Font Size: a A A

Research On Data Protection Mechanism Based On Trusted Third Party In Cloud Storage System

Posted on:2019-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhanFull Text:PDF
GTID:2428330566472592Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the arrival of the era of big data and the development of mobile Internet,the amount of data that users need to store has also grown exponentially.Cloud computing technology is increasingly widely used due to its features such as convenience,security,high efficiency,and volume-based charging.Individuals and enterprises are also increasingly inclined to store some unclassified data in the cloud.However,since users cannot directly manage the data stored in the cloud,it is difficult to ensure that the cloud storage services they enjoy are continuously available,and it cannot be asserted that the cloud storage service provider does not leak their privacy data,even complete storage of user data cannot even make an accurate judgment.To solve these security problems,this thesis improves the traditional implicit data segmentation algorithm.Through the introduction of a trusted third party,the user's stored file information and identity information are isolated,and all the sub-blocked data are separated from the physical layer.In addition,by using differential privacy algorithm,we make determination whether the cloud storage service provider completely store user's file data.Firstly,in order to solve the problem of possible information leakage in the traditional implicit data segmentation algorithm,twice randomization and uniform confusion schemes are proposed.The scheme uses twice randomization processes to eliminate the data association between sub-blocks and sub-blocks.The information entropy of the original data block is evenly distributed in each data sub-block,so that each data sub-block cannot leak the relevant information of the original file,so as to realize the division and block storage of the user's original storage data block;The recombination and recombination algorithm of the sub-blocks is redesigned to reconstruct the original data blocks by reorganizing the data sub-blocks into a matrix.The simulation results show that compared with the traditional implicit data segmentation algorithm,this algorithm will provide additional resource consumption,but it will provide better security,and at the same time,due to the partition of large blocks of data into multiple Since the small pieces of sub-block data are stored separately,the effective storage space of the magnetic disk can be fully utilized.Secondly,in order to solve the problem of storing different data blocks stored on different physical media,a trusted third party and multi-provider mechanism was introduced,and a cloud storage model was proposed to perform data storage,data access,and data deletion for users in the model.Other operations performed a detailed process analysis to solve the problem of how to ensure that data is stored in blocks on different physical servers after data segmentation.Compared with the traditional cloud storage model,this cloud storage model not only achieves the physical isolation of all data sub-blocks;but also achieves the isolation of data information from identity information through the intervention of trusted third parties.Cloud service providers cannot directly obtain user identity information and protect user privacy.After security analysis and simulation experiments,the results show that although the proposed model will increase the time to complete the data storage operation,the overall security has been significantly increased by 50%.Finally,in order to verify whether the data uploaded by the user stored in the cloud storage server completely,the cloud storage service provider performs polling of the data block summary information through the trusted third party based on the cloud storage model proposed previously.The storage server performs message digests on the data blocks and uses Laplace differential privacy algorithm to add noise to the summary information,then submit the message with noise to a trusted third party for verification.This achieves the aims that verifying data holding accuracy for cloud storage servers and preventing attackers from using data during holding verification.
Keywords/Search Tags:Cloud Storage, Trusted Third Party, Data Partition, Integrity Verification
PDF Full Text Request
Related items