Font Size: a A A

Research On Data Integrity Protection In Cloud Storage

Posted on:2016-07-13Degree:MasterType:Thesis
Country:ChinaCandidate:W X XuFull Text:PDF
GTID:2348330542976096Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the deepening of the informationization process and the vigorous development of the digital equipment market,the data volume is growing exponentially.The storage and management of the mass data promotes the development and application of the cloud storage,however,the problem of the data security hinders the rapid development of the cloud storage.Users entrust their own data to the distant cloud storage server,so they lost the direct control of the data,the storage and management of the data is in the charge of the cloud storage server.The cloud storage service provider claims to protect the security of the users data,however,the cloud storage server still has the possibility of the damage and attack,on the other hand,the cloud storage service provider is not completely trusted,so we must put forward the corresponding solution to ensure the security of the users data.The data integrity is an important aspect of the data security.In order to use the cloud storage service securely and promote its further development,we must ensure the data integrity which stored in the cloud storage server.We propose a data integrity protection method in cloud storage.The method uses the MAC digest function to generate the verification information of the data block,and applies a address hash function to the verification information in order to obtain the stored address of the verification information.The users data and the verification information is all stored in the cloud storage server in the proposed method,this may occur the phenomenon of the stored address conflict in the process of storing the verification information,at this point,the conflict need be handled,so as not to cover the valid information.The method protects the integrity of the data by hiding data block and the corresponding the location relationship of the authentication information,and the verify the integrity of the storage data process is completed by the user or the trusted third party,this can avoid be cheated,concealed by the cloud storage servers.The implementation process of the method that we proposed data integrity protection method in cloud storage involves three phase:pre-processing phase,storage-protection phase and verification phase.We describe the three phase of this method in detail,and present the subjects structure design and the algorithm description of the client in the cloud storage.The experimental analysis and the results prove that the proposed method is reasonable and effective.
Keywords/Search Tags:cloud storage, data integrity, MAC, hash function, conflict handling
PDF Full Text Request
Related items