基于P2P原理的個(gè)人云存儲(chǔ)應(yīng)用研究
發(fā)布時(shí)間:2018-06-19 17:18
本文選題:P2P + 云存儲(chǔ); 參考:《復(fù)旦大學(xué)》2012年碩士論文
【摘要】:云存儲(chǔ)已經(jīng)提出了若干年,但其云的概念通常只存在于服務(wù)端,廣大的客戶端資源并沒有被有效利用,數(shù)據(jù)的控制權(quán)、安全性也不甚理想。之前的研究成果中,大多將P2P技術(shù)都應(yīng)用于服務(wù)端,主題仍是C/S架構(gòu);部分研究中對(duì)完全P2P架構(gòu)在云存儲(chǔ)架中的應(yīng)用做了可行性分析,但在身份認(rèn)證、數(shù)據(jù)存儲(chǔ)效率、數(shù)據(jù)訪問穩(wěn)定性等方面仍有不足,實(shí)際應(yīng)用比較困難。 基于上述情況,通過對(duì)個(gè)人云存儲(chǔ)應(yīng)用的模式深入分析,并結(jié)合P2P技術(shù)研究,提出以去中心化的全P2P架構(gòu)的云存儲(chǔ)應(yīng)用模型。新系統(tǒng)參考成熟的Kad網(wǎng)絡(luò)技術(shù),通過Key值對(duì)方式進(jìn)行全網(wǎng)數(shù)據(jù)管理,充分通過P2P架構(gòu)對(duì)網(wǎng)絡(luò)中的各終端資源加以有效利用,極大地降低了云存儲(chǔ)的部署、運(yùn)維成本。 新系統(tǒng)通過特殊的按位偏移的數(shù)據(jù)塊劃分方式對(duì)數(shù)據(jù)進(jìn)行去信息化處理,同時(shí)對(duì)關(guān)鍵的用戶文件描述信息進(jìn)行加密保護(hù),并統(tǒng)一采用key值對(duì)的方式通過P2P的離散特性存儲(chǔ)與網(wǎng)絡(luò)中,在保證了數(shù)據(jù)存儲(chǔ)的私密性與容災(zāi)能力的同時(shí),又兼顧了原始文件數(shù)據(jù)在網(wǎng)絡(luò)中的可復(fù)用性,提高新系統(tǒng)的數(shù)據(jù)存儲(chǔ)效率。 為了保證P2P架構(gòu)下的服務(wù)質(zhì)量,系統(tǒng)通過參考Kad網(wǎng)絡(luò)的數(shù)據(jù)路由算法,改進(jìn)了其對(duì)于文件原始數(shù)據(jù)的分享機(jī)制,并充分利用網(wǎng)絡(luò)中各結(jié)點(diǎn)上數(shù)據(jù)的自冗余特性,使新算法能夠有效保證云存儲(chǔ)中數(shù)據(jù)訪問的穩(wěn)定性。 對(duì)于P2P技術(shù)在身份驗(yàn)證及管理方面的薄弱環(huán)節(jié),系統(tǒng)巧妙地利用第三方郵件系統(tǒng)獨(dú)立管理用戶關(guān)鍵信息,使系統(tǒng)具有極佳的數(shù)據(jù)混淆與去信息化存儲(chǔ)能力。同時(shí),利用郵件的暫存特性,使用戶關(guān)鍵信息在網(wǎng)絡(luò)中的存在的時(shí)間大幅減少,這些信息的穩(wěn)定存儲(chǔ)位置都在用戶自己的可信設(shè)備中,有效降低用戶信息被攻擊或被竊取的風(fēng)險(xiǎn)。 通過新系統(tǒng)的初步驗(yàn)證分析,采用P2P架構(gòu)的個(gè)人云存儲(chǔ)應(yīng)用能夠接近或達(dá)到目前C/S架構(gòu)應(yīng)用的使用體驗(yàn)。同時(shí),新系統(tǒng)充分發(fā)揮了P2P架構(gòu)的優(yōu)勢(shì),降低了云存儲(chǔ)的部署與維護(hù)成本,并通過上述技術(shù)手段,提高了P2P網(wǎng)絡(luò)數(shù)據(jù)訪問的穩(wěn)定性,解決了分布式架構(gòu)下用戶身份識(shí)別的安全性,減小了用戶數(shù)據(jù)被越權(quán)訪問或盜取的風(fēng)險(xiǎn),這使得完全P2P架構(gòu)在個(gè)人云存儲(chǔ)中的應(yīng)用具有較高的實(shí)用價(jià)值。
[Abstract]:Cloud storage has been put forward for a number of years, but the concept of cloud usually only exists in the server, the vast number of client resources have not been used effectively, and the control and security of data are not very good. In the previous research results, most of the P2P technologies have been applied to the server, and the topic is still C / S architecture. In part of the research, the feasibility of the application of the complete P2P architecture in the cloud storage frame is analyzed, but in identity authentication, data storage efficiency, Data access stability and other aspects are still inadequate, practical application is more difficult. Based on the above situation, by analyzing the mode of personal cloud storage application and combining with the research of P2P technology, the paper puts forward a model of cloud storage application based on the decentralization of the whole P2P architecture. Referring to the mature Kad network technology, the new system manages the data of the whole network through the key value pair method, and makes full use of the terminal resources in the network through the P2P architecture, which greatly reduces the deployment of cloud storage and the cost of operation and maintenance. The new system uses the special bit-offset data block partition method to process the data without information, and encrypts the key user file description information. And the key value pair is used to store the data in the network through the discrete characteristic of P2P, which not only ensures the privacy and disaster recovery ability of the data storage, but also takes into account the reusability of the original file data in the network. Improve the data storage efficiency of the new system. In order to ensure the quality of service in P2P architecture, the system improves the sharing mechanism of file raw data by referring to the data routing algorithm of Kad network, and makes full use of the self-redundancy of data on each node in the network. The new algorithm can effectively guarantee the stability of data access in cloud storage. For the weakness of P2P technology in authentication and management, the system skillfully uses third-party mail system to independently manage the key information of users, so that the system has the excellent ability of data confusion and de-information storage. At the same time, using the temporary storage feature of mail, the existence time of the key information in the network is greatly reduced, and the stable storage location of this information is in the user's own trusted device. Effectively reduce the risk of user information being attacked or stolen. Through the preliminary verification and analysis of the new system, the personal cloud storage application with P2P architecture can approach or reach the current experience of C / S architecture application. At the same time, the new system makes full use of the advantages of P2P architecture, reduces the cost of deployment and maintenance of cloud storage, and improves the stability of P2P network data access through the above-mentioned technical means. The security of user identification under distributed architecture is solved, and the risk of user data being accessed or stolen is reduced, which makes the application of complete P2P architecture in personal cloud storage have higher practical value.
【學(xué)位授予單位】:復(fù)旦大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2012
【分類號(hào)】:TP333
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 魏東澤;來學(xué)嘉;;一種安全的高可靠性P2P云存儲(chǔ)備份模型初探參考文獻(xiàn)[J];信息安全與技術(shù);2011年09期
2 田敬;代亞非;;P2P持久存儲(chǔ)研究[J];軟件學(xué)報(bào);2007年06期
3 馮丹;;網(wǎng)絡(luò)存儲(chǔ)關(guān)鍵技術(shù)的研究及進(jìn)展[J];移動(dòng)通信;2009年11期
,本文編號(hào):2040667
本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2040667.html
最近更新
教材專著