Font Size: a A A

Study On The Technology Of Storage Security Of Cloud Computing

Posted on:2015-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:S M MeiFull Text:PDF
GTID:2268330428985705Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Study on the Technology of Storage Security of Cloud ComputingCloud computing is a pattern of utilization of service, user can easily-extensibleget what he needs through network on demand. Cloud computing is soundlesslychanging the habit of the model of the use of computer. Application software anddata information was stored in the client side are all transferred to the internet datacenter of cloud services under the environment of cloud computing. The providersof cloud services are responsible for the manage of application and data information.Cloud computing provides convenience and economic services. Since the birth ofcloud computing, it is always catching everyone’s eye. With its development, cloudcomputing met many challenges and security issues are the biggest barrier. Cloudcomputing is made up of a series of existing technologies. According to many surveys,people worry so many about the security issues of cloud computing, but the securityissues of data storage get the most concern because data store on the half-trusted thirdparty.In the face of data storage security issues of the cloud computing, we study dataintegrity and data privacy protection in this paper.In the side of data integrity protection, we proposed the algorithm of proofs ofretrievability: M-POR which based on the message authentication code(MAC) withthe purpose of making the user learn the data state in the cloud, algorithm generatessentinels through MAC and verify the data integrity through the process of “challenge-respond-verify”. Sentinels not only can verify the data integrity but also can positionthe error message. We also bring in RS code so that we can recovery data when theproportion of damaged data is not large and take into account of redundant replica ofcloud computing.In the side of data privacy protection, aiming at the privacy of text data, weproposed the MC-R strategy. MC consist of three modules: data masking, data concealing and data marker. MC prevents data leakage when data is uploading ordowning through masking and concealing data in the client, R enciphers data with thecomputing advantage of cloud computing in the cloud using the public key uploadingfrom the client.
Keywords/Search Tags:cloud computing security, cloud storage, data integrity, data privacy, M-POR, MC-R
PDF Full Text Request
Related items