Research on cloud computing storage security Technology

Source: Internet
Author: User
Keywords Cloud storage cloud computing security cloud storage data integrity M-por

Research on cloud computing storage security Technology

Saint-Min of Jilin University

In this paper, in the face of cloud computing data storage security problem, the author from the data Integrity protection and data privacy protection of two aspects of the study respectively. In terms of data integrity protection, in order to enable users to know the state of their data in real time and to repair the damaged data in a certain range, this paper, based on the research results of the existing data integrity protection technology, puts forward the data retrieval proof algorithm M-por, the algorithm uses the message authentication code to make the data block itself produce " Post, verify the integrity of the data in the cloud through the challenge-response-validation process, and because of the characteristic of the message authentication code, the "sentry post" has the traditional data verification function, but also has the error localization ability, and when the data error is less than the threshold value, the RS correction code is introduced in the coding process. The data can be recovered by RS encoding redundant data, and the redundancy of replicas in the cloud is also taken into account to enhance the data recoverability. For the privacy protection of data in this paper, we put forward a cloud security storage mc-r strategy, which is encrypted by client and cloud segment, in which the MC encryption algorithm is implemented in the client, which realizes data camouflage, data hiding and real data marking three modules, and effectively enhances the privacy of data. And to prevent the disclosure of privacy data upload process; R module uses the computing advantage of cloud computing to complete RSA encryption of data in the cloud with the public key that is uploaded together with the data, again enhances the security of the privacy data storage, better compensates the user to store the data in the third party's trust crisis.

Research on cloud computing storage security Technology

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.