Font Size: a A A

Research And Implementation Of Security Algorithm For Cloud Data Storage Based On Oracle Database High Availability Architecture

Posted on:2018-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2348330536977567Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,the rapid development of cloud computing technology makes information sharing become more frequently,and the security issues such as privacy data data leakage is also increasing.An outage occurred in 2011 at Amazon's database server.Apple cloud storage was compromised in 2012 anda disaster incident of Ali cloud server in 2016.These incidents have brought a huge impact in security services for cloud computing.From the above series of security incidents can be seen,cloud server suppliers are mainly two types of deficiencies: First,privacy data leakage caused by low degree of attention;Second,the system does not guarantee complete reliability and stability.In view of these two shortcomings,this paper proposed the use of encryption technology to ensure data security,and use Oracle high availability architecture to ensure system reliability and stability.In this paper,a privacy protection data sharing scheme is proposed from the point of view of data owner and cloud user.Combining the two methods of identity encryption and attribute encryption,the user's unique identification number is embedded into the private key,so that the user can not perform a combination of attributes to access unauthorized data.Dynamic operations in the scenario include user revocation,that only affect the current file or user,without involving key updates,saving system overhead.For the privacy data using the symmetric encryption algorithm AES encryption,the use of identity and attribute algorithm combination of AES algorithm key encryption.Because of the complexity of attribute encryption and identity encryption,it is not suitable for encrypting a large number of data files.Therefore,the sensitive data files in the paper adopt symmetric encryption algorithm to encrypt and store,and then use the encryption algorithms which combine CP-ABE and IBE to control the user's decryption capabilities,so as to enable that cloud users to achieve safe and effective access to cloud storage data.In view of the stability and reliability of the system,the paper combines Oracle RAC and Data Guard to realize the high availability of it.Oracle RAC provide instance-level redundancy to ensure that when an instance of the cloud platform shutdown,the background instance switchesautomatically,that is transparent for users and have no impact for the cloud user's business.Secondly,through the Data Guard technology,the remote disaster recovery function is provided for the system.When the primarydatabase is shutdown,the standby database automatically switches to the primary database to provide services for the users,greatly reducing the server downtime and avoiding significant losses.This paper providea complete set of data protection program for cloud platform,from the user to the provider,ensure that data will not be tampered and lost in the background.The system is always in a stable and efficient operation state,that improve the user's trust in the cloud computing platform.
Keywords/Search Tags:cloud storage, privacy security, CP-ABE, IBE, Oracle RAC, Oracle Data Guard
PDF Full Text Request
Related items