管控,因而引发了一系列亟需解决的数据安全问题,特别是外包数据确定性删除,已经引起了国内外学者的高度关注。外包数据的确定性删除是外包数据生命周期的最后阶段,直接决定着外包数据生命周期能否可靠终结,对于外包数据安全和用户隐私保护具有重要的影响和意义。然而,传统针对本地数据的删除方法不能直接应用于云环境下外包数据的删除。因此,如何实现云计算环境下外包数据的可验证删除成为学术界和产业界面临的一个严峻的技术挑战。近年来,围绕外包数据删除结果的公开可验证性、大规模外包数据删除的高效性、迁移数据删除的可靠性等方面的需求,许多学者对外包数据可验证删除技术进行了广泛的研究。然而,现有的外包数据删除方案仍存在以下几个方面的问题和挑战。首先,在静态外包数据删除场景中,现有方案依赖可信第三方进行密钥管理和数据删...

【文章页数】:117 页

【学位级别】:博士

【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
    1.1 Background
    1.2 Related Work
    1.3 Our Contributions
    1.4 Organization
Chapter 2 Preliminaries
    2.1 Bilinear Pairings
    2.2 Merkle Sum Hash Tree
    2.3 Blockchain Technology
    2.4 Vector Commitment
    2.5 Counting Bloom Filter
    2.6 Invertible Bloom Filter
    2.7 Summary
Chapter 3 Publicly Verifiable Data Deletion Scheme based on Blockchain
    3.1 Overview
    3.2 Our Proposed Scheme
        3.2.1 System Model
        3.2.2 Main Idea
        3.2.3 The Concrete Construction
    3.3 Analysis of Our Scheme
        3.3.1 Security Analysis
        3.3.2 Efficiency Analysis and Comparison
    3.4 Performance Evaluation
    3.5 Summary
Chapter 4 Verifiable Data Deletion Scheme with Insertion Operation from MerkleSum Hash Tree
    4.1 Overview
    4.2 Our Proposed Scheme
        4.2.1 Main Idea
        4.2.2 The Concrete Construction
    4.3 Analysis of Our Scheme
        4.3.1 Security Analysis
        4.3.2 Efficiency Analysis and Comparison
    4.4 Performance Evaluation
    4.5 Summary
Chapter 5 Verifiable Data Deletion Supporting Secure Data Transfer from VectorCommitment
    5.1 Overview
    5.2 Our Proposed Scheme
        5.2.1 System Model
        5.2.2 Main Idea
        5.2.3 The Concrete Construction
    5.3 Analysis of Our Scheme
        5.3.1 Security Analysis
        5.3.2 Efficiency Analysis and Comparison
    5.4 Performance Evaluation
    5.5 Summary
Chapter 6 Verifiable Data Deletion Scheme with Efficient Data Transfer from Count-ing Bloom Filter
    6.1 Overview
    6.2 The Basic Scheme
        6.2.1 Main Idea
        6.2.2 The Concrete Construction
        6.2.3 Security Analysis
    6.3 The Enhanced Scheme
        6.3.1 The Concrete Construction
        6.3.2 Efficiency Analysis and Comparison
    6.4 Performance Evaluation
    6.5 Summary
Chapter 7 Conclusion and Future Work
    7.1 Conclusion
    7.2 Future Work
Bibliography
Acknowledgement
作者简介



本文编号:3777195

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/3777195.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户2beac***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com