基于子密钥影子信息的云存储技术研究
发布时间:2018-03-26 16:33
本文选题:云计算 切入点:云存储 出处:《兰州理工大学》2013年硕士论文
【摘要】:随着云计算的飞速发展,越来越多的人或者组织开始使用云计算资源。云计算的云存储服务的一个最大特点就是其无限的存储能力。为了降低管理和成本许多个人、企业和组织将他们的数据文件外包至云存储服务器中。 云存储服务方式主要分为两类:第一类是专用存储,即在云端存储的数据文件有且只有数据文件的持有者可以使用;第二类是共享存储,即在云端存储的数据文件可以令多个共享者使用。本文对当前的云存储安全现状进行了介绍;并依次按照云存储中的机密性、完整性、可用性、监控和审计这5个安全属性对目前云存储的安全研究状况作了介绍。介绍了与本文相关的密码学概念;并依此对加密模型、对称加密、公钥加密、公钥加密秘密共享技术和hash函数进行了介绍。 最后,本文以分布式存储模型为基础,利用AES加密方法对存储的数据文件进行加密,对已加密数据文件进行哈希运算保证存储数据文件的可验证性;将秘密共享技术利用到了云存储方案中,达到了对数据文件进行一次加密而可以令多个共享者使用,采用子密钥的影子信息技术使得子密钥可多次使用。证明了本方案具有较高的安全性、可以验证服务器端的恶意篡改,将本文设计的云存储共享方案和已有的存储共享方案进行了比较,结果表明本文方案具有较低的复杂度和较高的效率
[Abstract]:With the rapid development of cloud computing, more and more people or organizations begin to use cloud computing resources. Enterprises and organizations outsource their data files to cloud storage servers. Cloud storage services are divided into two main categories: the first is dedicated storage, which has data files stored in the cloud and is available only to the holder of the data file, and the second is shared storage. That is, the data files stored in the cloud can be used by many sharers. This paper introduces the current security situation of cloud storage, and according to the confidentiality, integrity and availability of cloud storage, Monitoring and auditing of these five security attributes of cloud storage security research status is introduced. The related cryptographic concepts are introduced, and the encryption model, symmetric encryption, public key encryption, Public key encryption secret sharing technology and hash function are introduced. Finally, based on the distributed storage model, AES encryption method is used to encrypt the stored data files and hash the encrypted data files to ensure the verifiability of the stored data files. The secret sharing technology is used in the cloud storage scheme, which can encrypt the data file once so that it can be used by more than one user. The shadow information technology of the sub-key makes the sub-key can be used many times. It is proved that this scheme has high security and can verify the malicious tampering on the server side. The cloud storage sharing scheme designed in this paper is compared with the existing storage sharing scheme. The results show that the proposed scheme has lower complexity and higher efficiency.
【学位授予单位】:兰州理工大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TP333;TN918.1
【参考文献】
相关期刊论文 前2条
1 黄东平;刘铎;戴一奇;;安全的多级门限多秘密共享[J];清华大学学报(自然科学版);2007年04期
2 冯登国;张敏;张妍;徐震;;云计算安全研究[J];软件学报;2011年01期
,本文编号:1668661
本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/1668661.html