Research on data security technology based on cloud storage

被引:15
|
作者
Wang, Rongzhi [1 ]
机构
[1] Hulunbuir Coll, Inst Comp, Hulunbuir, Inner Mongolia, Peoples R China
关键词
Cloud storage; data security; strategy optimization; data redundancy; Tornado code;
D O I
10.1016/j.proeng.2017.01.286
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of cloud storage system and its application in complex environment, its data security has been more and more attention. On the one hand, node crashes or external invasion are likely to lead to incomplete data; on the other hand, when the data is incomplete, because the cloud service provider deliberately concealed or other factors, the user cannot be promptly informed of the change. In view of the above problems, this paper makes a deep research, and puts forward a secure storage system based on how to ensure the data availability when data integrity and data are not complete. In this paper, we begin with the availability of data; the research focuses on the confidentiality of data, the loss of data recovery and data recovery. In this paper, we propose a data secure storage scheme based on Tornado codes (DSBT) by combining the technique of symmetric encryption and erasure codes. Program uses boot password to solve the traditional data encryption in the problem of key preservation and management; system design by correcting Tornado data redundancy code delete code in order to solve problems and recover lost data; through a hash keyed to Tornado code with error correction function so as to solve the problem of data tampering. On this basis, the paper continues to carry out research on data retrieval (POR). Based on the classic POR algorithm based on BLS short signature, the trusted log is introduced, and the trusted log is used to provide the user with the test results. Finally, combined with the DSBT scheme, the computational efficiency of the POR algorithm is optimized, which has nothing to do with the file size, which can achieve the calculation complexity of the constant level. According to the above scheme, this paper implements a secure cloud storage prototype system based on Cassandra. The test shows that the system can provide strong data loss recovery ability, effectively resist the Byzantine fault, in the back of the desirable detection ability is also prominent, but also has very high computation efficiency, especially in the face of large files. This paper studies the modeling and analysis methods of some key problems of data security in cloud storage, such as encryption storage, integrity verification, access control, and verification and so on. Through the data segmentation and refinement rules algorithm to optimize the access control strategy, using the data label verification cloud data integrity, using replica strategy to ensure the data availability, the height of authentication to strengthen security, attribute encryption method using signcryption technology to improve the algorithm efficiency, the use of time encryption and DHT network to ensure that the cipher text and key to delete the data, so as to establish a security scheme for cloud storage has the characteristics of privacy protection. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
下载
收藏
页码:1340 / 1355
页数:16
相关论文
共 50 条
  • [21] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [22] Agent Based Framework for providing Security to data storage in Cloud
    Islam, Md. Rafiqul
    Habiba, Mansura
    2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 446 - 451
  • [23] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTE Communications, 2013, 11 (02) : 18 - 23
  • [24] On the Security of Cloud Data Storage and Sharing
    Zhou, Jianying
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 1 - 1
  • [25] A Framework for Data Storage Security in Cloud
    Tyagi, Manoj
    Manoria, Manish
    Mishra, Bharat
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 263 - 272
  • [26] Enhancing data storage for cloud security
    Ellis F.
    Network Security, 2024, 2024 (02)
  • [27] Research on cloud computing data security protection technology satisfying differential
    Yang, Hui
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 101 - 101
  • [28] Cloud Data Life Cycle Security Issues and Research of Encryption Technology
    Li, Nengneng
    Zhang, Yongsheng
    Fan, Yueqin
    Chang, Liang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 356 - 359
  • [29] The Analysis of Critical Technology on Cloud Storage Security
    Yin, Lianfu
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 26 - 28
  • [30] Research on computer network data security storage technology in the era of big data
    Zhang, Liying
    Gu, Xin
    Zhao, Qiang
    REVISTA INTERNACIONAL DE METODOS NUMERICOS PARA CALCULO Y DISENO EN INGENIERIA, 2024, 40 (02):