What is the cloud storage security technology under the Internet of Things?

First, cloud storage technology overview

Cloud storage technology is an extension of cloud computing technology. It integrates multiple storage devices by using various technical means such as cluster applications, grid technologies, distributed file systems, etc., to realize the collaborative work of different architecture storage devices. Users perform data storage and business access.

Second, the analysis of key technologies in cloud storage security

Cloud storage involves huge user data, and its security performance is more important than traditional storage. In view of the fact that cloud storage has many different characteristics from traditional storage, the security protection technology adopted for cloud storage is different from traditional security protection measures. The following sections analyze security technologies such as data encryption storage and retrieval technology and ciphertext access control technology in cloud storage.

2.1 Data Encryption Storage and Retrieval Technology

Since the data is stored in the cloud, the data must be encrypted to avoid illegal data acquisition or data leakage. Encryption of data in cloud storage exists in both the data transmission process and the data storage process.

Commonly used encryption retrieval algorithms include linear search algorithm, security index algorithm, keyword-based public key search algorithm, sort search algorithm, and homomorphic encryption search algorithm.

A linear search algorithm refers to searching for information having an encrypted storage structure as follows. First, the plaintext information is encrypted into ciphertext information, and then a string of pseudo-random sequences is generated according to the ciphertext information corresponding to the keyword, and then the ciphertext information is encrypted by generating the check sequence by the pseudo-random sequence and the current ciphertext information.

The secure indexing algorithm uses the encryption key to generate a set of inverse Hash sequences and puts the index into the Bloom filter. When the user performs the search, the inverse Hash sequence used generates multiple trapdoors to perform the Bloom detection, and the data obtained after decrypting the returned document is the required data.

The keyword-based public key search algorithm uses the public key to encrypt the stored data and directly generates ciphertext information that can be used for searching. The algorithm is suitable for data storage and retrieval needs in a mobile environment.

The implementation of the sorting search algorithm is to perform the order-preserving encryption of the word frequency of the keywords of the data document. When performing the search, the ciphertext containing the search keyword is first searched, and then the ciphertext information is sorted using the order-preserving algorithm to restore the plaintext data.

The homomorphic encryption retrieval algorithm uses the vector space model to calculate the correlation between the stored information and the information to be checked, and performs statistics according to the frequency of the word frequency and the frequency of the document, and then encrypts the document using the homomorphic encryption algorithm and establishes an index at the same time. . The index only needs to use the plaintext data encrypted by the encryption algorithm to achieve the state without replying to the plaintext information.

2.2 Cloud Data Access Security Control Analysis

The network environment of cloud storage is relatively complex and is dominated by commercial interests. Cloud services are effective in ensuring the security mechanism adopted. In the untrusted scenario, ciphertext access control technology can effectively eliminate users' concerns about information security. Commonly used ciphertext access control methods are as follows: (1) The most basic method is that the data owner encrypts the file and the user directly accesses the server using the key. (2) The hierarchical access control method is to let the user derive the data key authorized to access through the user private key and the public information table. (3) The proxy re-encryption technology mainly uses the user information to generate a proxy re-encryption key, and uses the key to perform secondary encryption on the encrypted information to generate ciphertext data that can be decrypted only by the specified user.

Third, summary

The development of the Internet of Things has greatly promoted the development of cloud computing and cloud storage. While cloud storage technology has developed rapidly, the data security challenges it faces are becoming more and more severe. To ensure user information security, high-intensity data protection technology must be adopted. Maintaining information security for cloud storage is the cornerstone of cloud storage technology development.

JIANGMEN LEDERLIGHT LIGHTING Co.,LTD , https://www.lederlightcn.com