Dissertation > Excellent graduate degree dissertation topics show

Rational Secret Sharing and It’s Application in Cloud Storage

Author: ZhengTao
Tutor: LinWenHao
School: Harbin Institute of Technology
Course: Computer Science and Technology
Keywords: rational secret sharing belief-based learning model reputationsystem cloud storage security
CLC: TP333
Type: Master's thesis
Year: 2013
Downloads: 29
Quote: 0
Read: Download Dissertation

Abstract


In recent years, the popularity of cloud storage services has increaseddramatically, individuals and especially business hesitate to entrust their data tocloud storage services since they fear that they will lose control over it. And thisprevents cloud storage development. Secret sharing scheme has been playing a keyrole in protecting data security, including preventing an attacker to destruct andtheft the data. So research of the secret sharing scheme not only has theoreticalsignificance, but promotes the cloud storage security. This article first reviewsseveral secret sharing schemes, analyze several classic secret sharing schemes, thenanalyzes the social-rational secret sharing scheme, which is a new direction in thisfield. This scheme uses individual s sociality, which means in social life, players areinvited to each game based on their reputation. They always seek to maximize theutility, and rational secret sharing.This thesis proposes a belief-based learning model based rational secretsharing, which bridges belief learning model, game theory, cryptography andreputation systems. Compare to the social-rational secret sharing scheme, thisscheme uses belief-based learning model, which the players can form beliefs aboutthe other players action based on the history. Then the players can make decisionsdepend on different situation to maximize his utility. Analysis shows that thisscheme can incent the players to cooperate.In this article, we apply the verifiable secret sharing scheme in the distributedfile system in cloud storage system. When the client uploads his data to the system,the data is split into pieces using secret sharing scheme, and store the shares on datanodes of the data clustering, when the client downloads the data, just a specificnumber of shares are needed to reconstruct the shares, the remaining shares are usedas data fault tolerance; A reputation system is build, when the nodes sent correctsecret shares, the reputation value increases, otherwise, the reputation valuedecreases. Analysis show that the system security has improved and data storagespaces have decreased. As we only need parts of the secret shares, the read timedecreases.

Related Dissertations

  1. Research of the Rational Secret Sharing Technology,TN918.1
  2. Research on Several Key Technologies of Rational Threshold Signature,TN918.2
  3. The Design and Implementation of Cloud Storage System Based on Homomorphic Encryption,TP333
  4. Research on security issues in cloud storage and its application,TP309
  5. Research of Cloud Storage Security Technology,TP309
  6. The Research of Security Technology on Cloud Storage,TP333
  7. Research and Implementation of FPGA-based Cloud Storage Security Systems,TP333
  8. Research and Implementation of Data Integrity Verification Mechanism in Cloud Storage,TP333
  9. Low Power SRAM Design Based on Data Retention Voltage (DRV) Scheme,TP333
  10. Design and Implementation of Distributed Video Storage System,TP333
  11. Research of Testing Methods and Set-up for Phase Change Random Access Memory,TP333
  12. Design of the EEPROM Trimming Circuit for the Integrated ATCXO,TP333
  13. The Circuit Design and Implementation of the Sense Amplifier in Nano-Crystal Memory,TP333
  14. High-Reliability Distributed iSCSI Storage System Based on Double-Stage RAID,TP333
  15. The Design and Implementation of USB Device Stack,TP333.2
  16. Design and Implementation of Authentication Mechanism in Object-based Storage System,TP333
  17. A Great Capacity Data Storage System Design,TP333
  18. The Research and Design of Storage Virtualization System Based on Out-of-Band Technology,TP333
  19. Based on data recovery disk filter driver model and implementation,TP333.35
  20. A new generation of versatile disc tracking servo control study,TP333.4
  21. Deduplication technology research and implementation,TP333

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Electronic digital computer (not a continuous role in computer ) > Memory
© 2012 www.DissertationTopic.Net  Mobile