当前位置:主页 > 科技论文 > 计算机论文 >

云存储下的完整性验证机制研究

发布时间:2018-05-15 16:12

  本文选题:云存储 + 完整性验证 ; 参考:《华北水利水电大学》2017年硕士论文


【摘要】:目前,随着近些年云计算的迅猛发展,其相关的产品也得到了井喷式的发展,而云存储在云计算的产品中占有重要的地位,由于数据量呈现爆炸式的增加,对于数据的存储也提出了新的要求,传统的存储方式已经远远不能满足现在的存储要求,云存储的出现极大的满足了人们对于海量数据存储的需求,但是与云存储相关的安全问题随之而来,云存储给人们带来便捷的同时也为非法盗取数据提供了方法。安全问题成了云存储发展的一个瓶颈,如何使用户的数据能够保证安全,不被有意或者无意的篡改,通过何种方式能让用户更加便捷的知道数据的安全情况,是否遭受破坏。本文主要针对云存储上数据完整性验证进行研究。通过对比分析现有完整性验证机制的优劣。进一步提出新的完整性验证机制,以期更好的对于数据完整性验证提供帮助。论文主要内容包括:1.论文首先对于目前的几种完整性验证方法进行梳理和分析,并且重点分析了MHT模型。然后提出了一种既支持动态数据块更新、又支持公开验证的完整性检测方案模型R-MHT,在对R-MHT模型进行了角色和函数定义之后,构造了在模型中的两种检测过程,并且给出R-MHT模型的修改、插入和删除三种操作算法。2.针对提出的R-MHT模型首先通过理论分析,理论上得出计算、通信和存储复杂度。这些计算出来的复杂度和POR、PDP、MHT进行了对比,得出了R-MHT模型的优势所在,然后在Hadoop上进行模拟实验分析。通过在Hadoop上的模拟实验,可以得出R-MHT模型在数据块一定的情况下,R-MHT模型的响应反馈时间的优势。
[Abstract]:At present, with the rapid development of cloud computing in recent years, its related products have also been blowout development. Cloud storage plays an important role in cloud computing products. For the storage of data has put forward new requirements, the traditional storage way has been far from meeting the current storage requirements, cloud storage has greatly met the demand for massive data storage. However, the security problems related to cloud storage come along. Cloud storage brings convenience to people, and it also provides a method for illegally stealing data. Security problem has become a bottleneck of cloud storage development, how to make the user's data secure, not intentionally or unintentionally tampered with, through what means can users know the security situation of the data more conveniently, whether it has been damaged. This paper focuses on data integrity verification on cloud storage. The advantages and disadvantages of the existing integrity verification mechanism are compared and analyzed. Further, a new integrity verification mechanism is proposed to provide better help for data integrity verification. The main contents of the thesis include: 1. In this paper, firstly, several integrity verification methods are combed and analyzed, and the MHT model is analyzed. Then, an integrity checking scheme model R-MHT, which supports both dynamic data block update and public verification, is proposed. After defining the roles and functions of the R-MHT model, two detection processes are constructed in the model. The modification, insertion and deletion of R-MHT model are also given. 2. 2. Firstly, the computational, communication and storage complexity of the proposed R-MHT model is obtained by theoretical analysis. The computational complexity is compared with that of PORN PDP- MHT, and the advantages of R-MHT model are obtained, and then the simulation experiments are carried out on Hadoop. Through the simulation experiments on Hadoop, the superiority of R-MHT model in response feedback time of R-MHT model under certain data block can be obtained.
【学位授予单位】:华北水利水电大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP333

【参考文献】

相关期刊论文 前9条

1 冯朝胜;秦志光;袁丁;;云数据安全存储技术[J];计算机学报;2015年01期

2 黄声国;吴蕃;;浅谈RSA公司事件“后门”[J];中国金融电脑;2014年07期

3 王威;吴羽翔;金鑫;李宁滨;;基于可信第三方的公有云平台的数据安全存储方案[J];信息网络安全;2014年02期

4 陈龙;李俊中;;支持不同粒度运算的远程数据完整性验证[J];吉林大学学报(工学版);2012年S1期

5 王涛;王旭辉;康晓凤;;RSA数据加解密算法的研究及其Delphi实现[J];软件导刊;2012年02期

6 张尧学;周悦芝;;一种云计算操作系统TransOS:基于透明计算的设计与实现[J];电子学报;2011年05期

7 陈康;郑纬民;;云计算:系统实例与研究现状[J];软件学报;2009年05期

8 潘恒,徐斌,祝跃飞;一种新的私钥安全存取方案[J];计算机应用研究;2005年10期

9 陈太道;柯西积分概念与勒贝格积分概念的比较[J];琼州大学学报;2003年02期



本文编号:1893035

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/1893035.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户95c9f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com