云存儲數(shù)據(jù)完整性檢測技術(shù)研究
[Abstract]:Cloud computing has become a research hotspot in recent years, and has become the trend of the development of information technology. It provides a range of services for users to use, cloud storage as a form of service followed. Cloud computing has the advantages that the traditional model can not have: provide a convenient pool of computing resources, flexible resources, security and controllable, reliable data, cost savings, unified management, cheap fault tolerance, So cloud service related products are more and more popular with users. Cloud storage, as the core service module of cloud service, is favored by users for its high scalability, high reliability, low cost, convenient data management and convenient access as well as secure and reliable data management. The main data management mode in cloud storage is that users move data to the cloud, which brings challenges to data security. In this paper, the data integrity detection technology in cloud storage security is studied. Firstly, the characteristics of cloud storage platform are analyzed, then the challenges in cloud security field are analyzed, and the existing integrity detection technology is studied. Learning to study the integrity of the model, analysis of the advantages and disadvantages of the relevant models. A model for integrity detection of cloud storage data is designed based on the classical research ideas of integrity detection. In order to satisfy the characteristics of cloud storage, a third-party integrity detection system model is designed, and a batch data holding detection (Batch Dynamic Provable Data Possession, BDPDP) scheme is proposed. The design of this scheme can meet the requirement of high efficiency and reliability. In order to meet the requirements of cloud storage integrity detection scheme, an embedded hash tree structure Embedded Merkle Hash Tree (EMHT). Is proposed in this paper. The structure is based on bilinear aggregate short signature algorithm for integrity verification and batch integrity verification. Then the security of the model is analyzed, and the storage cost localization performance is compared with the classical algorithm. According to the experimental results, the advantages and disadvantages of the proposed scheme are analyzed. Finally, the proposed scheme is summarized and prospected. The algorithm proposed in this paper has low computational and communication overhead in cloud storage data integrity verification, which ensures the efficiency of integrity verification, and can also be used to locate error data quickly in subsequent batch structures. This paper analyzes that the design scheme has a good support for cloud storage dynamics, and the algorithm proposed in this paper provides a good research direction for cloud storage data integrity verification.
【學(xué)位授予單位】:大連理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP333;TP309
【共引文獻(xiàn)】
相關(guān)期刊論文 前10條
1 徐宗標(biāo);;存儲系統(tǒng)數(shù)據(jù)遷移方案分析[J];電信技術(shù);2014年01期
2 吳明禮;張宏安;;數(shù)據(jù)存儲技術(shù)綜述[J];北方工業(yè)大學(xué)學(xué)報;2015年01期
3 葉晨;張延園;;一種海量存儲系統(tǒng)二級緩存的設(shè)計與實現(xiàn)[J];計算機與現(xiàn)代化;2013年12期
4 高鵬;楊永健;杜占瑋;吳方明;;無線體域網(wǎng)隱私保護(hù)技術(shù)研究[J];計算機應(yīng)用研究;2013年11期
5 聶瑞華;張科倫;梁軍;;一種改進(jìn)的云存儲系統(tǒng)容錯機制[J];計算機應(yīng)用研究;2013年12期
6 Shuang TAN;Yan JIA;;NaEPASC:a novel and efficient public auditing scheme for cloud data[J];Journal of Zhejiang University-Science C(Computers & Electronics);2014年09期
7 馮朝勝;秦志光;袁丁;;云數(shù)據(jù)安全存儲技術(shù)[J];計算機學(xué)報;2015年01期
8 譚霜;賈焰;韓偉紅;;云存儲中的數(shù)據(jù)完整性證明研究及進(jìn)展[J];計算機學(xué)報;2015年01期
9 戴佳筑;;網(wǎng)上審計中審計數(shù)據(jù)真實性保護(hù)的研究[J];審計研究;2006年S1期
10 邵志毅;楊波;梁啟凡;;云計算中數(shù)字圖書館外包數(shù)據(jù)的完整性檢測[J];圖書館論壇;2014年12期
相關(guān)會議論文 前2條
1 鄭誠;張堅盛;林淳;蔡永全;;基于NAS的企業(yè)數(shù)據(jù)存儲平臺研究與應(yīng)用[A];2014電力行業(yè)信息化年會論文集[C];2014年
2 鄭誠;張堅盛;林淳;蔡永全;;基于NAS的企業(yè)數(shù)據(jù)存儲平臺研究與應(yīng)用[A];軟件定義 面向未來——2014電力行業(yè)信息化年會論文集[C];2014年
相關(guān)博士學(xué)位論文 前6條
1 周永彬;PKI理論與應(yīng)用技術(shù)研究[D];中國科學(xué)院研究生院(軟件研究所);2004年
2 柳毅;移動代理技術(shù)中若干安全問題的研究[D];西安電子科技大學(xué);2005年
3 安寶宇;云存儲中數(shù)據(jù)完整性保護(hù)關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2012年
4 馬琳;面向移動互聯(lián)網(wǎng)的開放服務(wù)技術(shù)架構(gòu)及若干關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2013年
5 孫順遠(yuǎn);無線傳感器網(wǎng)絡(luò)定位算法及應(yīng)用研究[D];江南大學(xué);2014年
6 劉應(yīng)波;太陽望遠(yuǎn)鏡海量數(shù)據(jù)存儲關(guān)鍵技術(shù)研究[D];中國科學(xué)院研究生院(云南天文臺);2014年
相關(guān)碩士學(xué)位論文 前10條
1 董九山;基于加密自檢測的軟件防篡改技術(shù)的研究與實現(xiàn)[D];華中科技大學(xué);2007年
2 雷植洲;代碼混淆技術(shù)及其在軟件安全保護(hù)中的應(yīng)用研究[D];華中科技大學(xué);2007年
3 張永勝;面向代理服務(wù)的分布式文件系統(tǒng)設(shè)計與實現(xiàn)[D];哈爾濱工業(yè)大學(xué);2012年
4 王瑞;基于分布式存儲的磁盤鏡像管理系統(tǒng)[D];南京郵電大學(xué);2013年
5 賴文華;分布式對象云存儲平臺設(shè)計及第三方應(yīng)用開發(fā)[D];華南理工大學(xué);2013年
6 張文敬;動態(tài)最優(yōu)路徑機制在網(wǎng)絡(luò)存儲中的應(yīng)用[D];西安建筑科技大學(xué);2013年
7 徐越;面向高性能計算的分布式內(nèi)存文件緩存系統(tǒng)[D];華中科技大學(xué);2013年
8 何艷麗;基于快照的虛擬磁盤鏡像檢查點系統(tǒng)[D];華中科技大學(xué);2013年
9 蔡啟泉;云數(shù)據(jù)完整性審計系統(tǒng)的設(shè)計與實現(xiàn)[D];華中科技大學(xué);2013年
10 葉為民;分布式文件系統(tǒng)自適應(yīng)負(fù)載調(diào)度研究[D];華中科技大學(xué);2013年
,本文編號:2194397
本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2194397.html