Font Size: a A A

Research On Key Security Technology In Cloud Storage And System Implementation

Posted on:2014-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y K FuFull Text:PDF
GTID:2248330398470637Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The off-premises storage paradigm that comes with cloud storage has incurred great concerns on the security of data.On the one hand,storage nodes crashes or an external invasion both endanger the integrity of data.On the other hand,users may not be able to know the changes of data availablity timely,if the cloud service provider is deliberately withholding information to reduce economic loss or other cases.In response to these issues,this paper carried out in-depth research and provide a security storage system.Our research first concentrated on the confidentiality of data,the recovery of loss data and the repair of error data.We provide a security scheme for the data stored in a remote cloud storage system,and the scheme is based on symmetric encryption technology and erasure codes.Boot password is adopted to avoid the problem of key preservation and management which used in traditional symmetric encryption technology and tornado code is introduced as the basis for the redundant system to overcome the lost data recovery issues.To the end,keyed-Hash which adds additional error correction function to the tornado code is brought forth to solve the problem of tampering of data.Then the research turned into the proof of retrievability(POR).Paper presents a new POR system based on BLS short signature.Trusted log are introduced to provide audit results to users.The new POR system combines the previously described scheme to optimize the computational efficency and the computing time is independent with the file size.According to the scheme proposed above,we implementation security cloud storage system.The simulation results show that the system is powerful and efficient in recovering loss data and provide good resistance to the Byzantine faults,meanwhile it has high computing efficiency,especially when processing a big file.It’s also efficient in the computing of POR.
Keywords/Search Tags:Data redundancy, Tornado Code, POR, Trusted Log, CloudStorage
PDF Full Text Request
Related items