Font Size: a A A

Outsourced Storage Environment, Data Sharing, Security Program

Posted on:2011-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2208360308466669Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
For the enterprises which need to store large amounts of data and handle users'requests anytime, the storage management such as disaster recovery, performance diagnosis and optimization, security analysis, makes the expenses more and more expensive. Enterprises need to search for more efficient ways to perform data storage and management, outsourcing storage service can meet this demand.Data is stored by the storage service provider (SSP) site, the SSP is responsible for storage management, and charge the enterprises based on the occupied storage space and bandwidth. Thus enterprises avoid space wasted by the self-built data center of storage and the expensive data management.With the rapid development of outsourcing storage services, the credibility of the storage issues becomes increasingly important: how to guarantee the data is not tampered with, the data is not illegal to read, and SSP does not exaggerate the use of the user.This paper focuses on how to ensure the confidentiality of the outsourced data to the SSP in the untrustworthy environments. This is the most basic and important aspects to protect the security of storage outsourcing. Furthermore, how the users of the enterprises can share data between each other like in the local data center, is the second research focus of this article.Based on the above two points, this paper designs an Encrypting File System, which includes the access information in the data to be outsourced. It not only protects the confidentiality of data, but also implements the access control. Meanwhile, the key generation, distribution and revocation are completely invisible to the users, reducing the key management overhead.In short, this thesis aims to address how enterprises conduct safe storage outsourcing in the case that the SSP is not trust, and how users in the enterprises effectively share data.
Keywords/Search Tags:SSP, outsourced storage, access control, confidentiality, key-management
PDF Full Text Request
Related items