Font Size: a A A

Design And Implementation Of Embedded Encryption Algorithm For Cloud Storage Data

Posted on:2022-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2518306320490324Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of cloud computing technology,more and more people are used to using public cloud storage services instead of traditional U disk and other storage devices.However,the personal data stored in the cloud storage platform has the risk of being collected and leaked.The security of the data stored in the cloud server is still a huge obstacle to the development and popularization of cloud storage.In view of the leakage of data stored in the cloud server,this article proposed to use a hardware client to protect the personal privacy data to be stored.The data is encrypted before the data is sent to the cloud server for storage.There was no need to install any software client on the personal or other person’s computer connected to the hardware client.The personal computer automatically recognized the client and provide file transfer functions.The user could directly transfer the data to be uploaded to the hardware client,and could select the third-party cloud platform that wanted to store personal files through the touched screen display.This design added several mainstream cloud platforms for users to choose.In order to improve security,the client used an improved AES encryption algorithm to encrypt personal data each time with a different key,and then established a connection with the cloud platform through the API interface provided by the major mainstream cloud platforms.The data contained in the file is sent to the cloud server in the form of ciphertext for preservation.The hardware encryption client used the national secret SM2 algorithm to encrypt the key used by the AES algorithm,and used information hiding technology to hide the ciphertext of the key in the picture with the original file name.The pictures contained hidden information are automatically transferred to a removable personal storage device and saved for use in decryption operations.This design used a hardware client to encrypt and protected personal data and stored the data in the cloud.The key is isolated from the stored data ciphertext and stored in the cloud server only in the form of ciphertext.In addition,individuals had full control of the image storage location where the key ciphertext is hidden,and this double line of defense ensured the security of the users’ personal privacy data.
Keywords/Search Tags:Cloud storage, Data security, Encryption operation, National secret algorithm, Information hiding
PDF Full Text Request
Related items