Font Size: a A A

A Blockchain Based Storage And Traceability Method For Cloud Cluster Scheduling Logs

Posted on:2021-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhuFull Text:PDF
GTID:2428330626962972Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing provides low-cost,flexible and efficient processing power for computing tasks,and brings great convenience to users.However,the centralized resource management mode and multi tenant resource allocation mode also make cloud computing face severe security challenges.Cloud computing allows users to rent virtual machines to use cloud resources,which makes it easier for attackers to use the vulnerable points of the system to penetrate from the outside network to the inside of the cloud cluster,steal users' privacy,tamper with data or even interfere with the resource scheduling of the cloud cluster to obtain illegal resources.And the cloud cluster scheduling log recording the clues of the attack also faces the risk of being cleared by the attacker.How to ensure the trusted storage of the scheduling logs in the cloud cluster and how to trace the vulnerability of the system according to the scheduling logs are the key issues to improve the security of the cloud computing system.The emergence of blockchain provides the possibility to solve this problem.With the rise of bitcoin,blockchain is composed of distributed network,consensus algorithm,cryptography and other technologies.It has the characteristics of distributed bookkeeping,information on the chain can not be tampered,forged,traceable and so on.In this paper,blockchain and cloud computing are combined to propose the methods of trusted storage and vulnerable point tracing for log files of cloud cluster scheduling,which is of great significance.This paper mainly completes the following two research work:(1)The method and implementation of cloud cluster scheduling information storage and verification based on blockchain.Because of the large storage cost and single data format of blockchain.In this part,an improved algorithm of trapdoor hash is proposed.The original log information is partitioned by Shamir algorithm.After the fragmented messages are collided by trapdoor hash,the same message summary can be obtained and finally allocated to blockchain for storage.The process of implementation is to store the original log file in the local database,and the hash value of the file is chained.During verification,only the file of the local database needs to be taken out for hash and the corresponding data on the chain for comparison.If the results are consistent,it indicates that the log information is reliable;otherwise,the log information has been tampered with,and there are fragile points in the cluster.This way of storage provides a credible method of verification and audit for scheduling log files.The experimental results show that the storage time of this method is 60%less than that of the public chain of Ethereum,and the data can be verified effectively(2)A "log chain" is proposed,which is a storage and traceability scheme for log files of cloud cluster scheduling based on blockchain.In the system architecture design,the modules of cloud cluster,control system,blockchain network and distributed file system are designed.The process is to upload the original file to the distributed file system and store the file address as the transaction of the blockchain on the chain.When tracing,you can directly query the address information on the chain according to the document's uplink voucher,and then address to the original log file according to the address.The experimental results show that the scheme reduces the storage pressure of blockchain,improves the storage efficiency and reduces the storage cost.To sum up,the scheduling information and vulnerability Traceability Method Based on blockchain cloud cluster studied in this paper can ensure the trusted storage and traceability of cloud scheduling logs.When the cluster is attacked,the original log information of the vulnerable point can be traced directly according to the traceability process.Check the cause of the error through the log information,or look for traces left by hacker attacks.Finally,through the system and performance test,the cloud cluster scheduling log storage and vulnerability traceability system based on the blockchain runs well,which can guarantee the trusted storage of the original log file,ensure that the file is not tampered with and prevent repudiation,and ensure the integrity of the scheduling log.
Keywords/Search Tags:Blockchain, Decentralized, Cloud computing, Trusted storage of scheduling log, Traceability for log
PDF Full Text Request
Related items