Journal on Communications ›› 2021, Vol. 42 ›› Issue (6): 145-157.doi: 10.11959/j.issn.1000-436x.2021091

• Papers • Previous Articles     Next Articles

Distributed storage causal consistency model with trusted constraint

Junfeng TIAN1,2, Juntao ZHANG1,2, Yanbiao WANG1,2   

  1. 1 School of Cyber Security and Computer, Hebei University, Baoding 071002, China
    2 Key Laboratory on High Trusted Information System in Hebei Province, Baoding 071002, China
  • Revised:2021-03-24 Online:2021-06-25 Published:2021-06-01
  • Supported by:
    The National Natural Science Foundation of China(61802106);The Natural Science Foundation of Hebei Province(F2016201244)

Abstract:

At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.

Key words: distributed storage, causal consistency, trusted constraint, hybrid logical clock, HashGraph

CLC Number: 

No Suggested Reading articles found!