Font Size: a A A

Research On Key Technologies Of Data Security In Cloud Computing Based On Erasure Codes

Posted on:2021-04-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:J C BianFull Text:PDF
GTID:1368330605981241Subject:Information security
Abstract/Summary:PDF Full Text Request
Cloud computing can provide users with flexible and powerful computing and storage capabilities.Especially with the development of new technologies such as big data and artificial intelligence,cloud computing,as the basic platform of relevant technologies,becomes particularly important in terms of data security.The traditional security schemes obviously cannot adapt to the characteristics of cloud computing.When dealing with massive data storage under the large-scale distributed architecture,it highlights the disadvantages such as high computational complexity,high resource cost and difficult ciphertext processing.Therefore,the establishment of an efficient and flexible data security mechanism suitable for the cloud computing environment has become the research focus of cloud computing technologies.By analyzing the characteristics of cloud computing environment and the deficiencies of existing security schemes,this paper proposes a erasure code scheme against mixed error model,a weakly security scheme based on regenerating codes and a data integrity verification scheme based on erasure codes,aiming at the security risks related to the availability,confidentiality and integrity of data in the cloud computing environment.The research contents of this paper are as follows:1.In terms of data availability in the cloud computing environment,two erasure codes schemes,IIDR and IR-RBT,are proposed.Firstly,aiming at the mixed error model in which disk errors and in-disk errors(latent sector errors)coexist,an erasure code is proposed to optimize the performance of the mixed error model.On this basis,combined with the characteristics of the distributed environment,a regenerating code scheme IR-RBT was proposed to optimize the performance of intra-node error repairing,and the computation and communication cost was reduced,but this leads to decreased storage utilization.IR-RBT scheme allocates redundant data and repair relationship according to the actual situation of each node,which reduces the amount of data read in the repair phase under a certain storage utilization.Theoretical analysis shows that the proposed scheme has lower computation and communication cost under the mixed error model.2.In terms of data confidentiality in the cloud computing environment,the security of the existing erasure codes is analyzed based on the weakly secure method,and a regenerating code scheme that optimizes the weakly secure is proposed.Most of the existing studies roughly divide different schemes into "perfect secure" and "weakly secure".Based on the classification method of weakly secure,this paper analyzes the weakly secure level of erasure codes,PM-MSR codes and IR-RBT codes based on the Vandermont matrix and Cauchy matrix,and proposes the optimal solution of the weakly secure.On this basis,a new scheme to improve the level of weakly secure of PM-MSR code is proposed.The analysis shows that the proposed scheme has a high level of weakly secure,but it increases part of the computational cost.3.In terms of data integrity in the cloud computing environment,data integrity verification schemes based on LDPC code and IR-RBT code are proposed.As most of the existing integrity verification schemes are based on traditional cryptography and have high computational complexity,this paper proposes a scheme of integrity verification based on erasure code coding features.The LDPC codes were randomly constructed and used for data encoding.Finally,the characteristics of linear block codes were used for verification.On this basis,combined with the characteristics of the distributed environment,a data integrity verification scheme based on IR-RBT code is proposed.IR-RBT has better performance in repairing bandwidth and reading I/O.On the other hand,in the distributed environment,the scheme can verify different nodes independently without requiring all nodes to be online at the same time.Theoretical analysis and experimental results show that the proposed scheme has low computational,communication and storage costs.Above research is conducted based on the analysis of the existing cloud computing environment characteristics and data security requirements,in view of the shortcomings of existing cloud computing data security solutions.The schemes of data availability,confidentiality and integrity based on erasure codes in the cloud computing environment are proposed,which has certain theoretical significance and practical value for the security and development of cloud computing related technologies.
Keywords/Search Tags:Cloud computing, Data security, Erasure codes, Regenerating codes, Weakly secure, Data integrity verification
PDF Full Text Request
Related items