Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

HDFS-based safe storage system

A security and cloud storage technology, applied in the field of cloud storage, can solve problems such as the inability to guarantee user data security

Inactive Publication Date: 2017-03-29
BEIJING UNIV OF TECH
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem that the existing HDFS cannot guarantee the security of user data, the present invention discloses an improved AES algorithm, a cloud storage encryption method, and a cloud storage data integrity authentication method. The invention also discloses a cloud storage system corresponding to the combination encryption method and integrity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • HDFS-based safe storage system
  • HDFS-based safe storage system
  • HDFS-based safe storage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] 3. The present invention discloses a kind of improved AES algorithm, and its specific content is as follows: AES encryption process relates to 4 kinds of operations: byte substitution, line shift, column confusion and round key add, byte substitution It is to complete the mapping from one byte to another byte through the S box, and represent the S box with a matrix composed of 16x16 bytes

[0033]

[0034]

[0035] This step can be realized by looking up a table, avoiding complicated multiplication operations.

[0036] 4. In addition, the two steps of row shifting and column confusion are opt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An HDFS-based safe storage system belongs to the technical field of cloud storage. Continuous development of network construction leads to explosive growth of data; currently network attack means emerge one after another; based on the above situation, how to store the data efficiently and safely is a problem that needs immediate solution. According to the HDFS-based safe storage system, an SHA256 algorithm is used for replacing CRC32 for data verification, and success rates of collision attacks can be greatly lowered; HDFS takes no measures regarding data safety; as for the issue of network data safety, the invention puts forward a method based on an AES algorithm and an RSA algorithm to ensure data confidentiality, the AES algorithm is used for enciphering the data, the RSA algorithm is used for enciphering secret keys of the AES algorithm, and therefore data safety is improved while enciphering operation does not take too much time. Experiment results show that safe transmission and storage of the data can be realized effectively via the method.

Description

technical field [0001] The invention belongs to the technical field of cloud storage, and relates to a safe storage system based on HDFS. Background technique [0002] At the second World Internet Conference in December 2015, it was mentioned that during the "Thirteenth Five-Year Plan" period, China will vigorously implement the strategy of network power, the national big data strategy, and the "Internet +" action plan. It can be seen that the Internet and the big The importance of data. Today, the Internet has been deeply involved in people's daily life, especially in the past year. When it comes to the Internet, it is not only about browsing Moments and online shopping, but also includes the data economy that has ushered in great development due to the mobile Internet. People's network behavior will generate massive data, and the analysis of these data will generate huge value, so the storage of massive data is very necessary. Cloud storage provides very convenient cond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L63/0435H04L9/0625H04L9/0631H04L9/0643H04L63/06H04L63/123H04L67/10H04L69/162
Inventor 谢航肖创柏
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products