The development of computers and the Internet not only enriches people's study and life but also brings many problems.For example,some criminals commit crimes by system hacking,information theft.Nowadays,more and more users choose to store their data in clouds through cloud storage services.Therefore,how to protect the data privacy of users is one of the hotspots of network security research.Given this situation,this paper proposes a distributed storage system based on an unconditional secure and fair secret sharing scheme in wireless sensor networks.The fairness of secret sharing ensures that if one participant gets the secret,the others get the secret,too.The attackers hiding in the participants may threaten the fairness of secret sharing.The primary secret sharing scheme,verifiable secret sharing scheme,and public verifiable secret sharing scheme does not achieve fairness.In order to effectively and accurately identify attackers on the premise of ensuring fairness,this thesis proposes a fair(t,n)threshold secret sharing scheme with efficient identification ability.The scheme consists of three protocols,which correspond to the secret distribution phase,the secret reconstruction phase and the attacker identification phase respectively.The secret distribution strategy of the scheme enables the secret reconstruction protocol to detect the occurrence of the attack and trigger the execution of the attacker's identity identification protocol,to locate the attacker accurately.At the same time,this thesis proposed the security analysis of the scheme for four different types of attacks.Comparison analysis with other secret sharing schemes shows that the proposed scheme achieves fairness and security,and the identification algorithm is effective.Based on the fair secret sharing scheme with efficient cheater identification proposed in this thesis,we proposed a distributed storage system based on the unconditional security fair secret sharing scheme in wireless sensor network.According to different attack models,the anti-attack capability of the system under the premise of ensuring data security is analyzed. |