Font Size: a A A

CP_ABE And Binary Tree Coding Based Anonymous Out-of-order Cloud Storage Strategy

Posted on:2015-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q JinFull Text:PDF
GTID:2298330422469999Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the application and development of cloud computing, cloud storage as a basiccomponent of cloud computing, its security issues become the focus of current research.Cloud storage is a new concept extend and developed in cloud computing concept, it meansby cloud storage clustering applications, grid technology and distributed file systems andother functions to use application software make a large number of and various types ofstorage devices in the network set up to work together to provide a system of external datastorage and service access function. The emergence of cloud storage, allowing users toabandon conventional storage mode, to meet the demand for data storage in the context of thehardware without having to purchase a large cluster resources and complex management costs.However, under technical conditions at this stage, cloud storage data still exists secure andprivacy issues, this is the problem that the cloud storage development must be solved.To solve the problems of cloud storage data sharing and confidentiality, we propose anproperty-based anonymous cloudstorage strategy MACSS (Multiple encryption AnonymousCloud Storage Strategy) combined with existing technologies. Through the ciphertext accesscontrol and data anonymous disorder storage mechanisms to ensure the confidentiality andintegrity of data in the cloud storage platform. In real applications, user can not fully trust thedata security measures that cloud storage service provider provided, so MACSS uses moderncryptography methods and property-based key management to realize encryption managementand access control of user data. Building cloud access control model, using symmetric andasymmetric encryption algorithm to encrypt plain-text data, using the CP_ABE algorithmbased on attributes create access control system to realize the data Multi-user shared, andcombining with the binary code and anonymous out of order store method to break datastored conventional storage, in an untrusted cloud storage environment, MACSS could ensurethe security of stored data.
Keywords/Search Tags:Cloud storage, Access control, Anonymous storage, Storage strategy
PDF Full Text Request
Related items