期刊文献+

基于全同态加密的云计算数据安全方案 被引量:13

A cloud computing security solution based on fully homomorphic encryption
下载PDF
导出
摘要 针对云计算系统面临的数据安全问题,提出一种云计算数据安全方案,该方案采用了将全同态加密算法引入到云计算数据安全方案的方法,并构建了该方案的应用场景。保证了云计算数据的传输安全和存储安全,适用于密文状态下的数据处理和用户检索。 In order to target the data security issues of cloud computing system, by introducing fully homomorphism encryption algorithm in the cloud computing data security, a new kind of da- ta security solution to the insecurity of the cloud computing is proposed and the scenarios of this application is hereafter constructed. This new security solution is fully fit for the processing and retrieval of the encrypted data, and effectively leading to the broad applicable prospect, the secur- ity of data transmission and the storage of the cloud computing.
出处 《西安邮电学院学报》 2013年第3期92-95,共4页 Journal of Xi'an Institute of Posts and Telecommunications
基金 工业和信息化部通信软科学研究计划基金资助项目(2012R38) 西安邮电大学青年教师科研基金面上资助项目(ZL2012-22)
关键词 全同态加密 云计算 数据安全 fully homomorphic encryption, cloud computing,data security
  • 相关文献

参考文献10

二级参考文献52

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2向广利,陈莘萌,马捷,张俊红.实数范围上的同态加密机制[J].计算机工程与应用,2005,41(20):12-14. 被引量:18
  • 3DOMINGO F J. A new privacy homomorphism and applications[ J]. Information Processing Letters,1996,60(5) :277-282. 被引量:1
  • 4BRICKELL E F, YACOBI Y. On privacy homomorphisms [ C ]//Proc of Advanees in Cryptology-Eurocrypt' 87, LNCS 304. Berlin : Springer-Verlag, 1988 : 117-125. 被引量:1
  • 5R1VEST R L, ADLEMAN L, DETROUZOS M L. On data banks and privacy homomorphism[ C ]//DeMILLO R A. Proc of Foundations of Secure Computation. New York : Academic Press, 1978 : 169-179. 被引量:1
  • 6ARMBRUsT M,FOX A,GRIFFITH R,et al.Above the Clouds:A Berkeley View of Cloud Computing[R].Berkeley,CA,USA:University of California,2009. 被引量:1
  • 7Google docs-Online Documents.Spreadsheets,Present[EB/OL].[2009-07-29] http://docs.google.com. 被引量:1
  • 8Windows Azure Platform[EB/OL].[2009-07-12].http://www.microsoft.com/windowsazure/. 被引量:1
  • 9Amazon Elastic Compute Cloud[EB/OL].[2009-06-24].http://aws.amazon com/ec2. 被引量:1
  • 10SONG D,WAGNER D.PERRIG A.Practical Techniques for Searches on Encrypted Data[C] //Proceedings of the IEEE Symposium on Security and Privacy(S&P'00),May 14-17.2000.Berkeley,CA,USA.Piscataway,NJ,USA:IEEE.2000:44-55. 被引量:1

共引文献88

同被引文献121

  • 1周兆永.数字校园环境下的一卡通建设[J].中国教育网络,2014(1):45-48. 被引量:5
  • 2Rivest R L, Adleman L, Detrouzos M L. On data banks and privacy homomorphism [ C ]//Proc of foundations of secure computation. New York : Academic Press, 1978 : 169-179. 被引量:1
  • 3Gentry C. A fully homomorphic encryption scheme [ D ]. Stan- ford : Stanford University ,2009. 被引量:1
  • 4van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic en- cryption over the integers [ C ]//Proceedings of EUROCRYPT 2010. Riviera, French : [ s. n. ] ,2010:24-43. 被引量:1
  • 5Smart N P, Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes[ C ]//Proc of the 13th international conference on practice and theory in public key cryptography. Berlin : Springer-Verlag,2010:420-443. 被引量:1
  • 6Jean- Sebastien C, Mandal A, Nacache D, et al. Fully homo- morphic encryption over the integers with shorter public-keys [ C]//Proc of the 31st annual conference on advances in CR- YP-TOLOGY. Berlin: Springer-Verlag,2011:487-504. 被引量:1
  • 7Coron J S, Lepoint T, Tibouchi M. Batch fully homomorphic encryption over the integers[ R]. [ s. 1. ] : [ s. n. ] ,2013. 被引量:1
  • 8Li Jian, Song Danjie, Chen Sicong, et al. A simple fully homo- morphic encryption scheme available in cloud computing [ C ]//Proceedings of 2012 IEEE 2nd international conference on cloud computing and intelligence systems. Hangzhou: IEEE .2012:214-217. 被引量:1
  • 9宋丹劫.基于同态加密的云存储系统设计与实现[D].北京:北京邮电大学,2013. 被引量:1
  • 10Nguyen P Q, Stem J. Adapting density attacks to low weight knapsacks [ C ]//Proc of Asiacrypt ' 05. Heidelberg: Springer- Verlag,2005:41-58. 被引量:1

引证文献13

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部