International Journal of Big Data Intelligent Technology, 2025, 6(2); doi: 10.38007/IJBDIT.2025.060209.
Linghong Cheng
Security Org, Microsoft, Redmond, 98052, WA, US
The popularity of cloud computing has made cloud storage mainstream, but its centralized nature has led to security issues such as loss of data control, integrity breaches, and privacy breaches. Traditional full verification is not suitable for resource constrained users due to its high cost. Although third-party auditing (TPA) alleviates trust issues, it still has high costs, privacy breaches, and collusion risks. The lack of data damage location and recovery mechanisms, insufficient support for dynamic updates, high cost of dynamic revocation for enterprise users, and poor real-time performance in multi cloud migration scenarios further limit the reliability of cloud storage.In response to challenges, this article proposes a hierarchical security architecture: firstly, a dynamic verification framework based on hierarchical authentication is designed, combined with error correction code technology to achieve damaged data localization and recovery, and reduce redundant authentication overhead through hierarchical verification; Secondly, a real-time revocation scheme based on proxy re signature and Trusted Execution Environment (TEE) is proposed, which supports dynamic updates of administrator attributes and remote signature replacement to avoid privacy leakage.Experiments have shown that hierarchical authentication significantly reduces authentication time overhead and optimizes data migration performance; Proxy re signing combined with TEE enables real-time revocation of user permissions, with controllable computational and communication costs. This article constructs a full chain protection system covering "verification positioning recovery revocation", systematically solving the contradiction between efficiency, functionality, and security of cloud storage data integrity verification. Future research will focus on discontinuous storage optimization, lightweight re signature mechanism and multidimensional security fusion (such as zero trust architecture and AI anomaly detection) to promote the transformation of the scheme to edge computing and enterprise level complex scenarios.
Cloud storage security, layered security architecture, data integrity verification, user dynamic revocation, proxy re signature technology
Linghong Cheng. Identity Authentication and Data Protection System and Deployment Optimization Framework Driven by Layered Security Architecture in Cloud Service System. International Journal of Big Data Intelligent Technology (2025), Vol. 6, Issue 2: 84-93. https://doi.org/10.38007/IJBDIT.2025.060209.
[1] Zhu, Z. (2025). Application of Database Performance Optimization Technology in Large-Scale AI Infrastructure. European Journal of Engineering and Technologies, 1(1), 60-67.
[2] Yang D, Liu X. Collaborative Algorithm for User Trust and Data Security Based on Blockchain and Machine Learning[J]. Procedia Computer Science, 2025, 262: 757-765.
[3] Wu X, Bao W. Research on the Design of a Blockchain Logistics Information Platform Based on Reputation Proof Consensus Algorithm[J]. Procedia Computer Science, 2025, 262: 973-981.
[4] An, C. (2025). Exploration of Data-Driven Capital Market Investment Decision Support Model. European Journal of Business, Economics & Management, 1(3), 31-37.
[5] Zhang Y. Research on Optimization and Security Management of Database Access Technology in the Era of Big Data[J]. Academic Journal of Computing & Information Science, 2025, 8(1): 8-12
[6] Lai L. Data-Driven Credit Risk Assessment and Optimization Strategy Exploration[J]. European Journal of Business, Economics & Management, 2025, 1(3): 24-30.
[7] Tang X, Wu X, Bao W. Intelligent Prediction-Inventory-Scheduling Closed-Loop Nearshore Supply Chain Decision System[J]. Advances in Management and Intelligent Technologies, 2025, 1(4).
[8] Zhang, Jingtian. "Research on Worker Allocation Optimization Based on Real-Time Data in Cloud Computing." Frontiers in Science and Engineering 5.2 (2025): 119-125.
[9] Xu, Yue. "Research on Maiustream Web Database Development Technclogy." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 29-32.
[10] Information V F A , Saravana K E , Information V F A ,et al.Development of Trustworthiness for Cloud Service Providers Using DBN-Based Trust Model in Cloud Computing Environment[J]. 2024.
[11] Chen A. Research on Intelligent Code Search Technology Based on Deep Learning[J]. Pinnacle Academic Press Proceedings Series, 2025, 2: 137-143.
[12] Yaojia J , Bohao L , Jiankang X ,et al.Graph-CRISPR: a gene editing efficiency prediction model based on graph neural network with integrated sequence and secondary structure feature extraction[J].Briefings in Bioinformatics, 2025(4):4.DOI:10.1093/bib/bbaf410.
[13] Wang Z , Zhou Y .Analysis and Evaluation of Intel Software Guard Extension- Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios[J].Future Internet, 2025, 17(1):32.DOI:10.3390/fi17010032.
[14] Pan, H. (2025). Development and Optimization of Social Network Systems on Machine Learning. European Journal of AI, Computing & Informatics, 1(2), 73-79.
[15] Zhang Y , Liang W , Xu W ,et al.Cost Minimization of Digital Twin Placements in Mobile Edge Computing[J].ACM Transactions on Sensor Networks, 2024, 20(3).DOI:10.1145/3658449.