SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Engineering Science Invention 
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 
www.ijesi.org Volume 3 Issue 8 ǁ August 2014 ǁ PP.24-30 
www.ijesi.org 24 | Page 
The Architecture of Cloud Storage Model Based On Confusion Theory Xirui Quan1, Genqing Bian1,2, Bilin Shao2 (1.School of Information and Control Engineering, Xi’an University of Architecture and Technology, China; 2.School of Management,Xi’an University of Architecture and Technology, China) ABSTRACT : Aiming at the problem of data security in cloud storage system,the paper proposes a cloud storage model based on confusion theory. Data confusion algorithm and slicing technology are utilized to slice the data in accordance with characteristics of data attributes in cloud storage system. Confusion strategy is formed by adopting confusion algorithm to confuse the relation of among data slicing. Thus, it is on this premise that data is available to implement effective protection of data via slicing relationship confusion. Experiment shows that the model not only can guarantee data security in cloud storage system, but also reduce system complexity and computing cost. KEYWORDS: Cloud Storage Model, Confusion Algorithm, Slicing Technology, Data Security 
I. INTRODUCTION 
Cloud storage is a new concept extended and developed on the basis of cloud computing. And it is a cloud computing system and a storage center of data which is configured with supreme large storage space and integrated with high performance service processing. On one hand, it could be a flexible extended storage resource of cloud computing resource pool[1]; on the other hand, as the administration center of resource which is provided by cloud service, it is the core of cloud computing service center and intensive administration of tenants’data information[2]. Thus, cloud storage is simplify as cloud computing with store function. And it is also an open network environment oriented supporting multiple types which supports massive information management and considers data security and reliability[3].As the indirect service provider which provide cloud services to cloud computing, cloud storage has massive resources pool, the core problem of cloud storage is management and deployment of these resources. According to the comprehensive analysis of cloud storage technology architecture and core functionality, massive resources storage needs to be allocated on demand in real time, security isolation among the data needs to be taken seriously and the unauthorized user needs to be prevented access to the system.[4]. From architecture to analyze, cloud storage system is the cloud computing architecture’s storage layer, so cloud services data protection can start from the secure storage. To the end, confusion theory is introduced to establish cloud storage model based on data slicing to protect user data security and improve storage efficiency. 
II. CONFUSION THEORY 
Confusion theory was first proposed to protect the trademark rights, then gradually be introduced into the areas, such as the protection of intellectual property rights, software confusion, data confusion algorithm and so on. Confuse algorithm's nature is through the obfuscation transformation to transfer the original program,
The Architecture Of Cloud Storage… 
www.ijesi.org 25 | Page 
protecting the safety of original program under the promise that guaranteeing the output would be unchanged, in 
order to avoid the bad behavior such as decompiled[5][6], the basic principle of obfuscation is shown in Figure 
1 
Figure 1 the principle of obfuscation transformation 
Confusion algorithm is utilized to process the application, the functions between the treated application 
and the untreated application are the same, so the application's structure being processed under the confusion 
dealing has changed a lot, make the attackers cannot have a good understanding with them[7]. In practical, even 
the attacker finally cracked the application under the confusion dealing, he must have paid a high contribution, 
since it can be thought to have a protection to the software.Suppose M is a transformation from original program 
to the target, if it has the same observable behavior, then M can be recognized as an Obfuscation Transformation. 
If all of the following conditions be satisfied, M can be a legal Obfuscation Transformation: if it cannot be stop 
or stop at a wrong state, then stop or not stop will be fine; otherwise, it must be stop and output the same 
results[8]. 
According to the different objects, obfuscation transformation can be divided into four sections: 
morphology transformation, the transformation of control flow, data transformation and class structure 
transformation [9]. The class structure transformation includes class merger, class splitting and type hiding [10]. 
Class merger: two or more classes in program merged into a class, thus destroying the structure of the original 
class, achieve the goal that hidden the system design. Assume that classes c1、c2 should be merged into one 
class ct, firstly merge the functions and filed in the two classes into class ct, and then rename the same variables 
or functions. 
: ( ) ( ) ( ) f 1 2 t  Fieds c  Fieds c  Fieds c (2-1) 
: ( ) ( ) ( ) m 1 2 t  Methods c  Methods c  Methods c (2-2) 
Class splitting: using class c1 to replace c2 
{ , } ,1 , 2 : ( ) 2 t t c c 
split  Members c  (2-3) 
Type hiding: there are n interfaces in class c , i1, i2,…, in used to declare the type replaced the c, assume 
Pr is a application. 
: ( ) ( ) tan ( ) ( , , ) hidding r r 1 2 n  Methods c  publicMeth ods P  ins ceMethods P  i i  i (2-4) 
III. DATA SLICING ALGORITHM 
The aim of slicing data in cloud storage system is decomposing the whole logical structure of data, save 
data as the slicing type, which is prone to confusion processing of data relationship, then the data can be 
storaged and managed securely.The original semantic of data should not be changed and the data should not be 
repeated stored while the data has been sliced. Tenant Data Privacy is a set of attribute constraint of data and 
vertical slicing of data recording, each TDP stands for a data slicing, express TDP with formula (3-1). 
T D P =  D a P r i Id , D a P r i (3-1)
The Architecture Of Cloud Storage… 
www.ijesi.org 26 | Page 
When the data is single data, DaPriId refers to confusion value which is corresponding to user data; when TDP is combination form of user data, DaPri merely stands for a subset of TDP and require any two DaPri of TDP have no intersection. Because of single data is special case of multi-data, the multi-data cases mainly be discussed . Non-compatible slice and compatible slice need be examined while slicing data. Non-compatible slice refers to combination of some data in data slice will result in data leakage, compatible slice refers to combination of data slicing shall not result in data leakage, flow of data slicing algorithm is shown as Figure 2. Pseudo code of data slicing algorithm: Begin: step1:input x;(x is privacy demand) step2: if(x==slicing is corresponding) {If slicing is belong to non-Compatible Slice, return to step 1, again input privacy demand } Step3: Implement slicing combination strategy; if(whether slicing is compatible or not ) {If slicing is non-compatible Slicing, return to step 3, implement slicing combination strategy; } Largest data slicing; if (whether there is privacy data which is not sliced or not ) { There is privacy data which is sliced, return to step 2; } Found LST; End. 
Figure. 2 flow of data slicing algorithm Figure.3 Cloud storage model based on confusion theory
The Architecture Of Cloud Storage… 
www.ijesi.org 27 | Page 
IV. THE ARCHITECTURE OF CLOUD STORAGE MODEL BASED ON CONFUSION 
THEORY 
At present encryption scheme and confusion method to protect user data is a hot research area in data 
outsourcing field, because data protection based on encryption of data require data which has been encrypted to 
be decrypted to go on manipulation, which reduces the data processing efficiency. So this paper proposes a data 
slicing storage using data relationship confusion algorithm. Firstly, according to the secrecy degree of user data 
cut data attribute into logical storage table of data protection, next hid the relationship among all data slicing 
after slicing data with confusion algorithm, at last store sliced data as data slicing in logical block table. Cloud 
storage model is shown as Figure 3. 
4.1 Data slicing confusion algorithm 
In the light of separating character of data slicing, confuse the relationship of data slicing, and save 
confusion strategy at a believable third place to implement data slicing confusion and protect from data leaking. 
Data slicing sigh DaPriId refers to each slicing of data, DaPriId could be expressed as formula (4-1). 
  k ey a P r = 
D S Id 
TTP D i Id E Id  a (4-1) 
Where, E stands for multiplicative homomorphic encryption function in data slicing strategy; key is 
corresponding secret key; IdTTP is used for marking every data recording according data slicing strategy; DSId is 
the serial number of data slicing; a is the generating element of cyclic group in data privacy strategy. 
The set of data slicing is obtained with slicing algorithm, confusion strategy mainly is used to confused 
relationship among data slicing and coordinate with believable third party, pseudo code of relationship of data 
slicing confusion algorithm are following: 
Begin: 
Input x(x is the set of data privacy slicing) 
A: Preset confusion strategy; 
According to preset confusion strategy cut x into y (y is data slicing) 
Build DaPriId; 
Build logical view; 
if (whether there is relevant mapping or not) 
{ If thre is not relevant mapping, return A, again get y in x;} 
End. 
4.2 Reconstructing after data slicing confusion 
Store the user data by slicing technology. All the data can be reconstructed combining with the data 
global identifier IdTTP, confusion strategy and record of each data slicing DaPriId when users need to use the 
data. Steps are as follows: 
Step1: Input IdTTP of each marked data record; 
Step2: Get the data confusion strategy according to the trusted third party and confusion refactoring 
module; 
Step3: Get the slicing data in sequence combining with confusion strategy and each data slicing DaPriId; 
Step4: Return all of the data.
The Architecture Of Cloud Storage… 
www.ijesi.org 28 | Page 
The operability and availability of data mainly be considered about data reconstructing. The data can be reproduced by refactoring algorithm combining with data slicing when the user needs to use the stored data. The pseudocode of refactoring algorithm after confusing data slicing are as follows: 
Step1: Input x (x is the IdTTP of data record); Step2: Get y (y is the confusion strategy stored in the third party); Step3: Restore slicing data according to y and DaPriId; Step4: Output z (z is reconstructed data); 
In conclusion, the paper, according to the characteristics of user data in cloud storage system to slice the data. And generate the confusion strategy by using confusion algorithm to confuse the relation of the slicing data. Then store it in the trusted third party . Thus build the cloud storage model based on the confusion theory and improve the data processing efficiency and security. 
V. THE EXPERIMENT AND ANALYSIS 
In the virtual environment, the paper realizes to data slicing algorithm of structuring model and refactoring algorithm after the confusion. The running time of the data slicing algorithm is as shown in Figure 4. Figure 4.The running time of slicing algorithm 
As shown in Table 1, different types of data privacy compatibility were selected for the experiment and the data with different attributes on the basis are selected. The running costs of slicing algorithm is as shown in Figure 5. Table 1 Data privacy compatibility 
Data type 
Data privacy compatibility 
Data privacy non-compatibility 
Type 1 
20% 
80% 
Type 2 
50% 
50% 
Type 3 
80% 
20% 
The experimental result of data slicing shows: the running costs of slicing algorithm before the data confusion is related to the data compatibility and the quantity of data attributes. The data compatibility is
The Architecture Of Cloud Storage… 
www.ijesi.org 29 | Page 
inversely proportional to non-compatibility. Multiple slice combination are allocated in the slicing algorithm 
computations allocation while the non-compatibility degree is higher ( compatibility degree is lower). So it‘s 
running cost is larger than the data non-compatibility experiment. 
The number of data attribute 
Running costs (ms) 
Type1 
Type2 
Type3 
The number of data slice 
Running costs (s) 
Running 
costs 
Figure 5 Running costs of slicing algoritm Figure 6 Running costs of reconstruction algorithm 
After the data sliced has been storaged, the data can be reproduced by trusted third party confusion 
strategy and data slicing mark. The running costs of reconstruction algorithm is as shown in Figure 6.The 
experimental results of the reconstruction algorithm show: obtaining the slicing relationship confusion strategy 
from the trusted third party to reconstruct the data privacy according to the slice mark. The more slices, the 
largger running costs. 
VI. CONCLUSION 
According to the data security problems of multi-tenant application in the cloud storage system, the 
paper structures the cloud storage model based on the theory of confusion. Data confusion algorithm and data 
slicing technology are utilized to protect user data by the confusion of the data privacy slice relationship. 
Experiments shows that the model has more advantages in ensuring safety, reliability and usability of user data 
in the cloud storage system. 
VII. ACKNOWLEDGMENT 
This research project is supported by the National Natural Science Foundation of China under Grant 
No. 61272458. 
REFERENCES 
[1] Wang H. Proxy provable data possession in public clouds[J]. Services Computing, IEEE Transactions on, 2013, 6(4): 551-559. 
[2] Parakh A, Kak S. Space efficient secret sharing for implicit data security [J] . Information Sciences, 2011, 181(2):335-341. 
[3] Fugkeaw S. Achieving privacy and security in multi-owner data outsourcing[C]//Digital Information Management (ICDIM), 2012 
Seventh International Conference on. IEEE, 2012: 239-244. 
[4] Deng Q. The research of cloud computing security mechanism based on Hadoop [D].Nanjing University of Posts and 
Telecommunications ,2013. 
[5] Shi Y. & etc. The research of confusion algorithm[J]. The Journal of Tongji University (Natural Science),2005,06:813-819. 
[6] Jiang H.& etc. Code confusion technology research based on control flow[J]. Application Research of Computers, 
2013,03:897-899+905. 
[7] Parameswaran R, Blough D M. Privacy preserving data obfuscation for inherently clustered data[J]. International Journal of 
Information and Computer Security, 2008, 2(1): 4-26. 
[8] Zhao Y. J.& etc. Evaluation of Code Obfuscating Transformation[J]. Journal of Software,2012,03(3):700-711.
The Architecture Of Cloud Storage… 
www.ijesi.org 30 | Page 
[9] Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures[C]//Dependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on. IEEE, 2009: 711-716. 
[10] Wu S. Research of software protection based on binary code obfuscation[D].University of Electronic Science and Technology of China,2013.

Contenu connexe

Tendances

Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paperHemanth
 
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETTWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETIJDKP
 
M021201092098
M021201092098M021201092098
M021201092098theijes
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Pvrtechnologies Nellore
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 Parthipan Parthi
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
Bj32809815
Bj32809815Bj32809815
Bj32809815IJMER
 
A density based micro aggregation technique for privacy-preserving data mining
A density based micro aggregation technique for privacy-preserving data miningA density based micro aggregation technique for privacy-preserving data mining
A density based micro aggregation technique for privacy-preserving data miningeSAT Publishing House
 
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...IJNSA Journal
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYJournal For Research
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...IJDKP
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478IJRAT
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 

Tendances (19)

Cloud computing term paper
Cloud computing term paperCloud computing term paper
Cloud computing term paper
 
I43055257
I43055257I43055257
I43055257
 
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SETTWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
TWO PARTY HIERARICHAL CLUSTERING OVER HORIZONTALLY PARTITIONED DATA SET
 
M021201092098
M021201092098M021201092098
M021201092098
 
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
Closeness through-microaggregation-strict-privacy-with-enhanced-utility-prese...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
Bj32809815
Bj32809815Bj32809815
Bj32809815
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
A density based micro aggregation technique for privacy-preserving data mining
A density based micro aggregation technique for privacy-preserving data miningA density based micro aggregation technique for privacy-preserving data mining
A density based micro aggregation technique for privacy-preserving data mining
 
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
Paper id 26201478
Paper id 26201478Paper id 26201478
Paper id 26201478
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 

Similaire à The Architecture of Cloud Storage Model Based On Confusion Theory

Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAijcisjournal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...IEEEGLOBALSOFTTECHNOLOGIES
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 

Similaire à The Architecture of Cloud Storage Model Based On Confusion Theory (20)

Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
F0423038041
F0423038041F0423038041
F0423038041
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
C017421624
C017421624C017421624
C017421624
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 

Dernier

Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Dernier (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 

The Architecture of Cloud Storage Model Based On Confusion Theory

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 3 Issue 8 ǁ August 2014 ǁ PP.24-30 www.ijesi.org 24 | Page The Architecture of Cloud Storage Model Based On Confusion Theory Xirui Quan1, Genqing Bian1,2, Bilin Shao2 (1.School of Information and Control Engineering, Xi’an University of Architecture and Technology, China; 2.School of Management,Xi’an University of Architecture and Technology, China) ABSTRACT : Aiming at the problem of data security in cloud storage system,the paper proposes a cloud storage model based on confusion theory. Data confusion algorithm and slicing technology are utilized to slice the data in accordance with characteristics of data attributes in cloud storage system. Confusion strategy is formed by adopting confusion algorithm to confuse the relation of among data slicing. Thus, it is on this premise that data is available to implement effective protection of data via slicing relationship confusion. Experiment shows that the model not only can guarantee data security in cloud storage system, but also reduce system complexity and computing cost. KEYWORDS: Cloud Storage Model, Confusion Algorithm, Slicing Technology, Data Security I. INTRODUCTION Cloud storage is a new concept extended and developed on the basis of cloud computing. And it is a cloud computing system and a storage center of data which is configured with supreme large storage space and integrated with high performance service processing. On one hand, it could be a flexible extended storage resource of cloud computing resource pool[1]; on the other hand, as the administration center of resource which is provided by cloud service, it is the core of cloud computing service center and intensive administration of tenants’data information[2]. Thus, cloud storage is simplify as cloud computing with store function. And it is also an open network environment oriented supporting multiple types which supports massive information management and considers data security and reliability[3].As the indirect service provider which provide cloud services to cloud computing, cloud storage has massive resources pool, the core problem of cloud storage is management and deployment of these resources. According to the comprehensive analysis of cloud storage technology architecture and core functionality, massive resources storage needs to be allocated on demand in real time, security isolation among the data needs to be taken seriously and the unauthorized user needs to be prevented access to the system.[4]. From architecture to analyze, cloud storage system is the cloud computing architecture’s storage layer, so cloud services data protection can start from the secure storage. To the end, confusion theory is introduced to establish cloud storage model based on data slicing to protect user data security and improve storage efficiency. II. CONFUSION THEORY Confusion theory was first proposed to protect the trademark rights, then gradually be introduced into the areas, such as the protection of intellectual property rights, software confusion, data confusion algorithm and so on. Confuse algorithm's nature is through the obfuscation transformation to transfer the original program,
  • 2. The Architecture Of Cloud Storage… www.ijesi.org 25 | Page protecting the safety of original program under the promise that guaranteeing the output would be unchanged, in order to avoid the bad behavior such as decompiled[5][6], the basic principle of obfuscation is shown in Figure 1 Figure 1 the principle of obfuscation transformation Confusion algorithm is utilized to process the application, the functions between the treated application and the untreated application are the same, so the application's structure being processed under the confusion dealing has changed a lot, make the attackers cannot have a good understanding with them[7]. In practical, even the attacker finally cracked the application under the confusion dealing, he must have paid a high contribution, since it can be thought to have a protection to the software.Suppose M is a transformation from original program to the target, if it has the same observable behavior, then M can be recognized as an Obfuscation Transformation. If all of the following conditions be satisfied, M can be a legal Obfuscation Transformation: if it cannot be stop or stop at a wrong state, then stop or not stop will be fine; otherwise, it must be stop and output the same results[8]. According to the different objects, obfuscation transformation can be divided into four sections: morphology transformation, the transformation of control flow, data transformation and class structure transformation [9]. The class structure transformation includes class merger, class splitting and type hiding [10]. Class merger: two or more classes in program merged into a class, thus destroying the structure of the original class, achieve the goal that hidden the system design. Assume that classes c1、c2 should be merged into one class ct, firstly merge the functions and filed in the two classes into class ct, and then rename the same variables or functions. : ( ) ( ) ( ) f 1 2 t  Fieds c  Fieds c  Fieds c (2-1) : ( ) ( ) ( ) m 1 2 t  Methods c  Methods c  Methods c (2-2) Class splitting: using class c1 to replace c2 { , } ,1 , 2 : ( ) 2 t t c c split  Members c  (2-3) Type hiding: there are n interfaces in class c , i1, i2,…, in used to declare the type replaced the c, assume Pr is a application. : ( ) ( ) tan ( ) ( , , ) hidding r r 1 2 n  Methods c  publicMeth ods P  ins ceMethods P  i i  i (2-4) III. DATA SLICING ALGORITHM The aim of slicing data in cloud storage system is decomposing the whole logical structure of data, save data as the slicing type, which is prone to confusion processing of data relationship, then the data can be storaged and managed securely.The original semantic of data should not be changed and the data should not be repeated stored while the data has been sliced. Tenant Data Privacy is a set of attribute constraint of data and vertical slicing of data recording, each TDP stands for a data slicing, express TDP with formula (3-1). T D P =  D a P r i Id , D a P r i (3-1)
  • 3. The Architecture Of Cloud Storage… www.ijesi.org 26 | Page When the data is single data, DaPriId refers to confusion value which is corresponding to user data; when TDP is combination form of user data, DaPri merely stands for a subset of TDP and require any two DaPri of TDP have no intersection. Because of single data is special case of multi-data, the multi-data cases mainly be discussed . Non-compatible slice and compatible slice need be examined while slicing data. Non-compatible slice refers to combination of some data in data slice will result in data leakage, compatible slice refers to combination of data slicing shall not result in data leakage, flow of data slicing algorithm is shown as Figure 2. Pseudo code of data slicing algorithm: Begin: step1:input x;(x is privacy demand) step2: if(x==slicing is corresponding) {If slicing is belong to non-Compatible Slice, return to step 1, again input privacy demand } Step3: Implement slicing combination strategy; if(whether slicing is compatible or not ) {If slicing is non-compatible Slicing, return to step 3, implement slicing combination strategy; } Largest data slicing; if (whether there is privacy data which is not sliced or not ) { There is privacy data which is sliced, return to step 2; } Found LST; End. Figure. 2 flow of data slicing algorithm Figure.3 Cloud storage model based on confusion theory
  • 4. The Architecture Of Cloud Storage… www.ijesi.org 27 | Page IV. THE ARCHITECTURE OF CLOUD STORAGE MODEL BASED ON CONFUSION THEORY At present encryption scheme and confusion method to protect user data is a hot research area in data outsourcing field, because data protection based on encryption of data require data which has been encrypted to be decrypted to go on manipulation, which reduces the data processing efficiency. So this paper proposes a data slicing storage using data relationship confusion algorithm. Firstly, according to the secrecy degree of user data cut data attribute into logical storage table of data protection, next hid the relationship among all data slicing after slicing data with confusion algorithm, at last store sliced data as data slicing in logical block table. Cloud storage model is shown as Figure 3. 4.1 Data slicing confusion algorithm In the light of separating character of data slicing, confuse the relationship of data slicing, and save confusion strategy at a believable third place to implement data slicing confusion and protect from data leaking. Data slicing sigh DaPriId refers to each slicing of data, DaPriId could be expressed as formula (4-1).   k ey a P r = D S Id TTP D i Id E Id  a (4-1) Where, E stands for multiplicative homomorphic encryption function in data slicing strategy; key is corresponding secret key; IdTTP is used for marking every data recording according data slicing strategy; DSId is the serial number of data slicing; a is the generating element of cyclic group in data privacy strategy. The set of data slicing is obtained with slicing algorithm, confusion strategy mainly is used to confused relationship among data slicing and coordinate with believable third party, pseudo code of relationship of data slicing confusion algorithm are following: Begin: Input x(x is the set of data privacy slicing) A: Preset confusion strategy; According to preset confusion strategy cut x into y (y is data slicing) Build DaPriId; Build logical view; if (whether there is relevant mapping or not) { If thre is not relevant mapping, return A, again get y in x;} End. 4.2 Reconstructing after data slicing confusion Store the user data by slicing technology. All the data can be reconstructed combining with the data global identifier IdTTP, confusion strategy and record of each data slicing DaPriId when users need to use the data. Steps are as follows: Step1: Input IdTTP of each marked data record; Step2: Get the data confusion strategy according to the trusted third party and confusion refactoring module; Step3: Get the slicing data in sequence combining with confusion strategy and each data slicing DaPriId; Step4: Return all of the data.
  • 5. The Architecture Of Cloud Storage… www.ijesi.org 28 | Page The operability and availability of data mainly be considered about data reconstructing. The data can be reproduced by refactoring algorithm combining with data slicing when the user needs to use the stored data. The pseudocode of refactoring algorithm after confusing data slicing are as follows: Step1: Input x (x is the IdTTP of data record); Step2: Get y (y is the confusion strategy stored in the third party); Step3: Restore slicing data according to y and DaPriId; Step4: Output z (z is reconstructed data); In conclusion, the paper, according to the characteristics of user data in cloud storage system to slice the data. And generate the confusion strategy by using confusion algorithm to confuse the relation of the slicing data. Then store it in the trusted third party . Thus build the cloud storage model based on the confusion theory and improve the data processing efficiency and security. V. THE EXPERIMENT AND ANALYSIS In the virtual environment, the paper realizes to data slicing algorithm of structuring model and refactoring algorithm after the confusion. The running time of the data slicing algorithm is as shown in Figure 4. Figure 4.The running time of slicing algorithm As shown in Table 1, different types of data privacy compatibility were selected for the experiment and the data with different attributes on the basis are selected. The running costs of slicing algorithm is as shown in Figure 5. Table 1 Data privacy compatibility Data type Data privacy compatibility Data privacy non-compatibility Type 1 20% 80% Type 2 50% 50% Type 3 80% 20% The experimental result of data slicing shows: the running costs of slicing algorithm before the data confusion is related to the data compatibility and the quantity of data attributes. The data compatibility is
  • 6. The Architecture Of Cloud Storage… www.ijesi.org 29 | Page inversely proportional to non-compatibility. Multiple slice combination are allocated in the slicing algorithm computations allocation while the non-compatibility degree is higher ( compatibility degree is lower). So it‘s running cost is larger than the data non-compatibility experiment. The number of data attribute Running costs (ms) Type1 Type2 Type3 The number of data slice Running costs (s) Running costs Figure 5 Running costs of slicing algoritm Figure 6 Running costs of reconstruction algorithm After the data sliced has been storaged, the data can be reproduced by trusted third party confusion strategy and data slicing mark. The running costs of reconstruction algorithm is as shown in Figure 6.The experimental results of the reconstruction algorithm show: obtaining the slicing relationship confusion strategy from the trusted third party to reconstruct the data privacy according to the slice mark. The more slices, the largger running costs. VI. CONCLUSION According to the data security problems of multi-tenant application in the cloud storage system, the paper structures the cloud storage model based on the theory of confusion. Data confusion algorithm and data slicing technology are utilized to protect user data by the confusion of the data privacy slice relationship. Experiments shows that the model has more advantages in ensuring safety, reliability and usability of user data in the cloud storage system. VII. ACKNOWLEDGMENT This research project is supported by the National Natural Science Foundation of China under Grant No. 61272458. REFERENCES [1] Wang H. Proxy provable data possession in public clouds[J]. Services Computing, IEEE Transactions on, 2013, 6(4): 551-559. [2] Parakh A, Kak S. Space efficient secret sharing for implicit data security [J] . Information Sciences, 2011, 181(2):335-341. [3] Fugkeaw S. Achieving privacy and security in multi-owner data outsourcing[C]//Digital Information Management (ICDIM), 2012 Seventh International Conference on. IEEE, 2012: 239-244. [4] Deng Q. The research of cloud computing security mechanism based on Hadoop [D].Nanjing University of Posts and Telecommunications ,2013. [5] Shi Y. & etc. The research of confusion algorithm[J]. The Journal of Tongji University (Natural Science),2005,06:813-819. [6] Jiang H.& etc. Code confusion technology research based on control flow[J]. Application Research of Computers, 2013,03:897-899+905. [7] Parameswaran R, Blough D M. Privacy preserving data obfuscation for inherently clustered data[J]. International Journal of Information and Computer Security, 2008, 2(1): 4-26. [8] Zhao Y. J.& etc. Evaluation of Code Obfuscating Transformation[J]. Journal of Software,2012,03(3):700-711.
  • 7. The Architecture Of Cloud Storage… www.ijesi.org 30 | Page [9] Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures[C]//Dependable, Autonomic and Secure Computing, 2009. DASC'09. Eighth IEEE International Conference on. IEEE, 2009: 711-716. [10] Wu S. Research of software protection based on binary code obfuscation[D].University of Electronic Science and Technology of China,2013.