Analysis of key technologies in cloud storage security

Source: Internet
Author: User
Keywords Security cloud storage cloud storage

The Internet of things is a kind of network which uses computer technology, Internet technique, communication technology, sensing technology and so on to connect the goods with the net to realize the function of information transmission, intelligent recognition and object management.

With the wide attention to cloud computing technology, cloud storage technology has been widely paid attention to. Cloud storage can integrate a variety of storage devices under the support of a series of software, which forms the use of empty users of mass storage space. Using cloud storage Service, IoT suppliers can achieve the goal of avoiding the data storage center, saving operation cost and improving service quality.

Overview of cloud storage technology

Cloud storage technology is the extension of cloud computing technology, through the use of a variety of technical means such as cluster application, grid technology, Distributed file system, etc., the integration of a variety of storage devices to achieve different architectures of storage equipment for the collaborative work, for users to data storage and business access.

Second, the key technology analysis of cloud storage security

Cloud storage involves huge user data, and its security is more important than traditional storage. Since cloud storage has many characteristics different from traditional storage, the security protection technology adopted for cloud storage is different from traditional security protection measures. The security technologies of data encryption storage and retrieval in cloud storage and ciphertext access control technology are analyzed.

2.1 Data encryption storage and retrieval technology

Because the data is stored in the cloud, the data must be encrypted to avoid the illegal acquisition of data or the occurrence of data leakage accident. The encryption of data in cloud storage also exists in the process of data transfer and stored procedures.

The commonly used cryptographic retrieval algorithms include linear search algorithm, secure indexing algorithm, public key search algorithm based on keyword, sorting search algorithm, full homomorphic encryption retrieval algorithm and so on.

A linear search algorithm is a search for information that has the following encrypted storage structure. First, the plaintext information is encrypted as ciphertext information, then a series of pseudo random sequences are generated according to the ciphertext information corresponding to the key words, and then the ciphertext information is encrypted by the pseudo random sequence and the current ciphertext information.

The secure indexing algorithm uses the cryptographic secret key to generate a set of inverse hash sequences and puts the index into the filter. When the user is retrieving, the inverse hash sequence is used to generate multiple traps and then the data is obtained after decrypting the returned document.

The keyword-based public-key search algorithm uses the public key to encrypt the stored data, and directly generates the ciphertext information which can be used for searching. The algorithm is suitable for data storage and retrieval in mobile environment.

The implementation of the sort search algorithm is to encrypt the word frequency of the key words of the data document. When retrieving, the ciphertext containing the search key is searched first, then the ciphertext information is sorted by the preserving order algorithm, and the clear text data is restored.

The full homomorphic encryption retrieval algorithm uses the vector space model to compute the correlation between the stored information and the information, and then uses the full homomorphic encryption algorithm to encrypt the document, and to establish the index. The index only need to use the encryption algorithm encrypted plaintext data can not return to the state of the text message.

Analysis of security control for 2.2 cloud data access

Cloud storage network environment is relatively complex, and is dominated by commercial interests, cloud services to ensure that the security mechanism is effective, in untrusted scenarios, the use of ciphertext access control technology can effectively eliminate users of information security concerns. Commonly used ciphertext access control methods are as follows: (1) The most basic method for data is the key to encrypt the file, users use the key to direct access to the server. (2) The hierarchical access control method is to enable the user to derive the data key that is authorized to access through the user's private key and the public information table. (3) Proxy encryption technology is mainly the use of user information to generate a proxy encryption secret key, the use of the key to encrypt the information encrypted two times to generate only the designated user can decrypt the ciphertext data.

Iii. Summary

The development of Internet of things has greatly promoted the development of cloud computing and cloud storage. With the rapid development of cloud storage technology, the challenge of data security is becoming more and more serious, so it is necessary to use high strength data protection technology to ensure the security of users ' information. Maintaining the information security of cloud storage is the cornerstone of the development of cloud storage technology.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.