Research on cloud storage security in the environment of Internet of things

  Research on cloud storage security in the environment of Internet of things

  The Internet of Things (IOT) is a kind of network which uses computer technology, Internet technology, communication technology, sensor technology and other technologies to connect goods with the Internet in order to realize the functions of information transmission, intelligent identification, goods management and so on.

  With the extensive attention of cloud computing technology, cloud storage technology has also received extensive attention. Cloud storage can integrate a variety of storage devices under the support of a series of software, forming a mass of storage space for empty users to use. Using cloud storage services, IOT providers can avoid building self built data storage centers.Saving operation cost and improving service quality.

” >

  First, cloud storage technology overview

  Cloud storage technology is an extension of cloud computing technology, which integrates various storage devices by using various technical means such as cluster application, grid technology, distributed file system, and so on, and realizes the cooperative work of storage devices with different architectures for data storage and business access.

  Two, analysis of key technologies in cloud storage security

  Cloud storage involves huge amounts of user data, and its security performance is more important than traditional storage. Because cloud storage has many different characteristics from traditional storage, the security protection technology for cloud storage is also different from traditional security protection measures. Data encryption storage and retrieval technology in cloud storage are listed below.Cryptographic access control technology and other security technologies are analyzed.

  1. Data encryption storage and retrieval technology

  Because the data is stored in the cloud, the data must be encrypted to avoid illegal data acquisition or data leakage. The encryption of data in cloud storage exists in the process of data transmission and data storage.

  Common encryption and retrieval algorithms include linear search algorithm, security index algorithm, keyword-based public key search algorithm, sorting search algorithm, homomorphic encryption and retrieval algorithm.

  Linear search algorithm is to search for information with the following encrypted storage structure. First, the plaintext information is encrypted into ciphertext information, and then a series of pseudo-random sequences are generated according to the ciphertext information corresponding to the keywords. Then, the pseudo-random sequence and the current ciphertext information are generated to encrypt the ciphertext information.

  The security index algorithm generates a set of inverse Hash sequences using the encrypted secret key, and puts the index into the Bloom filter. When the user retrieves, the inverse Hash sequence is used to generate multiple trap gates for Bloom detection. The data obtained by decrypting the returned document is the required data.

  Keyword-based public key search algorithm uses the public key to encrypt the stored data and directly generates the ciphertext information that can be used for searching. The algorithm is suitable for data storage and retrieval in mobile environment.

  The implementation of sorting search algorithm is to preserve the word frequency of keywords in data documents. When searching, we first retrieve the ciphertext containing the key words, and then sort the ciphertext information using the order preserving algorithm to recover the plaintext data.

  The full-homomorphic encryption retrieval algorithm uses vector space model to calculate the correlation between the stored information and the information to be checked. According to the word frequency and document frequency, it uses the full-homomorphic encryption algorithm to encrypt the document, and at the same time, it establishes an index. Indexing only requires plaintext encrypted by encryption algorithm.Data can be achieved without returning plaintext information.

  2. Analysis of cloud data access security control

  Cloud storage network environment is relatively complex, and dominated by commercial interests, cloud services to ensure the security mechanism is effective, in untrusted scenarios, the use of ciphertext access control technology can effectively eliminate users’concerns about information security. Commonly used ciphertext access control methods are as follows:

  The most basic method is to encrypt the file key for the data owner, and the user accesses the server directly with the key. Hierarchical access control method allows users to derive the authorized data key through the user’s private key and the public information table. Proxy re encryption technology mainly uses user information to generate a proxy weight.Encryption key, which is used to encrypt the encrypted information twice, generates ciphertext data that can only be decrypted by a specified user.

  Three. Summary

  The development of the Internet of things has greatly promoted the development of cloud computing and cloud storage. With the rapid development of cloud storage technology, the challenge of data security is becoming more and more serious. In order to ensure the user’s information security, it is necessary to adopt high-strength data protection technology.The cornerstone.

Leave a Reply

Your email address will not be published. Required fields are marked *