Towards a DHT Networks and Safe File Sharing Scheme in Cloud Storage Service
نویسندگان
چکیده
Safe file sharing mechanism in cloud storage is one of the most significant elements that affects the development of security technology. With application of homomorphic key agreement mechanism, Shamir secret sharing algorithm, Bloom Filter and B-tree search algorithm and Rsync data updating algorithm, a safe file sharing scheme in cloud storage is established based on cloud storage infrastructure of DHT networks. Under the circumstance of cloud storage, the scheme can make full use of the sharing mechanism and achieve the confidentiality and integrity of the file. Based on DHT networks, the analysis and test of data sharing are conducted in the paper. Together with file upload and download, the test of data encryption and decryption is done on the basis of Dropbox. As the result shows, the scheme puts forward a safe and effective solution to safe file sharing in cloud storage.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملSelf Chord-Achieving Load Balancing In Peer To Peer Network
The Cloud computing technology has been widely applied in e-business, e-education. Cloud computing platform is a set of Scalable large-scale data server clusters, it provides computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Our research shows that the architecture of c...
متن کاملA scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory
Serving large number of users without compromising service availability and performance is key to the success of the Cloud. A fundamental challenge in building such services is incorporating scalability and fail safe techniques for discovering and provisioning of resources. As Peer to Peer (P2P) architectures are invincible to these setbacks, the work proposes a P2P based resource discovery and...
متن کاملReview on Privacy - Preserving Authentication application in Cloud Computing Sharing
The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. In this paper, we investigate the problem of data security in cloud data storage, which is essentially a distributed storage system. To achieve the assurances of cloud data integrity and availability and enforce the quali...
متن کاملSecure Storage and Retrieval of Data without Original Files in Cloud Architectures Subtitle as needed
When a client uses the service which is offered by cloud storage providers, he might worry about how to retrieve their original files securely. Relieving client’s storage burden and successfully retrieving data on demand are the ultimate purposes of cloud storage service. To achieve the above two aims, in this paper we propose a specific way to store and retrieve the out stored data in cloud st...
متن کامل