外包存儲(chǔ)環(huán)境下完整性檢測方案的研究.pdf_第1頁
已閱讀1頁,還剩72頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、電子科技大學(xué)碩士學(xué)位論文外包存儲(chǔ)環(huán)境下完整性檢測方案的研究姓名:胡欽超申請學(xué)位級(jí)別:碩士專業(yè):通信與信息系統(tǒng)指導(dǎo)教師:涂曉東20100501ABSTRACTABSTRACTInrecentyears,withtheexplosiveexpansionofstorageneedsand也ellighcostofthestorageoutsourcingstorageapplicationshavebecomeincreasinglypra

2、cticalNowuserscallstorelargeamountsofdatainmultipleremoteserverswithrelativelylOWcostCorporationsandconllnonconsul:ncTSareincreasinglyturningtooutsourcingresourcesfordatastorage,withsecurityguaranteethatnobodycouldchange

3、ordeletetheirdata嬲wellasfileoperationsarecorrectlyimplementedSomeoutsourcingstoragesystemsalsoprovideadditionalservicestoensul“edataconfidentialityandintegrityofdatatransmissionHowevertheydonotprovideasolutiontoaddressth

4、estoragedataandoperationsintegrityproblem(atthesanletime,thestorageservermayalsobeanattacker),whichispreciselyaveryimportantissueintheoutsourcingstoragesystemsTherefore,theclientsshouldhavetodeveloptheirownauthentication

5、solutionsNowdespitethatmanyintegritycheckingsolutionsareavailableeachofwhichhasspecialscopeofapplication,almostnoneofthemfitswellintheoustsourcingenvironmentTheoutsourcingstorageisnotjustuntrusted,butalsoneedstobepaidfor

6、beforeyouuseitTherefore,whatoutsourcingneedsisnotjustsafetybutalsocost—efficiencyThence,whencheckingthefileintegritynotjusttocalculateahashvalueoutoftheentirefile,buttodivide也efileintoblocks,thenbuildastatefulMACtreeasar

7、esult,thesolutioncouldsupportrandomcheckingofsomefileblockInadditiontocheckingtheintegrityofthefilecontent,thesolutioncouldstilldetectifthefileoperationsarecorrectlyimplementedSOthatifanoperationisnotcorrectlyimplemented

8、youdonotneedtocheckthefileintegrityIn。thispaperathreepartyauthenticationmodel(aseparateserverforauthenticationisincluded)isapplied,forreducingthesizeofthetrustedstoragespace(usuallytheclient’Sstoragespace)Meanwhileinthes

9、olution,thestatefulMACtreeforcheckingfilecontentintegritytheskiplistforcheckingoperationsequenceareusedBesides,thePolyl305一AESastheMACoptionhasgreatlyenhancedthecomputingefficiencyTheverificationprocessismanagedbyapplica

最新文檔

評論

0/150

提交評論