Privacy Protection of Cloud Computing Based on Strong Forward Security

Privacy Protection of Cloud Computing Based on Strong Forward Security

Fengyin Li, Junhui Wang, Zhihao Song
Copyright: © 2023 |Pages: 9
DOI: 10.4018/IJCAC.323804
Article PDF Download
Open access articles are freely available for download

Abstract

Cloud computing is a new information technology. It is the product of the scientific and technological development of the times and plays an important role in the development of this country. In order to effectively solve the security problem of cloud computing data access, an identity-based privacy protection algorithm for cloud computing is proposed. The user information is stored in the cloud server at the registration stage, and the user identity is verified by signature when the information is obtained. The strong forward secure signature scheme can ensure that the signature is both forward secure and backward secure. At present, most signature schemes based on lattice focus on forward security. Therefore, this article constructs a strong forward secure signature scheme based on lattice and applies this signature scheme to cloud user authentication to ensure security.
Article Preview
Top

Introduction: Privacy Protection Of Cloud Computing Based On Strong Forward Security

Due to the advantages of cloud computing, users gradually outsource some data analysis businesses to professional cloud service providers. Compared with other information technologies, it has incomparable storage advantages, but there is also a certain disadvantage, that is, the security of personal information cannot be effectively guaranteed in the cloud computing environment (Yudong, 2019).User data security and privacy protection is one of the most important issues in cloud computing environment. Cryptography technology is usually used to protect data security and privacy (Xiaodong, 2022).

In recent years, a new generation of services based on the concept of “cloud computing” has been continuously improved, aiming to provide access to information and data anytime and anywhere by limiting or eliminating the demand for hardware equipment (Stergiou, 2018).With the widespread use of cloud computing, the gap between the development speed of cloud computing technology itself and the development speed of the corresponding security technology is gradually increasing, and the cloud security problem is increasingly prominent (Zhang, 2022).

Although cloud computing has many advantages, it also has some problems, such as the load on the cloud is too large to effectively allocate resources between computers and servers. This problem can be solved by using two-stage load balancing algorithm (Kumar, 2021). If it is too limited by delay and bandwidth, the virtual machine migration method based on optimization algorithm can be used to solve the problem (Ashok, 2022). Detecting the abnormal power consumption behavior of users is also a major concern in the field of intelligent energy. The abnormal energy consumption of users can be detected by a new method based on hourly energy consumption readings and peak energy consumption (Lehsaini, 2021).

In the age of big data, data security is the most concerned issue of ordinary people. Cloud computing is a new technology that is undergoing great development. People who use it cannot avoid the reasonable and unreasonable disputes caused by the security requirements in the cloud. It is absurd to say that cloud computing will not create new security problems (Tsochev, 2022).The cloud server is not completely reliable, and the user's security data may be leaked. A data sharing method based on SKC provides high efficiency and high security. It effectively meets various security characteristics, such as tamper resistance, openness and decentralization (Naveen, 2021).Cloud computing can be applied to the Internet of things. However, since the Internet of things is based on the Internet and all the data collected by the devices are on the Internet, the devices that collect information also face threats to security and privacy. The most commonly used technology in the physical or sensor layer of IOT devices is RFID. Therefore, protecting RFID tags through password mechanism can protect our data security in the process of equipment and communication (Gupta, 2020).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing