Font Size: a A A

Research On Data Destruction And Security Sharing Mechanism In Cloud Storage

Posted on:2018-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:J Y CaoFull Text:PDF
GTID:2348330563951195Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud storage inherited the idea of cloud computing,which is the main way to store data by replacing the traditional storage architecture with the new concept of storage as a service.But compared with the traditional storage,its risk is also more complex.From the perspective of the user,the right to control and privacy of data is their most concern.However,on the one hand,cloud storage will "separate" users from data,the data,which is often out of the user's control,will lead to the loss of data control;On the other hand,because cloud storage is in a untrusted environment of highly abstract,has a large amount of users and network traffic is redundant,Such a situation led to data leakage and other security incidents happened frequently,resulting in user data privacy is not guaranteed.Therefore,how to help users to eliminate the above concerns,how to solve the problem of cloud storage data security has become necessary to overcome to promote the cloud storage industry healthy and steady development.This paper analyzes all kinds of security issues of cloud storage,It mainly studies the two kinds of key technologies existing in data security problem,Designs and realizes the cloud storage system which can support data security,and ensure data security while protecting the user's privacy and control.To sum up,this paper has completed the following work:1.According to the design requirements of cloud storage system with security and functionality,a kind of cloud storage data security supporting system(CSDS2)suitable for cloud storage environment is designed on the basis of traditional cloud storage system.Then,the model is proposed.According to the characteristics of the model,the sub-modules of the client and the third party are designed,and the main work flow of the system is analyzed according to the association between the sub-modules.2.Based on object storage technology,cryptography and data overwrite technology,Cloud Storage of Data Destruction(CSDD)is designed in cloud storage environment to protect data's security in its whole lifecycle.This paper analyzes the data destruction problem in cloud storage and puts forward the design goal.It designs a self-destructing data object with the lifecycle and realizes the deterministic destruction of the object while ensuring the security of the data in all stages of its life.The security analysis of the mechanism is carried out and its performance is analyzed by using the system benchmark tool.3.A Cloud Storage of Data Security Sharing Scheme(CSDS3)based on ciphertext-policy attribute-based encryption is proposed to solve the problem that the users in traditional cloudstorage access control system are inefficient when they transmit data.This paper introduced the access strategy according to the group to realize the fine-grained access control and the low-overhead user's right revocation.By verifying the correctness and security of the scheme,it proves that the scheme solves the performance bottleneck problem in the traditional data sharing mechanism and carries out the performance evaluation through the experiment.4.The design and implementation of CSDS2 Util client for cloud storage data security support system is completed based on the object storage service OSS.According to the development interface provided by OSS,the functional framework of the client is designed and the functional interface call relationship is combed.The corresponding implementation code and system interface are demonstrated by referring to the main work flow of the system.
Keywords/Search Tags:Cloud storage, Data security support system, Lifecycle, Data destruction, Attribute-based encryption, Access control
PDF Full Text Request
Related items