期刊文献+

基于透明加解密的密文云存储系统设计与实现 被引量:5

Ciphertext Cloud Storage Based on Transparent Encryption:Design and Implementation
下载PDF
导出
摘要 针对云存储系统中用户数据所有权和管理权分离带来的安全隐患,研究异构终端上的数据透明加解密技术,基于HDFS系统平台设计与实现了密文云存储系统。终端侧的透明加解密保障了用户数据在终端存储、传输过程和云端存储均为密文形式,为用户的敏感数据提供了全生命周期的机密性保护;用户掌控密钥使用权限实现了对数据管理权的控制,有效防止了云服务提供商遭到攻击导致的用户信息泄露,也防范了管理员对用户数据的滥用。系统的实际应用表明,透明加解密技术还保障了用户原有的文件操作习惯,提供了良好的用户体验。 In view of the separation of ownership and management of user data, this study researches transparent encryption, designs and implements a ciphertext cloud storage system based on HDFS platform. User data is encrypted during transmitting and storing based on transparent encryption of heterogeneous terminals. And the user ownership of key prevents sensitive information from the cloud serv- er and malicious attackers. From the experiments it won' t change user habit and provides good experience.
出处 《网络新媒体技术》 2015年第5期26-32,共7页 Network New Media Technology
基金 中国科学院先导专项"海云信息安全体系研究"(No.XDA06010701) 新疆维吾尔自治区科技计划项目(No.201230121)
关键词 云存储 透明加解密 API HOOK HDFS Cloud storage, Transparent encryption, API HOOK, HDFS
  • 相关文献

参考文献2

二级参考文献18

  • 1王雷,荆继武,向继.基于CIFS协议的存储加密代理设计与实现[C].第二十四次全国计算机安全学术交流会,2009. 被引量:3
  • 2Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43. 被引量:1
  • 3Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html. 被引量:1
  • 4Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html. 被引量:1
  • 5Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177. 被引量:1
  • 6Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13. 被引量:1
  • 7Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192. 被引量:1
  • 8Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192. 被引量:1
  • 9Lie David, Thekkath Chandramohan, Mitchell Mark, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Syslems. New York: ACM, 2000:168-177. 被引量:1
  • 10Dwoskin Jeffrey S, Lee Ruby B. Hardware rooted trust for secure key management and transient trust [C] //Proe of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:389-400. 被引量:1

共引文献56

同被引文献28

引证文献5

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部