Font Size: a A A

Research On Distributed Storage Causal Consistency Model Under Trust Constraint

Posted on:2022-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:J T ZhangFull Text:PDF
GTID:2518306512962069Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
At present,distributed cloud storage has been widely used,and users have more and more demands to meet the data causal consistency under distributed system.At the same time,the security situation in cloud storage environment is increasingly severe.When users store data in the cloud,security risks such as identity signature falsification and sensitive data tampering will inevitably exist in the cloud service environment.At present,there are few mature schemes considering security risks in the research field of distributed storage causal consistency.Therefore,how to ensure the security and credibility of user data while satisfying the causal consistency of data has become an urgent problem to be solved.In view of the above problems,this paper mainly does the following work:(1)Combined with trusted cloud alliance technology of trusted cloud platform,we proposed a data causal consistency model with trusted constraints.The framework of data causal consistency model under trusted constraints is designed.The logical interface of cloud platform consistency data verification service is defined to provide consistency data verification service for the server and the client.We proposed the concept of trusted service agent,which includes the management method of dynamic trusted verification of data consistency node and the storage method of trusted metadata of node.The trusted service agent provides new node trusted authentication,trusted node management,trusted evidence transfer and authentication,data trusted storage and other services,which provide trusted authentication and security guarantee for user data storage and model node expansion.(2)Under the model of data causal consistency with trusted constraints,We proposed a data causal consistency protocol under trusted constraints.This protocol is based on the trusted authentication mechanism of trusted cloud platform,and provides identity authentication and the trusted verification mechanism of consistent data at the client and server sides.The partial geographic replication strategy is adopted to transfer the partial stable vector pdsv in the communication between the server and the client to reduce the amount of communication data between the server and the client.Consensus mechanism in the Hash Graph,each node to other nodes quickly using the mixed logical clock synchronization update records and trusted node status,makes messages between the nodes synchronous speed,at the same time,the use of mixed logical clock make each node is not affected by the clock drift,better relations between the causal sequence of capture the event.
Keywords/Search Tags:trusted cloud platform, causal consistency, trusted constraints, hybrid logical clocks, Hash Graph
PDF Full Text Request
Related items