Earticle

현재 위치 Home

Design and Implementation of Secure Cloud Storage System Based on Elliptic Encryption

첫 페이지 보기
  • 발행기관
    ASCONS 바로가기
  • 간행물
    IJASC 바로가기
  • 통권
    Volume 3 Number 1 (2021.03)바로가기
  • 페이지
    pp.1-9
  • 저자
    Jing Yan, Zhi-heng Lin, Yong-zhen Li
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A395177

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

원문정보

초록

영어
Background/Objectives: With the rapid development of Internet technology, more and more Internet users tend to store their data and information in the cloud, and the security of the existing cloud storage system has been criticized by people, which is not conducive to protecting the data and information security of users. Therefore, how to effectively guarantee the security of cloud user data becomes more and more important. Security cloud storage system is the key to solve this problem. Methods/Statistical analysis: A secure cloud storage system is implemented for the user’s cloud data security. Its main function is: in the user login phase, the strict user identity authentication method is adopted to control the user’s access rights and prevent illegal users from logging in. Firstly, the identify authentication scheme based on zero knowledge proof is proposed. Secondly, in the user data upload stage, the user data is split. Finally, the encryption algorithm based on elliptic curve is proposed to encrypt the user’s file splitting table. Findings: The experimental results show that, in the user identify authentication stage, compared with the traditional user authentication method, the security of user identify authentication can be greatly improved by using the identify authentication method based on zero-knowledge proof. Improvements/Applications: The secure cloud storage system based on ellipse encryption developed in this thesis can realize the security of user's data by encryption while considering the efficiency of data upload and download, and has a broad application prospect.

목차

Abstract
I. INTRODUCTION
II. RELATED THEORIES AND TECHNIQUES
III. DESIGN OF THE SECURITY CLOUD STORAGE SYSTEM
A. User identify Authentication
B. User data folding and consolidation
IV. IMPLEMENTATION AND RESULTAN ALYSIS OF CLOUD STORAGE PLATFORM
V. CONCLUSION
REFERENCES

키워드

data splitting data backup elliptic encryption zero-knowledge proof

저자

  • Jing Yan [ Student, Dept. Computer Science and Technology, Yanbian University, Yanji, 133002, China ]
  • Zhi-heng Lin [ Student, Dept. Computer Science and Technology, Yanbian University, Yanji, 133002, China ]
  • Yong-zhen Li [ Professor, Dept. Computer Science and Technology, Yanbian University, Yanji, 133002, China ] Corresponding Author

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    ASCONS [The Academic Society of Convergence Science Inc]
  • 설립연도
    2017
  • 분야
    복합학>과학기술학

간행물

  • 간행물명
    IJASC
  • 간기
    계간
  • pISSN
    2619-8150
  • 수록기간
    2019~2024
  • 십진분류
    KDC 327 DDC 332

이 권호 내 다른 논문 / IJASC Volume 3 Number 1

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장