当前位置:主页 > 科技论文 > 计算机论文 >

基于P2P原理的个人云存储应用研究

发布时间:2018-06-19 17:18

  本文选题:P2P + 云存储 ; 参考:《复旦大学》2012年硕士论文


【摘要】:云存储已经提出了若干年,但其云的概念通常只存在于服务端,广大的客户端资源并没有被有效利用,数据的控制权、安全性也不甚理想。之前的研究成果中,大多将P2P技术都应用于服务端,主题仍是C/S架构;部分研究中对完全P2P架构在云存储架中的应用做了可行性分析,但在身份认证、数据存储效率、数据访问稳定性等方面仍有不足,实际应用比较困难。 基于上述情况,通过对个人云存储应用的模式深入分析,并结合P2P技术研究,提出以去中心化的全P2P架构的云存储应用模型。新系统参考成熟的Kad网络技术,通过Key值对方式进行全网数据管理,充分通过P2P架构对网络中的各终端资源加以有效利用,极大地降低了云存储的部署、运维成本。 新系统通过特殊的按位偏移的数据块划分方式对数据进行去信息化处理,同时对关键的用户文件描述信息进行加密保护,并统一采用key值对的方式通过P2P的离散特性存储与网络中,在保证了数据存储的私密性与容灾能力的同时,又兼顾了原始文件数据在网络中的可复用性,提高新系统的数据存储效率。 为了保证P2P架构下的服务质量,系统通过参考Kad网络的数据路由算法,改进了其对于文件原始数据的分享机制,并充分利用网络中各结点上数据的自冗余特性,使新算法能够有效保证云存储中数据访问的稳定性。 对于P2P技术在身份验证及管理方面的薄弱环节,系统巧妙地利用第三方邮件系统独立管理用户关键信息,使系统具有极佳的数据混淆与去信息化存储能力。同时,利用邮件的暂存特性,使用户关键信息在网络中的存在的时间大幅减少,这些信息的稳定存储位置都在用户自己的可信设备中,有效降低用户信息被攻击或被窃取的风险。 通过新系统的初步验证分析,采用P2P架构的个人云存储应用能够接近或达到目前C/S架构应用的使用体验。同时,新系统充分发挥了P2P架构的优势,降低了云存储的部署与维护成本,并通过上述技术手段,提高了P2P网络数据访问的稳定性,解决了分布式架构下用户身份识别的安全性,减小了用户数据被越权访问或盗取的风险,这使得完全P2P架构在个人云存储中的应用具有较高的实用价值。
[Abstract]:Cloud storage has been put forward for a number of years, but the concept of cloud usually only exists in the server, the vast number of client resources have not been used effectively, and the control and security of data are not very good. In the previous research results, most of the P2P technologies have been applied to the server, and the topic is still C / S architecture. In part of the research, the feasibility of the application of the complete P2P architecture in the cloud storage frame is analyzed, but in identity authentication, data storage efficiency, Data access stability and other aspects are still inadequate, practical application is more difficult. Based on the above situation, by analyzing the mode of personal cloud storage application and combining with the research of P2P technology, the paper puts forward a model of cloud storage application based on the decentralization of the whole P2P architecture. Referring to the mature Kad network technology, the new system manages the data of the whole network through the key value pair method, and makes full use of the terminal resources in the network through the P2P architecture, which greatly reduces the deployment of cloud storage and the cost of operation and maintenance. The new system uses the special bit-offset data block partition method to process the data without information, and encrypts the key user file description information. And the key value pair is used to store the data in the network through the discrete characteristic of P2P, which not only ensures the privacy and disaster recovery ability of the data storage, but also takes into account the reusability of the original file data in the network. Improve the data storage efficiency of the new system. In order to ensure the quality of service in P2P architecture, the system improves the sharing mechanism of file raw data by referring to the data routing algorithm of Kad network, and makes full use of the self-redundancy of data on each node in the network. The new algorithm can effectively guarantee the stability of data access in cloud storage. For the weakness of P2P technology in authentication and management, the system skillfully uses third-party mail system to independently manage the key information of users, so that the system has the excellent ability of data confusion and de-information storage. At the same time, using the temporary storage feature of mail, the existence time of the key information in the network is greatly reduced, and the stable storage location of this information is in the user's own trusted device. Effectively reduce the risk of user information being attacked or stolen. Through the preliminary verification and analysis of the new system, the personal cloud storage application with P2P architecture can approach or reach the current experience of C / S architecture application. At the same time, the new system makes full use of the advantages of P2P architecture, reduces the cost of deployment and maintenance of cloud storage, and improves the stability of P2P network data access through the above-mentioned technical means. The security of user identification under distributed architecture is solved, and the risk of user data being accessed or stolen is reduced, which makes the application of complete P2P architecture in personal cloud storage have higher practical value.
【学位授予单位】:复旦大学
【学位级别】:硕士
【学位授予年份】:2012
【分类号】:TP333

【参考文献】

相关期刊论文 前3条

1 魏东泽;来学嘉;;一种安全的高可靠性P2P云存储备份模型初探参考文献[J];信息安全与技术;2011年09期

2 田敬;代亚非;;P2P持久存储研究[J];软件学报;2007年06期

3 冯丹;;网络存储关键技术的研究及进展[J];移动通信;2009年11期



本文编号:2040667

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2040667.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户3a643***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com