Font Size: a A A

The Design And Implementation Of The Privacy Preserving Software In Cloud

Posted on:2016-09-29Degree:MasterType:Thesis
Country:ChinaCandidate:T SunFull Text:PDF
GTID:2348330485499987Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since it was first proposed, the cloud computing has received increasing attention and welcomed from researchers, and has become one of the hottest research hotspots at home and abroad in recent years. In a cloud context, users no longer have to own hardware resources, software and tenant data are stored in cloud, moreover, the cloud computing requires a large number of users and provides the data sharing to the maximum limit between users, it makes user's privacy faced with risk inevitably. Once the user's personal data have leaked, It will be possible to cause extremely bad influence on user's personal, property and other safety. If we cannot solve the privacy problem very well in the service of the cloud computing, the user will never choose to put data into the cloud platform, it has already become the most important factor that gets in the way of the development of cloud computing.This paper focus on the problem of privacy protection in cloud computing security, design and implement a privacy-preserving software, it can provide privacy-preserving function for the application system. The software takes a secure database structure, the structure of the table is encrypted, it can effectively prevent the attacker from digging out useful information by analysing the table's name and the column's name; In terms of data encryption, the software takes a double encryption mechanism based on AES and PEB, moreover, according to the security and operational requirements, the data are encrypted by different encryption way, to ensure the security attributes like data security and support the Ciphertext Retrieval and data sorting; In terms of key management, a strategy of key distribution based on row area dividing and a strategy of key updating based on hotspot analysing are taken to avoid the potential security hidden trouble which using column-key in the data table including large amounts of data, reducing the system overhead caused by unnecessary key updating. We design and implement a tool for transforming the database into secure database quickly on this paper, it can improve the availability of software.This paper integrated the actual system to deploy and test the privacy protection software at last, all functions in the software are running normally, the software can effectively ensure the security of the private data and perform better on the response speed of system.
Keywords/Search Tags:privacy protection, data encryption, key management
PDF Full Text Request
Related items