Font Size: a A A

Data Destruction Mechanism For Integration Environment Of Cloud-P2P

Posted on:2016-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:P P GongFull Text:PDF
GTID:2308330473465488Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The cloud computing and peer-to-peer computing(short for Cloud-P2P) is the integration of the resource of cloud computing and peer-to-peer computing, which introduces the cloud node and the edge node of the network. Based on the complex remote data destruction in cloud storage, we introduce the more dynamic edge node of the network which makes the research on remote data destruction more difficult. At present, the research and application of the cloud data destruction has made certain achievements, but there are still many deficiencies. In particular, the problems of the users’ requirement for destructing the data in cloud at anytime anywhere become more urgent. And this thesis do a series of research and exploration in this area, mainly includes that to build the architecture of data storage in cloud based on mobile agent, to design the strategies for destructing the data in cloud, to design and verify the algorithm of data folding, and so on.Firstly, in order to fully dredge up a variety of available potential resources contained in the cluster server and the edge of terminal node in network center, this thesis integrates the cloud computing and the peer-to-peer computing together and builds a model of the cloud computing and peer-to-peer computing together and builds a model of Cloud-P2 P.Secondly, this thesis introduces the mobile Agent on the base of which we build the data destruction architecture to permit users to control and manage their own data in Cloud-P2 P. Then,we present three patterns of destruction: active destruction, timing destruction and defensive destruction, and describe the basic flow of destruction in the cloud storage.Finally, to unauthorized tampering attack for the cloud data, the thesis puts forward the destruction mechanism defensively based on mobile Agent used to detect the cloud data and distinguish between the data of normal modification and unauthorized tampering so as to predict the possibility of relevant data attacked and take the effective treatment of those data which have been illegally tampered or being illegally tampered. Moreover, we propose a new method of data overwriting called data folding to destruct data on the specific node. It uses the sequence of data themselves to overwrite the data rather than generates overwrite sequence in advance. After all, the length of overwrite sequence is not sure. With data destruction safely under guarantee, this way can improve the efficiency of the data overwrite, and greatly reduce the possibility of data recovery.
Keywords/Search Tags:Cloud-P2P computing, mobile Agent, data destruction, data folding
PDF Full Text Request
Related items