Font Size: a A A

Research On Cloud Data Security Deduplication Technology Based On Double Array Trie Tree

Posted on:2022-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:S T LvFull Text:PDF
GTID:2518306539962489Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Data Security Deduplication technology in cloud computing is a technology that checks whether the user data is duplicated before uploading the data to be uploaded to the cloud storage server.The data that has appeared in the cloud storage server is not uploaded.Technology,not only to ensure the safety of uploading and downloading,but also to ensure the safety of the user's data ownership.The upload of duplicate data will not only produce redundant communication overhead,but also have a certain impact on the capacity of the cloud storage server.Data security deduplication technology faces three main challenges: 1)Judgment of duplicate data;2)Performance of data deduplication scheme;3)Authentication of data ownership.In the face of these three challenges,it is of great significance to study more detailed,more comprehensive,and more secure data deduplication technology.On the one hand,it can reduce communication overhead and storage costs,and on the other hand,it is to ensure user data security and privacy protection..This article focuses on data security deduplication technology and multi-user ownership authentication technology in a cloud storage environment.The main tasks are as follows:1.Analyze the research background and significance of user data security deduplication technology in the cloud environment;detailed analysis of the main steps of the research methods at home and abroad,expound the practical significance of researching data security deduplication in the cloud environment,and give the direction of improvement.2.Several common data block techniques are introduced,and their advantages and disadvantages are introduced in detail.A data popularity judgment algorithm and a shortest byte incremental data block technique are presented,and a two-level data block technique is designed.The data block scheme is used to obtain the optimal data block size through a large amount of experimental data.Simulation experiments show that it has good stability and is suitable for the existing data deduplication scheme.3.Combining the BL-MLE algorithm,data block technology,user ownership verification and double array Trie tree technology,a solution for fine-grained data security deduplication in the cloud environment based on double array Trie tree is designed;through fine-grained data block and Inspection to achieve fine-grained repeated comparison of data;use BL-MLE algorithm to encrypt data and data blocks and compare them to achieve data security and deduplication;use dual array Trie trees to store data and user information to achieve ownership verification of user data;Comprehensive analysis shows that the program can meet the requirements of function,safety and performance.The innovations of this article include:1.Propose a data security deduplication scheme in cloud storage environment.In this scheme,the data is classified according to different transmission ranges,and the data of different transmission ranges are divided by different data blocking technologies,and the data blocks after the division are encrypted and repeated through the BL-MLE scheme to achieve detailed Ensure its safety while comparing the granularity.2.Propose a method to judge the popularity of the data first,and use different data block schemes for the data according to different popularity.It can effectively divide the data with different propagation ranges into better data blocks.3.A fine-grained ownership verification scheme is proposed.By introducing a dual array Trie tree to verify the storage of data content and ownership information,the ownership of partially duplicated data can be verified,reducing the storage overhead of data ownership,and fine-grained deduplication can also reduce the storage overhead of data.
Keywords/Search Tags:cloud storage, data security and deduplication, BL-MLE, ownership authentication, double array Trie tree
PDF Full Text Request
Related items