Research on cloud computing storage security Technology
Saint-Min of Jilin University
In this paper, in the face of cloud computing data storage security problem, the author from the data Integrity protection and data privacy protection of two aspects of the study respectively. In terms of data integrity protection, in order to enable users to know the state of their data in real time and to repair the damaged data in a certain range, this paper, based on the research results of the existing data integrity protection technology, puts forward the data retrieval proof algorithm M-por, the algorithm uses the message authentication code to make the data block itself produce " Post, verify the integrity of the data in the cloud through the challenge-response-validation process, and because of the characteristic of the message authentication code, the "sentry post" has the traditional data verification function, but also has the error localization ability, and when the data error is less than the threshold value, the RS correction code is introduced in the coding process. The data can be recovered by RS encoding redundant data, and the redundancy of replicas in the cloud is also taken into account to enhance the data recoverability. For the privacy protection of data in this paper, we put forward a cloud security storage mc-r strategy, which is encrypted by client and cloud segment, in which the MC encryption algorithm is implemented in the client, which realizes data camouflage, data hiding and real data marking three modules, and effectively enhances the privacy of data. And to prevent the disclosure of privacy data upload process; R module uses the computing advantage of cloud computing to complete RSA encryption of data in the cloud with the public key that is uploaded together with the data, again enhances the security of the privacy data storage, better compensates the user to store the data in the third party's trust crisis.
Research on cloud computing storage security Technology