Abstract
Based on existing cloud storage services and remote file synchronization algorithm analysis, a secure cloud storage integration solution is proposed. Its design makes the realization of a cloud-storage-based personal encryption file synchronization and backup system possible. Users can simultaneously manage multiple cloud storage accounts, so that they can synchronize multiple folders and backup at any time. The system can correctly synchronize and backup personal data according to users’ needs. Taking advantage of the MD5 algorithm to make encrypted backup file safer, the new mode can prevent the illegal change and disclosure of personal files after synchronization, thus integrity protection of data is achieved, and it becomes easier to manage cloud storage accounts with different servers. Experiments prove the validity and reliability of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zeng, W., Zhao, Y., Ou, K., et al.: Research on cloud storage architecture and key technologies. In: 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, pp. 1044–1048. ACM, New York (2009)
Mell, P., Grance, T.: The NIST definition of cloud computing. J. Natl. Inst. Stand. Technol. 53, 50–57 (2009)
Li, H., Sun, W.H., Li, F.H., et al.: Secure and privacy-preserving data storage service in public cloud. J. Comput. Res. Dev. 51, 1397–1409 (2014). (in Chinese)
Xue, M., Xue, W., Shu, J.W., et al.: A secure storage system over cloud storage environment. J. Comput. 38, 987–998 (2015). (in Chinese)
Julisch, K., Hall, M.: Security and control in the cloud. Inf. Secur. J.: Glob. Perspect. 19, 299–309 (2010)
Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22, 71–83 (2011). (in Chinese)
Fu, Y.Y., Zhang, M., Chen, K.Q., et al.: Proofs of data possession of multiple copies. J. Comput. Res. Dev. 5l, 1410–1416 (2014). (in Chinese)
Wang, H.Q.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8, 328–340 (2015)
Liu, C., Yang, C., Zhang, X.Y., et al.: External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst. 49, 58–67 (2015)
Wang, H.F., Li, Z.H., Zhang, X., et al.: A self-adaptive audit method of data integrity in the cloud storage. J. Comput. Res. Dev. 54, 172–183 (2017). (in Chinese)
Rivest, R.: The MD5 Message-Digest Algorithm. RFC1321, April 1992
FIPS PUB 180-1. Secure Hash Standard, April 1995
Acknowledgments
This work is supported by the National Nature Science Foundation of Zhejiang Province, China, No. LY16F020014, the National Nature Science Foundation of Heilongjiang Province, China, No. F201204 and the Education Department of Heilongjiang Province, China, No. 12531756.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Song, G., Lu, D., Li, M. (2018). Research on Integrity Protection of Data for Multi-server in the Cloud Storage. In: Sun, G., Liu, S. (eds) Advanced Hybrid Information Processing. ADHIP 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 219. Springer, Cham. https://doi.org/10.1007/978-3-319-73317-3_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-73317-3_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73316-6
Online ISBN: 978-3-319-73317-3
eBook Packages: Computer ScienceComputer Science (R0)