期刊文献+

云计算环境下安全服务架构的设计

Design of Security Service Architecture in Cloud Computing Environment
下载PDF
导出
摘要 安全问题是云计算最受关注的问题之一。针对目前云计算环境中所存在安全隐患,设计基于行为检测的云端安全服务架构及全同态加密数据传输模式,并搭建了Hadoop云计算环境,将此环境中数据传输过程及加密算法进行实现。结果表明,其有效性、可行性为进一步解决云计算以及电子商务等方面的安全和隐私保护问题提供了帮助。 Abstract.. The security problem is one of the most popular issues in cloud computing,This paper designed a cloud security service architecture based on behavior detection arid a fully homomorphic encryption data transmission mode ,Aiming at the hidden safety problems,And then realized the data transmission process arid encryption algorithm in the H&doop cloud computing environment.The results show that the effectiveness and feasibility can provide some help to solve the problem of security and privacy protection in cloud computing and e-commerce etc,
作者 武永娇 黄宁
出处 《计算机安全》 2014年第6期6-10,共5页 Network & Computer Security
基金 甘肃省教育厅科研项目2011年<区域性远程教育公共服务云建设研究>重点项目资助
关键词 全同态加密 分布存储 云计算 fully homomorphic encryption distributed storage cloud computing
  • 相关文献

参考文献3

二级参考文献36

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 3尹春勇,李秦伟,孙汝霞.一种秘密同态的改进模式[J].贵州工业大学学报(自然科学版),2007,36(1):68-70. 被引量:3
  • 4尹春勇,李坚石,孙汝霞.安全科学计算系统SSCS实现[J].计算机工程与设计,2007,28(13):3070-3073. 被引量:1
  • 5ZHU Jian-ming. A new scheme to privacy-preserving collaborative data mining[C]//Proc of the 5th International Conference on Information Assurance and Security. 2009: 468-471. 被引量:1
  • 6IMAN S, ALAA M, AMIN S, et al. P3ARM: privacy-preserving protocol for association rule mining[C]//Proc of IEEE Workshop on Information Assurance. 2006 : 76-83. 被引量:1
  • 7GUI Qiong, CHENG Xiao-hui. A privacy-preserving distributed method for mining association rules [C]//Proc of International Conference an Artificial Intelligence and Computational Intelligence. 2009 : 294-297. 被引量:1
  • 8ZHAN J, MATWIN S, CHANG Li-wu. Privacy-preserving collaborative association rule mining[J]. Journal of Network and Compu-ter Applications,2007,30 (3):1216-1227. 被引量:1
  • 9SOMESH J, LUIS K, PATRICK M. Privacy preserving clustering [C]//Proc of the 10th European Symposium on Research in Computer Security. 2005 : 397-417. 被引量:1
  • 10OUYANG Wei-min, HUANG Qin-hua. Privacy preserving sequential pattern mining based on secure two-party computation [C]//Proc of International Conference on Machine Learning and Cybernetics. 2006 : 1227-1232. 被引量:1

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部