首页> 外文会议>Global Congress on Manufacturing and Management >Research on data security technology based on cloud storage
【24h】

Research on data security technology based on cloud storage

机译:基于云存储的数据安全技术研究

获取原文

摘要

With the development of cloud storage system and its application in complex environment, its data security has been more and more attention. On the one hand, node crashes or external invasion are likely to lead to incomplete data; on the other hand, when the data is incomplete, because the cloud service provider deliberately concealed or other factors, the user cannot be promptly informed of the change. In view of the above problems, this paper makes a deep research, and puts forward a secure storage system based on how to ensure the data availability when data integrity and data are not complete. In this paper, we begin with the availability of data; the research focuses on the confidentiality of data, the loss of data recovery and data recovery. In this paper, we propose a data secure storage scheme based on Tornado codes (DSBT) by combining the technique of symmetric encryption and erasure codes. Program uses boot password to solve the traditional data encryption in the problem of key preservation and management; system design by correcting Tornado data redundancy code delete code in order to solve problems and recover lost data; through a hash keyed to Tornado code with error correction function so as to solve the problem of data tampering. On this basis, the paper continues to carry out research on data retrieval (POR). Based on the classic POR algorithm based on BLS short signature, the trusted log is introduced, and the trusted log is used to provide the user with the test results. Finally, combined with the DSBT scheme, the computational efficiency of the POR algorithm is optimized, which has nothing to do with the file size, which can achieve the calculation complexity of the constant level. According to the above scheme, this paper implements a secure cloud storage prototype system based on Cassandra. The test shows that the system can provide strong data loss recovery ability, effectively resist the Byzantine fault, in the back of the desirable detection ability is also prominent, but also has very high computation efficiency, especially in the face of large files. This paper studies the modeling and analysis methods of some key problems of data security in cloud storage, such as encryption storage, integrity verification, access control, and verification and so on. Through the data segmentation and refinement rules algorithm to optimize the access control strategy, using the data label verification cloud data integrity, using replica strategy to ensure the data availability, the height of authentication to strengthen security, attribute encryption method using signcryption technology to improve the algorithm efficiency, the use of time encryption and DHT network to ensure that the cipher text and key to delete the data, so as to establish a security scheme for cloud storage has the characteristics of privacy protection.
机译:随着云存储系统的发展及其在复杂环境中的应用,其数据的安全性已受到越来越多的关注。在一方面,节点崩溃或外部侵袭很可能导致不完整的数据;在另一方面,当数据是不完整的,因为云服务供应商故意隐瞒或其他因素的影响,用户不能及时告知变更。鉴于上述问题,本文进行了深入研究,提出了一种基于如何确保数据的可用性时,数据完整性和数据是不完整的安全存储系统。在本文中,我们从数据的可用性;该研究主要集中在数据的机密性,数据恢复和数据恢复的损失。在本文中,我们通过组合的对称加密和纠删码的技术中提出了一种基于Tornado码(DSBT)中的数据的安全存储方案。程序采用开机密码,解决关键保存和管理的问题,传统的数据加密;系统设计者为了解决问题,并恢复丢失的数据修正龙卷风数据冗余代码删除代码;通过键固定到龙卷风码具有纠错功能,以解决数据篡改的问题的散列。在此基础上,本文继续开展数据检索(POR)的研究。基于基于BLS短签名经典POR算法,可信日志介绍,和可信日志用于提供与试验结果的用户。最后,结合DSBT方案中,POR算法的计算效率进行了优化,其中有无关的文件大小,它可以达到恒定水平的计算复杂度。根据上述方案,本文实现了基于Cassandra的一个安全的云存储原型系统。试验表明,该系统能够提供强大的数据丢失恢复能力,有效抵御拜占庭式的错误,在理想的检测能力,背面是也很突出,而且具有很高的计算效率,尤其是在大文件的脸。本文研究的数据安全的云存储的一些关键问题,如加密存储,完整性验证,访问控制和验证等建模和分析方法。通过数据分割和细化规则算法优化的访问控制策略,使用数据标签审核云数据的完整性,使用复制策略,以确保数据的可用性,认证的高度来加强安全性,属性加密方法采用签密技术,提高了算法的效率,使用时间加密和DHT网络,保证了密文和密钥删除数据,从而建立针对云存储的安全方案具有隐私保护的特点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号