Because of the openness of the cloud storage architecture and the sharing of resources, data owners have lost control of the stored data, leading to frequent leakage of user privacy data, and security issues have been a significant element restricting the development of cloud storage. In this paper, three key algorithms for key distribution, hybrid encryption and dynamic key update are proposed for the key issues of data sharing security in cloud storage environment. Based on the above algorithms, a data security sharing model in cloud storage environment is proposed to solve cloud storage Trust dependence, user collusion attacks, and data dynamic security issues in the environment to protect private data during storage and sharing security. The analysis of the experimental results shows that the data security sharing technology can resist selective plaintext and collusion attacks. Therefore, the system of cloud storage encrypts shared data by using data security sharing technology, which can effectively protect the data confidentiality under context of the cloud storage.
As the information technology develops rapidly, the large-scale personal data such as sensors or IoT (Internet of Things) equipment is kept in the cloud or data centers. Sometimes, the data owner in cloud center needs to publish the data. Therefore, in the face of the risk of personal information leakage, how to take full advantage of data has become a hot research topic. When data is published many times, personal privacy is also disclosed. Thus, this paper puts forward a new clustering algorithm based on singular value decomposition to finish the clustering process. The ideas of distance and information entropy are considered to flexibly adjust data availability and privacy protection in this way. Secondly, this paper also puts forward a dynamic update mechanism to ensure that personal data will not be leaked after multiple releases and minimize information loss. Finally, the effectiveness and superiority of this method are verified by experiments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.