云环境下基于图像置乱的信息传输安全研究
发布时间:2018-06-17 09:18
本文选题:云安全 + 图像置乱 ; 参考:《辽宁大学》2014年硕士论文
【摘要】:云存储作为云计算的衍生服务,为用户提供存储备份和管理文件的功能,云存储不但存取灵活,可扩展性强,而且按需收费甚至是免费的形式更加快了人们的广泛使用。随着越来越多的用户选择将信息存储到云端,面向云存储的安全问题成为研究的热点。 图像作为一种典型的个人信息,在传输的过程中可能受到监听、窃取、剪切攻击、污染攻击、涂画攻击、标识攻击等;在存储端可能会受到非法访问、篡改等,这些都会造成潜在的安全问题。为了解决图像在整个云存储过程中的安全问题,本文主要做了以下工作: 首先,提出基于Eucalyptus的图像信息安全的云安全框架。以云存储的传统四层框架为基础,重点先在传输过程加入图像置乱系统,,提高图像的隐私性,有效掩盖图像真实信息,防止他人窃取。然后在存储过程采用信息扩散算法(IDA)进行分布式存储管理,该算法占用存储空间小,适合大数据量的云环境,进一步保证图像在存储时的抗攻击性。 其次,在云安全框架的基础上,针对传输过程中图像这种信息形式,提出基于分块置乱的图像容错算法。首先考虑到传输时效性,采用分块置乱方式,简便快捷,提高图像隐私性。同时为了提高图像的容错能力,采用二次剩余定理和Rabin密码体系相结合的方法,能够在图像受攻击后最大限度进行恢复,有效提高图像传输过程的抗攻击性和鲁棒性。 最后,通过仿真实验,验证了本文算法的置乱效果。并通过模拟剪切攻击、污染攻击、涂画攻击、标识攻击实验,得到了恢复图像的效果以及抗不同攻击强度的对比数据,结果表明本文算法能够有效抵抗一定强度的攻击,加密时间花费较少,适合网络传输的云存储环境。
[Abstract]:As a derivative service of cloud computing, cloud storage provides the function of storing and managing files for users. Cloud storage is not only flexible and extensible, but also is widely used in the form of charge and even free form. As more and more users choose to store information to cloud, security for cloud storage The problem has become a hot spot of research.
As a typical personal information, image may be monitored, stolen, cut attack, pollution attack, painting attack, identification attack, etc. in the process of transmission, and may be illegally accessed and tampered in the storage side, which can cause potential security problems. The main work of this article is as follows:
First, a cloud security framework based on Eucalyptus image information security is proposed. Based on the traditional four layer framework of cloud storage, the image scrambling system is added to the transmission process to improve the privacy of the image, effectively cover the true information of the image and prevent the theft of others. Then, the information diffusion algorithm (IDA) is used in the storage process to distribute the information. This algorithm takes up small storage space and is suitable for large data cloud environment, and further ensures the image's attack resistance during storage.
Secondly, on the basis of the cloud security framework, the image fault tolerance algorithm based on block scrambling is proposed in view of the information form in the transmission process. First, considering the timeliness of transmission, a block scrambling method is adopted to improve the privacy of the image. In order to improve the fault tolerance of the image, the two remainder theorem and the Rabin password are adopted. The method of combining the system can restore the image to the maximum extent after being attacked, and effectively enhance the attack and robustness of the image transmission process.
Finally, through the simulation experiment, the scrambling effect of the algorithm is verified. The results of the simulated shear attack, the pollution attack, the painting attack and the identification attack experiment are obtained. The results of the restoration of the image and the contrast data against the different attack intensity are obtained. The results show that the algorithm can effectively resist the attack of a certain intensity, and the time of encryption is less expensive. A cloud storage environment suitable for network transmission.
【学位授予单位】:辽宁大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP333;TP309
【参考文献】
相关期刊论文 前7条
1 闫伟齐,丁玮,齐东旭;基于中国剩余定理的图像分存方法[J];北方工业大学学报;2000年01期
2 乔静;王玲;徐正雄;可向民;廖晓斌;;基于分块技术的置乱算法[J];计算机安全;2009年01期
3 张胜元,陈杰;基于矩阵变换的数字图像置乱技术[J];福建师范大学学报(自然科学版);2004年04期
4 向德生,熊岳山;基于约瑟夫遍历的数字图像置乱算法[J];计算机工程与应用;2005年10期
5 丁玮,闫伟齐,齐东旭;基于Arnold变换的数字图像置乱技术[J];计算机辅助设计与图形学学报;2001年04期
6 冯登国;张敏;张妍;徐震;;云计算安全研究[J];软件学报;2011年01期
7 边根庆;高松;邵必林;;面向分散式存储的云存储安全架构[J];西安交通大学学报;2011年04期
本文编号:2030529
本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2030529.html