Font Size: a A A

Research On The Method Of Data Distributed And Secure Dissemination Based On Latin Square

Posted on:2022-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:J F YinFull Text:PDF
GTID:2568306488480294Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the continuous expansion of the scale of data and the increasing importance of data,the secure storage of data has attracted more and more attention.The secure distribution method of data is a key part of the construction of reliable distributed storage.In view of the existing data security distribution methods,the existing "insufficient key protection ability,insufficient fault tolerance of stored data,and large-scale decryption and re-encryption after the key is leaked." "Serious resource consumption caused by data" and other issues,proposing an efficient and safe data security dissemination method has extremely high scientific research significance and practical value.First of all,this paper proposes a Latin Square-based secret sharing method for the security protection and storage of key data in the data security distribution method,and the leakage and update of key data fragments.This method uses "Latin square contour and suitable autotopism" to uniquely restore the characteristics of the Latin square,and randomly selects the contour of the secret Latin square after isotopism conversion for secret sharing.Analysis shows that this method can overcome potential security risks,effectively avoid direct exposure of secret shards in the secret sharing process,and improve the security of the secret distribution process.At the same time,the secret shards can be updated and replaced after the shards are leaked.Secondly,this paper proposes a data security distribution method LS&SSS-RS based on the secret sharing of Latin square and Shamir,RS(Reed-Solomon)erasure code and renewable key fragmentation,which is used to secure the key and ciphertext data,leaked update of storage and key shards.In this method,the key and the ciphertext are stored separately,and the key information is secretly shared using the Latin square and Shamir scheme,and the ciphertext is encoded by RS erasure codes and then stored in a distributed manner.Analysis shows that this method can effectively protect the security of the key ciphertext,save a lot of data update time and computing resources after the key fragment is leaked,and at the same time,the loss of part of the data does not affect the integrity of the original data and avoids a single point of failure and improve the fault tolerance of data storage.
Keywords/Search Tags:Data security dissemination, Latin Square, secret sharing, Reed-Solomon code, The key to update
PDF Full Text Request
Related items