期刊文献+

云计算数据安全支撑平台架构研究 被引量:11

The Research of Cloud Computing Data Security Support Platform Architecture
下载PDF
导出
摘要 由于云服务提供商拥有对数据的优先访问权,用户数据的机密性和完整性很难得到保证.针对此问题构建了一种使用加密机制保护云数据安全的体系结构.使用密文检索和完整性验证来保证云用户数据的可用性和完整性,为云计算系统中海量数据提供用户可信赖的安全支撑. 由于云服务提供商拥有对数据的优先访问权,用户数据的机密性和完整性很难得到保证.针对此问题构建了一种使用加密机制保护云数据安全的体系结构.使用密文检索和完整性验证来保证云用户数据的可用性和完整性,为云计算系统中海量数据提供用户可信赖的安全支撑.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第S3期261-267,共7页 Journal of Computer Research and Development
基金 "核高基"国家科技重大专项基金项目(2010ZX01042-001-001-05) 中国科学院知识创新工程领域前沿项目(YYYJ-1013)
关键词 云数据安全 密文检索 完整性验证 cloud data security searchable encryption integrity verification
  • 相关文献

参考文献9

  • 1陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1311
  • 2BONEH D,CRESCENZO G,OSTROVSKY R,et al.Public Key Encryption With Keyword Search. Advances in Cryptology.Pro-ceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’’04) . 2004 被引量:1
  • 3GARTNER.Assessing the Security Risks of Cloud Computing. http://www.gartner.com/DisplayDocument?id=685308 . 2011 被引量:1
  • 4D. Song,D.Wagner,A. Perrig."Practical techniques for searches on encrypted data". Proceedings of IEEE Symposium on Security and Privacy . 2000 被引量:1
  • 5Hacigumus H,Iyer B,Mehrotra S,Li C."Executing SQL over encrypted data in the database service provider model". Proc. of the ACM SIGMOD Conf . 2002 被引量:1
  • 6Ateniese G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores. Proc of CCS’’’’’’’’07 . 2007 被引量:1
  • 7Juels A,Kaliski B.PORs:Proofs of retrievability for large files. Proc of the14th ACM Conf on Computer and Communications Security(CCS’07) . 2007 被引量:1
  • 8Goh E J.Secure indexes 2003/216,IACR ePrint Cryptography Archive. . 2003 被引量:1
  • 9Agrawal R,Kiernan J,Srikant R,et al.Order preserving encryption for numeric data. Proc of the 2004ACM SIGMOD Int Conf on Management of Data(SIGMOD04) . 2004 被引量:1

二级参考文献29

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss 被引量:1
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf 被引量:1
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403. 被引量:1
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11. 被引量:1
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28. 被引量:1
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117. 被引量:1
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43. 被引量:1
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150. 被引量:1
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350. 被引量:1
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218. 被引量:1

共引文献1310

同被引文献63

  • 1张桂刚,李超,张勇,邢春晓.一种基于海量信息处理的云存储模型研究[J].计算机研究与发展,2012,49(S1):32-36. 被引量:23
  • 2吴慈健.基于网络文件保险柜的终端数据安全保护系统解决方案[J].电力信息化,2006,4(12):89-90. 被引量:1
  • 3GA/T708-2007,信息系统安全等级保护体系框架[S].2007. 被引量:2
  • 4熊平,朱天清.信息安全原理及应用[M].北京:清华大学出版社,2012. 被引量:2
  • 5赛门铁克.赛门铁克DLPl0.5技术白皮书[Z]. 被引量:1
  • 6Li H, Dai Y, Tian L,et al. Identity-based authentication forcloud computing[C]//In CloudCom,09: Proceedings of the1st International Conference on Cloud Computing,Beijing,china, 2008,9: 157-166. 被引量:1
  • 7Yan Liang, Rong Chun ming, Zhao Gan sen. Strengthencloud computing security with Federal identity managementusing hierarchical identity - based cryptography [ C] //Cloud-Com,09: proceedings of the 1st international conference oncloud computing, Beijing, China, 2009 : 167-177. 被引量:1
  • 8洪澄,张敏,冯登国.AB-ACCS:—种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Suppl) :259-265. 被引量:1
  • 9Atallah M J, Blanton M, Fazio N,et al. Dynamic and effi-cient key management for access hierarchies[J]. ACM TransInf Syst Secur 2009 , 12(3) : 1-43. 被引量:1
  • 10Damiani E,di Vimercati S D C,Foresti S, et al. Key man-agement for multi-user encrypted databases[C]//In Proceed-ings of the ACM Workshop on Storage Security and Surviva-bility, 2005 : 74-83. 被引量:1

引证文献11

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部