中国韩国日本在线观看免费,A级尤物一区,日韩精品一二三区无码,欧美日韩少妇色

當(dāng)前位置:主頁 > 科技論文 > 計(jì)算機(jī)論文 >

云存儲(chǔ)中數(shù)據(jù)安全關(guān)鍵技術(shù)研究及系統(tǒng)實(shí)現(xiàn)

發(fā)布時(shí)間:2018-06-13 10:54

  本文選題:云存儲(chǔ) + 數(shù)據(jù)冗余; 參考:《北京郵電大學(xué)》2013年碩士論文


【摘要】:隨著云存儲(chǔ)系統(tǒng)的發(fā)展和在復(fù)雜環(huán)境中的應(yīng)用,它的數(shù)據(jù)安全性也越來越受到廣泛的關(guān)注。一方面,節(jié)點(diǎn)崩潰或者外部入侵都有可能導(dǎo)致數(shù)據(jù)不完整;另一方面當(dāng)數(shù)據(jù)不完整時(shí),由于云服務(wù)提供商故意隱瞞或其它因素,用戶無法及時(shí)獲知這種變化。針對(duì)上述問題,本文進(jìn)行深入研究,圍繞如何檢測(cè)數(shù)據(jù)完整性和數(shù)據(jù)不完整時(shí)如何保障數(shù)據(jù)可用性這兩點(diǎn),提出了一個(gè)安全存儲(chǔ)系統(tǒng)方案。 本文從數(shù)據(jù)可用性著手,研究首先集中在數(shù)據(jù)的機(jī)密性、數(shù)據(jù)的丟失恢復(fù)和數(shù)據(jù)的篡改恢復(fù)。結(jié)合對(duì)稱加密技術(shù)和糾刪碼技術(shù),本文提出了一個(gè)基于Tornado碼的數(shù)據(jù)安全存儲(chǔ)方案(DSBT)。方案采用引導(dǎo)密碼解決傳統(tǒng)對(duì)稱數(shù)據(jù)加密中密鑰難以管理和保存的問題;采用糾刪碼中的Tornado碼設(shè)計(jì)數(shù)據(jù)冗余系統(tǒng)以解決數(shù)據(jù)丟失恢復(fù)問題;并通過帶密鑰的哈希使Tornado碼具備糾錯(cuò)功能從而解決數(shù)據(jù)的篡改問題。 在此基礎(chǔ)上,論文繼續(xù)開展對(duì)數(shù)據(jù)可取回性檢測(cè)(POR)的研究。在經(jīng)典的基于BLS短簽名的POR算法基礎(chǔ)上,引入可信日志,采用可信日志向用戶提供檢測(cè)結(jié)果,實(shí)現(xiàn)輕量級(jí)的第三方架構(gòu)。最后結(jié)合DSBT方案,優(yōu)化POR算法的計(jì)算效率,使其與文件大小無關(guān),達(dá)到常數(shù)級(jí)的計(jì)算復(fù)雜度。 根據(jù)上述方案,本文實(shí)現(xiàn)了一個(gè)基于Cassandra的安全云存儲(chǔ)原型系統(tǒng)。同時(shí)測(cè)試顯示,系統(tǒng)能提供較強(qiáng)的數(shù)據(jù)丟失恢復(fù)能力,有效抵抗拜占庭錯(cuò)誤,在可取回性方面的檢測(cè)能力也同樣突出,同時(shí)還具有非常高的計(jì)算效率,尤其在面對(duì)大文件時(shí)。
[Abstract]:With the development of cloud storage system and its application in complex environment, its data security has been paid more and more attention. On the one hand, the node crash or external intrusion may lead to incomplete data; on the other hand, when the data is incomplete, users can not know the change in time due to the cloud service provider deliberately concealing or other factors. Aiming at the above problems, this paper deeply studies how to detect the data integrity and how to guarantee the data availability when the data is incomplete, and puts forward a secure storage system scheme. In this paper, we focus on the confidentiality of data, the restoration of data loss and the restoration of data tampering. Combined with symmetric encryption and erasure code, a secure storage scheme based on Tornado code is proposed in this paper. The scheme adopts bootstrap cipher to solve the problem that the key is difficult to manage and save in the traditional symmetric data encryption, and the tornado code in erasure code is used to design the data redundancy system to solve the problem of data loss and recovery. The tornado code has error correction function by hashing with key to solve the problem of data tampering. On this basis, the thesis continues to carry out the research on data availability detection (POR). Based on the classical POR algorithm based on BLS short signature, the trusted log is introduced, and the trusted log is used to provide the detection result to the user, and the lightweight third-party architecture is realized. Finally, combined with the DSBT scheme, the computational efficiency of the POR algorithm is optimized to make it independent of the file size and achieve the computational complexity of constant level. According to the above scheme, this paper implements a secure cloud storage prototype system based on Cassandra. The test also shows that the system can provide strong data loss recovery ability, effectively resist Byzantine errors, and has the same outstanding detection ability in retrievability, and also has a very high computational efficiency, especially in the face of large files.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2013
【分類號(hào)】:TP333;TP309

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 肖達(dá);舒繼武;陳康;鄭緯民;;一個(gè)網(wǎng)絡(luò)歸檔存儲(chǔ)中實(shí)用的數(shù)據(jù)持有性檢查方案[J];計(jì)算機(jī)研究與發(fā)展;2009年10期

,

本文編號(hào):2013788

資料下載
論文發(fā)表

本文鏈接:http://www.lk138.cn/kejilunwen/jisuanjikexuelunwen/2013788.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶18895***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com