Mimic storage scheme based on regenerated code

Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism base...

Full description

Saved in:
Bibliographic Details
Main Authors: Yue CHEN, Longjiang WANG, Xincheng YAN, Xinyue ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018066/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539411076972544
author Yue CHEN
Longjiang WANG
Xincheng YAN
Xinyue ZHANG
author_facet Yue CHEN
Longjiang WANG
Xincheng YAN
Xinyue ZHANG
author_sort Yue CHEN
collection DOAJ
description Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.
format Article
id doaj-art-28e97922c18543148ace7d647e7f3111
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-28e97922c18543148ace7d647e7f31112025-01-14T07:14:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-04-0139213459717423Mimic storage scheme based on regenerated codeYue CHENLongjiang WANGXincheng YANXinyue ZHANGAiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018066/mimicnetwork codingregenerated codecloud storage
spellingShingle Yue CHEN
Longjiang WANG
Xincheng YAN
Xinyue ZHANG
Mimic storage scheme based on regenerated code
Tongxin xuebao
mimic
network coding
regenerated code
cloud storage
title Mimic storage scheme based on regenerated code
title_full Mimic storage scheme based on regenerated code
title_fullStr Mimic storage scheme based on regenerated code
title_full_unstemmed Mimic storage scheme based on regenerated code
title_short Mimic storage scheme based on regenerated code
title_sort mimic storage scheme based on regenerated code
topic mimic
network coding
regenerated code
cloud storage
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018066/
work_keys_str_mv AT yuechen mimicstorageschemebasedonregeneratedcode
AT longjiangwang mimicstorageschemebasedonregeneratedcode
AT xinchengyan mimicstorageschemebasedonregeneratedcode
AT xinyuezhang mimicstorageschemebasedonregeneratedcode