Font Size: a A A

Research And Implementation Of Storage Platform And Data Security In Cloud Storage Platform

Posted on:2016-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y TianFull Text:PDF
GTID:2298330467993055Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, users’ demands for the aspects of efficiency, convenience and safety of the cloud storage have increased dramatically. How to improve the reading and writing efficiency and file safety of the cloud storage system becomes an uppermost priority for the cloud storage provider. This paper focuses on the study of efficiency and security, researching into the two key points:the way to set up an efficient underlying storage platform and to complete partial-loss data recovery.The paper begins by analyzing the I/O efficiency of the distributed memory database. Then, the differences between conventional and unconventional database, including those of different physical storage media, are carefully analyzed. Subsequently, we use a distribution algorithm to build a high performance distributed database cluster based on Redis. Moreover, this paper also focuses on the optimization of cluster mode, storage mode and cluster’s high performance on reading and writing through analyzing the database code structure and logic.Based on the structure of storage platform, the paper continues to study the file storage mode. The security storage efficiency is guaranteed via information distributed storage file. Furthermore, we propose a secure storage program based on RS codes towards the recovery, confidentiality and certification of sub slices storage. The program uses RS erasure codes to complete the information recovery, uses the encryption technology to avoid sub slices information divulgence, uses authentication code technology to prevent the modification of sub slice information on the storage platform.Finally, on the basis of the two aspects discussed above, the paper implements a prototype system of a distributed secure storage, and tests the system. The test shows that the system works properly with good I/O efficiency. Based on this, the file recovery is realized with confidentiality and integrity guaranteed.
Keywords/Search Tags:Cloud Storage, Redis, Consistent Hashing, RScode, Data Redundancy
PDF Full Text Request
Related items