ensuring data storage security in cloud computing
2016-08-23
1 0 0
4.0
Other
Earn points
Abstract - cloud computing is regarded as the architecture of the next generation of IT enterprises. On the contrary, traditional solutions, where it services are under proper physical, logical and personnel control, cloud computing mobile applications and databases to large data centers, may not be able to manage data and services completely trustworthy. This unique feature, however, will cause many new security challenges that are not well understood. In this article, we focus on the data storage security of cloud computing, which has always been an important aspect of service quality. Since ensuring the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two prominent features against its predecessors. By using homomorphic token and distributed verification, erasing encoded data, our plan realizes the correctness of vault and error location of data integration, that is, the identification of misbehaving servers. Unlike most previous works, the new plan further supports data blocks for secure and efficient dynamic operation, including data update, deletion and addition. Extensive security and performance analysis shows that the algorithm is efficient and resistant to Byzantine failure, malicious data modification attacks, and even server collusion attacks.
java
存储
安全
计算
数据
确保
Related Source Codes
Android AOA Android Open Accessory Development Usi
0
0
no vote
VPN source code accelerator
0
0
no vote
VPN source code
0
0
no vote
Springboot Campus Recruitment System
0
0
no vote
Java intelligent QR code access control management
0
0
no vote
No comment