Font Size: a A A

Design And Implementation Of Cloud File Storage Encryption System Based On Chaos

Posted on:2015-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:J J XuFull Text:PDF
GTID:2268330428964393Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
In recent years, cloud computing has begun gradually into view of ordinary people, for thepeople with a cloud provider of portable storage space, as long as there is a network, people do notneed to carry a mobile hard disk or U disk entities it. Many companies are increasingly largevolumes of data or the data processing to the "cloud " to solve, this can also reduce their operatingcosts and operating costs. But most of the cloud storage just simply store it, and can not guaranteethe security of user information is stored, even provides password protection, user-basedauthentication only when people can not meet the demand for storage space security desire. Andwith the continuous improvement of computer performance, will make the security of the networkpassword decreases, appropriate measures must be taken in a timely manner in order to protect thesecurity of confidential data. Chaos features traditional cryptography, key stream generated bychaotic mapping information is encrypted, has become a way of new passwords.This paper constructs an improved Logistic chaotic map, based on good performance keysequence that maps generated with the password mechanism combined under VC++platformdesigned a cloud storage encryption transmission scheme to achieve a cloud of spatial dataencryption and decryption to ensure the security of cloud data. The main contents are as follows:In order to extend the full range of parameter mapping and mapping interval Logistic chaoticregion, based on the original Logistic mapping conducted two improved, one transformationparameters, and the other is a variable tensile modulus, expanded its intervals and variableparameter space, increasing the parameter space key. Its dynamic characteristics were analyzed,such as basic performance bifurcation diagram, Lyapunov exponent, the uniformity of thedistribution of values.Logistic mapping based on improved processor and microcontroller design a digital chaoticsequence generator, to verify its chaotic state stability, while microprocessor-based build chaoticsignal generator circuit is simple and easy design, can be used to signal the need Chaos source ofelectronic circuit design. And the chaotic sequence of digits generated by its international practicewith NIST software package for the test, the test results show that the better performance of thechaotic sequence of numbers can be used as a key to use.For today’s cloud storage security considerations absence of a sound problem, a chaoticencryption scheme based file transfer system of cloud storage. The system is easy to operate, theuse of calls to distributed object interface, complete with encrypted transmission network cloud. First, the basic concepts and encrypted before transmission used by cloud computing basics ofdoing research and presentation. Such as distributed computing, grid computing, network filetransfer protocol, the cloud provider’s API interface functions. Secondly, the process scheme of thesystem are described in detail, including interface development, process description of eachmodule, such as the chaotic stream cipher, chaos DES,3DES chaotic algorithms, keymanagement, user authentication module and an encrypted file transfer module etc., andimplementation of each module are described and validated, and finally to the security of thesystem, such as key space and carried out the attack on the key experiments were analyzed.
Keywords/Search Tags:Improved Logistic, cloud computing, API Identify, chaos password
PDF Full Text Request
Related items