Research on data security technology based on cloud storage

被引:15
|
作者
Wang, Rongzhi [1 ]
机构
[1] Hulunbuir Coll, Inst Comp, Hulunbuir, Inner Mongolia, Peoples R China
关键词
Cloud storage; data security; strategy optimization; data redundancy; Tornado code;
D O I
10.1016/j.proeng.2017.01.286
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of cloud storage system and its application in complex environment, its data security has been more and more attention. On the one hand, node crashes or external invasion are likely to lead to incomplete data; on the other hand, when the data is incomplete, because the cloud service provider deliberately concealed or other factors, the user cannot be promptly informed of the change. In view of the above problems, this paper makes a deep research, and puts forward a secure storage system based on how to ensure the data availability when data integrity and data are not complete. In this paper, we begin with the availability of data; the research focuses on the confidentiality of data, the loss of data recovery and data recovery. In this paper, we propose a data secure storage scheme based on Tornado codes (DSBT) by combining the technique of symmetric encryption and erasure codes. Program uses boot password to solve the traditional data encryption in the problem of key preservation and management; system design by correcting Tornado data redundancy code delete code in order to solve problems and recover lost data; through a hash keyed to Tornado code with error correction function so as to solve the problem of data tampering. On this basis, the paper continues to carry out research on data retrieval (POR). Based on the classic POR algorithm based on BLS short signature, the trusted log is introduced, and the trusted log is used to provide the user with the test results. Finally, combined with the DSBT scheme, the computational efficiency of the POR algorithm is optimized, which has nothing to do with the file size, which can achieve the calculation complexity of the constant level. According to the above scheme, this paper implements a secure cloud storage prototype system based on Cassandra. The test shows that the system can provide strong data loss recovery ability, effectively resist the Byzantine fault, in the back of the desirable detection ability is also prominent, but also has very high computation efficiency, especially in the face of large files. This paper studies the modeling and analysis methods of some key problems of data security in cloud storage, such as encryption storage, integrity verification, access control, and verification and so on. Through the data segmentation and refinement rules algorithm to optimize the access control strategy, using the data label verification cloud data integrity, using replica strategy to ensure the data availability, the height of authentication to strengthen security, attribute encryption method using signcryption technology to improve the algorithm efficiency, the use of time encryption and DHT network to ensure that the cipher text and key to delete the data, so as to establish a security scheme for cloud storage has the characteristics of privacy protection. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1340 / 1355
页数:16
相关论文
共 50 条
  • [1] Based on cloud-technology data storage security
    Chai Zhi-gang
    Zhao Ming
    Yu Xiao
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6179 - 6183
  • [2] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [3] Research of Data Security in Cloud Storage
    Zhang, Wenjing
    Ma, Chuanlong
    Sha, Weichao
    Zhou, Qiaoyu
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 858 - 861
  • [4] Research on Enhancing Security in Cloud Data Storage
    Minh Le Quang
    Phan Huy Anh
    Nguyen Anh Chuyen
    Le Khanh Duong
    [J]. ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 : 510 - 519
  • [5] Research on Large Data Storage Technology Based on Cloud Computing
    Wang, Jianying
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 300 - 303
  • [6] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [7] Research on the Cloud Storage Security in Big Data Era
    Chen Kai
    Lang Weimin
    Zheng Ke
    Ouyang Wenjing
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 659 - 664
  • [8] Research on Secure Storage of Network Data Based on Cloud Computing Technology
    Zhu, Jinfeng
    [J]. International Journal of Network Security, 2022, 24 (01) : 68 - 74
  • [9] Research on the Key Technology of the Cloud Platform Data Security
    Jiang, Xuefeng
    Wang, Zhengmin
    Dong, Huiliang
    Du, Xuan
    [J]. PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 1021 - 1025
  • [10] Research on Cloud Storage Technology Based on FPGA
    Zhao, Can
    Yang, Jun
    Ma, Tengfei
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS2017), 2017, : 50 - 54