Font Size: a A A

Research On The Key Technology Of Data Storage Security In Cloud Computing Environment

Posted on:2016-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:Q LvFull Text:PDF
GTID:2308330479955415Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of modern science and technology, as an emerging network technology in research and applications, cloud computing gets much more attention from people. In the cloud computing environment, because user’s resources are stored in the cloud, the security of user’s data, the protection of user’s privacy information, off-site storage of data and the stability of cloud computing, regulatory and auditing issues of cloud computing gradually highlight, which has a profound impact to the development of cloud computing in the future. Among the many security issues, data storage security has become the key issues of cloud computing security issues, so using what kind of manner to ensure data storage security in cloud computing is particularly important.In this paper, according to the sensitivity of the user’s data, establish the sensitivity model of the data in cloud computing environment, the data should be divided into different classes according to their degree of sensitivity before the data is encrypted, finally matches different sensitive classes of data with the scheme of corresponding data encryption, as a result, it can compose a structure which could adapt to the data encryption storage in cloud computing environment. Theoretical proof, to establish the sensitivity model of data is beneficial for improving the efficiency of data encryption.Currently, traditional encryption technology is widely used in data storage security of cloud computing, but single symmetric encryption algorithms or asymmetric encryption algorithm can not satisfy data security in the cloud storage.Encryption speed of the former is fast, but its security is not guaranteed, the latter has high safety, but its biggest flaw is the encryption efficiency. Therefore, this paper proposes a scheme of data encryption which combines symmetric encryption algorithm with asymmetric encryption algorithm. Combining AES algorithm with RSA algorithm, ECC algorithm respectively, then get the improved hybrid encryptionalgorithm AES-RSA and AES-RSA. In order to verify the correctness of the scheme,set up Hadoop as the experimental platform, and debug the code with Hadoop Eclipse,measure the encrypted time for the same amount of data. Through analyzing the experimental data which we obtain from the experiment and the security of the experimental program, the results show that the improved encryption algorithms have high efficiency and high security which can achieve data storage security in cloud computing environment.
Keywords/Search Tags:cloud computing, data storage security, encryption technology, the sensitivity of the data, Hadoop
PDF Full Text Request
Related items