Font Size: a A A

Research And Application Of Data Security Protection System In Cloud Environment

Posted on:2018-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:H B MaoFull Text:PDF
GTID:2348330536477501Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of computer science and Internet technology,cloud computing,which is becoming more and more popular,has become a rising star in the world of information industry.Cloud computing relies on its huge resource system to provide users with a variety of efficient services,and brings huge value and economic benefits to the market.Due to the huge scale of cloud computing system and unprecedented openness and complexity in cloud environment,cloud computing exposes many security problems.Among them,the data security is the most prominent,it is also the focus of attention for cloud users.For cloud computing security issues,major application agencies and researchers have proposed cloud security architecture,which data security has become the focus of cloud security research.A data security protection system based on personnel,network,cloud data security and infrastructure security to achieve the goal of protecting data confidentiality,integrity,and availability from the cloud environment data of the life cycle,and combined with the characteristics of cloud environment data is proposed in this paper,and the corresponding strategies of safety technology is also putted forward.For easy to overlook cloud service providers internal personnel security issues,based on identity authentication and account certificate and role based access control strategy is proposed in this paper,and from the cloud security standards and legal protection analysis,the cloud safety assessment system and legal measures to provide a strong guarantee for data security protection is proposed in this paper.In the application aspect mainly studied the question which the ciphertext retrieval brings under the cloud environment,and the personal medical information database outsourcing encrypted query is used as the application scenario.The methods include data encryption and ciphertext retrieval,firstly,the data encryption method is researched and designed,including the use of SHA and RSA keyword encryption method,and AES and RSA combination of medical information encryption method.In the part of ciphertext retrieval,a password authentication method based on user private key signature is designed,when the user inputs query keywords,using the same SHA encryption,then the user's identity information to the private key of RSA and SHA to generate the ciphertext encrypted keywords information upload,the authentication is passed,the implementation of the corresponding SQL queries,and returns the results at the client,and decrypts the ciphertext.Finally,experiment and application through Eclipse and MySQL database software design methods,according to the experimental results,the retrieval of encrypted data encrypted data retrieval the cloud environment,not only has good performance,and high safety,in the data transmission,storage,isolation and other aspects,the method effectively protect the security of data.
Keywords/Search Tags:cloud computing, data security, encryption, ciphertext retrieval
PDF Full Text Request
Related items