Font Size: a A A

Research On Key Aggregation Encryption Method Of Data In Cloud Storage Environment

Posted on:2022-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y X SuFull Text:PDF
GTID:2518306542481114Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,with the majestic development of science and technology,there has been a phenomenon of data explosion,and how to store data has become a more important research topic.In order to store more data and reduce storage costs for users,cloud storage has emerged as the times require.More and more users choose to store data in the cloud environment.However,cloud storage also faces the problem of data insecurity.The user encrypts the data before uploading it to the cloud environment.Cloud storage refers to the data owner storing data in multiple virtual servers in the network,which are managed by a third-party service provider,rather than in the local computer,regardless of the specific storage method of the data,the user can at any time,Store and manage data on the cloud anywhere.Although the emergence of cloud storage facilitates the storage and management of data,it also brings new problems,that is,data security.Storing data in a cloud server and entrusting it to a third-party server for hosting,the data owner loses absolute control over the user,which may cause problems such as the leakage of private data and malicious modification,so how to achieve security in the cloud environment What about efficient data storage? In order to better solve this problem,we read a lot of literature and did further research on data encryption technology.This paper studies the storage method and encryption technology of data in the cloud storage environment,finds out the existing problems and makes corresponding improvements to improve the security of the data.The specific work content is as follows:1.Through research on cloud storage,among the main bodies of cloud storage,namely data owners,cloud storage servers,and data users,it is found that the storage provided by third-party service providers is not completely honest and credible,as well as existing The advantages and disadvantages of data encryption technology,the key aggregation encryption method has been improved,and the Diffie-Hellman key exchange protocol has been integrated into the Diffie-Hellman key exchange protocol so that the two parties in the communication can agree on the public key when sharing data,which improves the security during the transmission process and ensures the ownership of the data Information security of the person.2.According to the current large amount of data,this article proposes a method of dividing and then encrypting.The data files that need to be placed in the cloud environment are divided first,and then encrypted.The data is divided into data of different sizes according to requirements.In part,the metadata is stored locally to improve the speed and efficiency of data encryption.At the same time,the corresponding encryption technology is adopted for different parts: AES symmetric encryption is used for large files,and key aggregation encryption is used for small files and symmetric keys..This not only ensures that the data is not illegally used or tampered with by third-party service providers,but also improves the efficiency of data encryption and decryption operations.3.According to the proposed scheme,the environment is set up and related experiments are carried out.Through experimental verification,the proposed scheme can improve the efficiency and security of data storage in the cloud server.In summary,through the study of the key aggregation encryption method of data in the cloud storage environment in this article,a new solution is provided for storing data in the cloud environment,that is,the data is divided first,and then different encryption methods are used.The efficiency and security of data encryption storage have been greatly improved,which has played a certain role in promoting the development of cloud storage.Considering that the content of the file is not static,the next research plan is to consider designing a key aggregation encryption algorithm that can be dynamically updated,so that users do not need to re-operate when modifying files,which can reduce time and space overhead and improve effectiveness.
Keywords/Search Tags:cloud storage service, data segmentation, key exchange, key aggregation mechanism, secure sharing
PDF Full Text Request
Related items