基于Hadoop和双密钥的云计算数据安全存储策略设计
DOI:
CSTR:
作者:
作者单位:

(呼伦贝尔学院 计算机科学与技术学院,内蒙古 海拉尔 021008)

作者简介:

凃云杰(1975-), 女, 河北沧州人, 硕士,副教授, 主要从事数据安全及应用方向的研究。[FQ)]

通讯作者:

中图分类号:

TP393

基金项目:

内蒙古自治区高等学校科学技术研究一般项目(NJZY14308)。


Design of Cloud Computing Safe Storage Strategy Based on Hadoop and Double Key
Author:
Affiliation:

(College of Computer Science and Technology,Hulunbeier College,Hailaer 021008,China)

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    针对原有的Hadoop平台仅通过CRC-32循环冗余校验保证数据存储的安全性,设计了一种基于双密钥和混沌信号的云计算安全存储策略;首先,介绍了原有的Hadoop框架下的数据存储对应的文件读写过程,并基于加密机制设计了改进的Hadoop数据存储模型,然后根据云存储数据量大和响应要求及时的特点,设计了一种基于双密钥的改进对称密钥算法,在传统的私钥的基础上加入动态公钥,并作为敏感函数的输入获得最终的密钥,从而实现明文的加密和密文的解密,最终定义了具体的基于Hadoop和改进双密钥对称加密算法的云计算安全存储算法;通过搭建Hadoop仿真实验平台进行实验,结果表明文中方法能有效地实现云计算环境下的安全存储,存储时间与其它方法相比少15%以上,具有安全性高和存储效率高的优点,具有一定的优越性。

    Abstract:

    Aiming at given Hadoop platform only considers the safety of CRC cyclic redundancy check can guarantee the safety of data storage, a cloud safe storage strategy based on double keys and chaos signal is proposed. Firstly, the file reading and writing process in the framework of Hadoop is described, then the improved Hadoop model based on encryption mechanism was designed, and according to the big amount of cloud storage and in time response demand, an improved symmetric key algorithm based on double key is designed, the introduced public key and the personal key are as the input of the sensitive function to implement of the text encryption. Finally, the specific algorism based on Hadoop and improved double key symmetric algorithm is defined. The simulation is operated in the Hadoop simulation platform, the result shows the method in this paper can effectively realize the safe storage in cloud environment, and the comparing time has shorted 15% compared with the other methods, so it has the properties of high safety and high storage efficiency, so it has some priority.

    参考文献
    相似文献
    引证文献
引用本文

云杰,白杨.基于Hadoop和双密钥的云计算数据安全存储策略设计计算机测量与控制[J].,2014,22(8):2629-2631.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2014-01-19
  • 最后修改日期:2014-03-26
  • 录用日期:
  • 在线发布日期: 2014-12-16
  • 出版日期:
文章二维码