Font Size: a A A

Data Security Research In Cloud Environment

Posted on:2015-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:F X KongFull Text:PDF
GTID:2268330425996304Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of modern society and information’s technology, cloud computing asan emerging technology has been increasingly concerned about the human race.The advantagesof convenient and low-cost of cloud computing is increasingly popular. However, the datasecurity issues of cloud computing become increasingly more and more prominent.And it hasnow become an important factor in the development of cloud computing. With the popularity ofcloud computing, people pay attention to cloud security issues mankind more and more. On theone hand users want to bring them convenient services the cloud computing, on the other handthey need cloud service providers d to be able to better ensure the security of the data..Cloud computing is confronted with many security problems now.This paper mainlyfocuses on integrity verification and data privacy protection under the cloud data. Because cloudcomputing itself has the advantage that a traditional IT don’t have, more and more enterprisesand users like to give their data to cloud that manage and maintain. However, in a cloudenvironment, data is stored in a third party.So the traditional method of data integrityverification is no longer suitable. Aiming at this problem, the paper has made a kind of relyingon the trusted third party data integrity testing program. It can ensure that users do not access theoriginal data that they kown whether the data files that can be stored in its own cloud server issecure. In addition, when they have querying security issues and inquiries to outsourcing of dataencryption for files that may occur, the paper also further strengthened its protection, but alsofor the problem ciphertext queries, the paper proposed a ciphertext sort function.The main work is as follows:1.The paper has introduced the background,its study’s current and the main data securityin cloud computing technology, and part of their security technologies are described in detail.2.Data integrity verification of the cloud environmentWhen the user put data stored on the cloud servers,the user need timely know themselveswhether that the data on the cloud server is complete. To this end, this paper designs a model ofthe data integrity verification. This model is based on trusted third party, first of all, the data isdivided into blocks, and each block of data is set as the unique identification as his metadata, thelogo is generated by a single-valued function. Then metadata is digitally signed.And the indexingform is established, then the index table is delivered to a trusted third party.By using thechallenge response algorithm it is validated. In order to improve the efficiency of hisverification, the paper also designed a new data structure for verification.3.The ciphertext data privacy protection in the cloud environment After the data owners put data encrypted to cloud service providers, they may is crackedeven if datas are encrypted by the data owers. In order to better protect the data ower’s data,this paper has divided and made data transformation.Even if the attacker obtained the data, he isnot the original data, so the data can be played a better protection. In order to further improve thequery efficiency of cipher text data, this article is based on their access to records, designed asort functionto further improve the efficiency of the ciphertext data query.It is verified by theexperiment.
Keywords/Search Tags:Cloud computing, Data security, Data integrity, Privacy protection, cipher
PDF Full Text Request
Related items