Font Size: a A A

Data Leak Prevention Storage Technology In The Cloud Environment

Posted on:2016-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:P SongFull Text:PDF
GTID:2348330479954453Subject:Mechanical engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing, cloud storage security has become a major bottleneck hindering its development, how to prevent data leakage is one of the important research direction of cloud storage security. Because the user lost control of the cloud data, and the plaintext data is not safe in the channel of upload and download.Data can easily be intercepted by hackers. Therefore, there are two main ways of data leaking under the cloud environment: one is cloud data theft by cloud services administrator maliciously, the other one is plaintext data hijacked in transmission process. This paper put forward a data leak prevention storage technology under the cloud environment.Effective way to avoid the data leakage is encrypting the data before uploaded to the cloud. However, with the development of cloud computing, users not only want to store the large amounts of data in the cloud server,but also need the cloud server response requests of data processing whenever and wherever possible, and the requests of data processing are becoming more and more frequent. Therefore, the performance of processing of the cloud server will be affected if you encrypt the data with general encryption algorithm before upload to the cloud to store in server, which is contrary to the characteristics of cloud computing that enables fast and efficient processing of data. With the homomorphic properties of fully homomorphic encryption algorithm, the problem can be solved, because all the processing of the data can be transformed into addition and multiplication. Therefore, the technology uses fully homomorphic encryption algorithm which can operate directly on the ciphertext.This technology ensures that cloud service providers can not contact the plaintext, and the data even if intercepted by hackers in the transmission process can not be easily broken.In addition, the technology also solves the problems of complex key management and ciphertext retrieval.This technology not only enables cloud service providers can not access to ciphertext, but also greatly enhance the security of data transmission in the insecure channel. In add, this paper also put forward key generation algorithm and cipher text retrieval algorithm to solve the key management difficulty and cipher text retrieval problem caused by this technology. In addition, this paper also put forward key generation algorithm and cipher text retrieval algorithm to solve the key management difficulty and cipher text retrieval problem caused by this technology,and ensure better efficiency and accuracy of ciphertext retrieval.
Keywords/Search Tags:Data leak prevention, Cloud storage security, Fully homomorphism encryption, Key management, Cipher text retrieval
PDF Full Text Request
Related items