期刊文献+

云存储模式下数据安全保护关键技术的探讨 被引量:2

Study on the Key Technology of Data Security Protection in Cloud Storage
原文传递
导出
摘要 以云存储在信息系统开发与建设的需求为背景,探讨能够兼容动态数据审计和网络编码的分布式存储系统实现原理以及基于ABE属性基加密的细粒度访问控制的安全增强模型,为云存储数据保护提供有效的方法。 Based on the requirement of cloud storage's development and construction in the information system, it's significantly useful to provide security protection for cloud storage data, via researching the principle of the distributed storage system which integrates the dynamic data auditing and network coding, also by studying some security-enhanced access control model which is fine-grained and attribution based encryption.
出处 《网络安全技术与应用》 2014年第6期44-44,46,共2页 Network Security Technology & Application
关键词 云存储 审计 网络编码 访问控制 Cloud Storage Auditing Network code Access Control
  • 相关文献

参考文献9

  • 1Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. and Song, D.: 'Provable Data. Possession at Untrusted Stores'. Pro. 14th ACM Conference on Computer and Communications Security ( Alexandria, VA, Oct. 28-31 ) , ACMPress, NewYork, 2007, pp. 598-609. 被引量:1
  • 2Juels, A., Kaliski, B.S. and Pots, Jr. : 'Proofs of Retrievability for Large Files'. Proc. the 14th ACM conference on Computer and communications security ( CCS'07 ) , 2007, pp. 584-597. 被引量:1
  • 3Shacham, H. and B. Waters. : 'Compact Proofs of Retrievability'. Proc. the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACR.YPT'08) , 2008, pp. 90-107. 被引量:1
  • 4Erway, C., Kupcu, A., Papamanthou, C. and Tamassia, R.: 'Dynamic Provable Data Possession'.Proc. 16th ACM Conference on Computer and Communications Security ( Chicago, Nov. 9-13 ) . ACM Press, New York, 2009, pp. 213-222. 被引量:1
  • 5Wang, Q., Wang, C., Li, J., Ren, K. and Lou.W.: 'Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing'. Proc. 14th European Syrup, Research in Computer Security (ESORICS 09) , 2009, pp. 355-370. 被引量:1
  • 6Curtmola, R., Khan, O., Bums, R. and Ateniese, G.: 'MR-PDP: Multiple-Replica Provable Data Possession'. Proc. ICDCS'08, 2008, pp. 411-420. 被引量:1
  • 7Bowers, K.D., Juels, A., and Oprea, A. : 'Hail: A High-Availability and Integrity Layer for Cloud Storage'. In ACM Conference on Computer and Communications Security, 2009, pp. 187-198. 被引量:1
  • 8A. G. Dimakis, P. G. Godfrey, Y. Wu, M.J. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage Systems." IEEE Trans. Inf. Theory, 56 ( 9 ) , pp. 4539-4551, Sep 2010. 被引量:1
  • 9B. Chen, R. Curtmola, G. Ateniese and R. Bums, "Remote Data Checking for Network Coding-Based Distributed Storage Systems." Proc. 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW2010, pp. 31-42, 2010. 被引量:1

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部