Font Size: a A A

Research On Secure Storage And Ciphertext Query Of Cloud Data

Posted on:2021-11-17Degree:MasterType:Thesis
Country:ChinaCandidate:L J CaoFull Text:PDF
GTID:2518306104999879Subject:Computer technology
Abstract/Summary:PDF Full Text Request
As cloud computing technology matures and network resources are efficiently integrated,more and more people are joining the ranks of cloud users.However,in recent years,cloud storage products have disclosed many security incidents,which have caused great losses to the privacy of enterprises and individuals.The survey data shows that 70% of existing users have great concerns when using cloud storage service products.In view of the above contradictions,this article focuses on the research and exploration of cloud storage models,and selects a reasonable model according to the specific campus cloud storage requirements,aiming to improve the security of data encryption storage and query access efficiency.The main working steps and contents are as follows:First,select a public-private hybrid multi-cloud architecture according to the campus cloud storage requirements,and conduct research on the following three aspects in conjunction with the cloud storage process:(1)Research on data confidentiality assurance under different access control requirements,mainly on CP-ABE and Comparative analysis of two different RBAC cloud storage encryption models in key management,access control process,algorithm performance,etc.(2)Research on integrity verification during long-term data storage,analysis of MHT and H-MHT authentication data Structure and efficiency comparison through simulation experiments,and at the same time,a homology hash and HMHT are used to design a challenge-response integrity verification scheme.(3)Consider the security risks of data processing after the end of the cloud storage service,combine The sentinel mechanism has designed a reliable cloud data deletion scheme.Then,with the background of the university environment,assuming that the majority of teachers and students are cloud users,they have independently designed and implemented cloud storage and query management for different secret files:(1)using a large number of electronic journals in the school as weak secret file data,using coarse-grained RBAC The model performs storage management,combines Chinese word segmentation technology and RSA homomorphic encryption technology to generate ciphertext index vectors and other related information,and later uses RSA homomorphism to perform fuzzy query matching and apply TF-IDF algorithm to complete the similarity of each element in the matching result set Sort and other content.(2)Take the important information of each functional department as the strong-level document data,select the fine-grained CP-ABE access control strategy model and adopt the precise query matching scheme.Finally,the user management,file management,mail service,cache service,and security service modules in the prototype system design are all implemented.The functional test and security test results are normal,and the related performance tests are also in line with the technical principles.Research expectations for data safe storage and query.
Keywords/Search Tags:cloud storage, access control, ciphertext retrieval, text similarity, data confidentiality, data integrity
PDF Full Text Request
Related items