| Cloud computing and cloud storage needs more and more intense with the rapid development of Internet and big data,at the same time,more and more users begin to store data in the cloud.Cloud disk as the online cloud storage services,make users can simply pay-for-use.It implements fast the data of dynamic extension,of permanent stores,of anytime and anywhere online access and efficient share collaboration capabilities.So to say the cloud storage service has a great market size and application prospect.However,although the online cloud storage has obvious advantages,but there are still quite a number of governments and enterprises holding the wait-and-see attitude to Cloud disk.A lot of personal users are just to save some unimportant documents and data in the cloud.This attitude is mainly due to fear of data security issues.Using cloud service model means that the user put private data in the cloud,the data out of owner’s control and be controlled in cloud service.So that save the data in cloud,the important factors is how to realize the user data confidentiality and integrity,which has become hindering the development of cloud storage service.We analyzed the data security category and the main problems of cloud disk products to enterprise in this paper,cleared goals of achieving data security,determined the specific points to related implement goals.Through established a key management system for encryption and decryption of regular file,and a shared secret key system for eliminating redundancy of cryptograph,realized a method for data protection which supports eliminating redundancy of cryptograph.We designed a method of data integrity check,which to ensure that decision the clear-text andcryptograph under the premise of unknown the correct abstract of clear-text,andprevent data forgery attacks.Finally completed a solution process to realizedconfidentiality and integrity of the user’s data in cloud environment.We also designed the data security subsystem according to the data security scheme in cloud disk of enterprise,given the interaction process to data security subsystem and the lower level service,and completed the safety of the API structure design.Through the solution in production practice,verified The actual application results. |