期刊文献+

隐私保护云存储架构的研究 被引量:2

Privacy preservation cloud storage architecture research
下载PDF
导出
摘要 随着计算机信息产业的发展,数据量正在以几何级数的方式迅速增长,传统的单机模式很难满足大量的数据存储任务,且企业软硬件维护成本高昂。云存储的出现为上述问题的解决提供了可能,然而近年出现的问题引起了人们对云存储的隐私安全的思考。介绍了近年来研究学者们在云存储隐私保护方面所做的工作,提出了一种基于非对称加密挑战-应答模式身份认证的加密搜索隐私保护机制,对今后云存储数据隐私保护的可能发展方向做了预测。 With the development of the information industry,the amount of data is rapidly growing in a geometrically way.It is difficult for the traditional Stand-alone mode to meet so huge data storage task and the cost of maintaining hardware and software is high.The emergence of cloud storage provides a solution for the above problems,but it has made us doubts on the privacy security of the cloud storage that troubles of divulging users' privacy information.First,reviewed the work has made in the prvicy preservation of cloud storage,then proposed a encryption searching privacy preservation architecture which based on an asymmetric challenging-answering authentication mode.At the end of the paper we discuss the future direction of the cloud storage data privacy security.
出处 《河北省科学院学报》 CAS 2013年第2期45-48,共4页 Journal of The Hebei Academy of Sciences
关键词 云存储 隐私性 安全性 Cloud storage Privacy Security
  • 相关文献

参考文献7

二级参考文献50

  • 1林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1232
  • 3张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 4王鹏.云计算的关键技术与应用实例[M].北京:人民邮电出版社,2009. 被引量:18
  • 5BENALOH J, CHASE M, HORVITZ E, et al. Pa- tient controlled encryption: ensuring privacy of elec- tronic medical records [C] // Proceedings of the 2009 ACM workshop on Cloud computing security. New York,USA: ACM, 2009: 103-114. 被引量:1
  • 6THOMPSON B, HABER S, HORNE W G, et al. Privacy-preserving computation and verification of ag- gregate queries on outsourced databases [C]//Pro- ceedings of the 9th International Symposium on Priva- cy Enhancing Technologies. New York, USA:ACM, 2009 : 185-201. 被引量:1
  • 7WANG Weichao, LI Zhiwei, OWENS R, et al. Se- cure and efficient access to outsourced data [C]//Pro- ceedings of the 2009 ACM Workshop on Cloud Com- puting Security. New York, USA: ACM, 2009:55- 66. 被引量:1
  • 8LIU Qin, WANG Guojun, WU Jie. An efficient priva cy preserving keyword search scheme in cloud computing[C] // Proceedings of the 2009 International Con ferenee on Computational Science and Engineering. New York, USA: ACM, 2009: 715-720. 被引量:1
  • 9BONECH D, CRESCENZO D G, OSTROVSKY R, et al. Public-key encryption with keyword search [C] //Proceedings of Eurocrypt 2004. Berlin, Germany: Springer, 2004: 506-522. 被引量:1
  • 10CHANG Yancheng, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data [EB/OL]. [2011-07-06]. http://eprint, iacr. org/ 2004/051. pdf. 被引量:1

共引文献180

同被引文献4

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部