期刊文献+

面向云备份系统的多级隐私保护机制 被引量:1

Multilevel privacy protection mechanism for cloud backup system
下载PDF
导出
摘要 针对现有云安全存储系统对所有用户数据未经分类,尤其是对暗隐私大数据一概采用加密方法造成系统性能低下的问题,提出一种面向云备份系统的多级隐私保护机制。将用户隐私数据进行分类处理,明隐私数据采用灵活低开销的多级加密机制,暗隐私数据采用部分数据随机加密的分割重构机制;基于该机制,设计和实现一个确保隐私性的云备份系统。实验结果表明,基于所提出多级隐私保护机制实现的备份系统在隐私保护上和基于加密策略实现的备份系统相当,但备份效率更高。 Aiming at the problems of the existing cloud security storage system that it encrypts the user data without classification,especially for the implicit privacy big data,resulting in the system performance degradation,a multilevel privacy protection mechanism for cloud backup system was proposed,where a flexible and low overhead multilevel encryption mechanism was applied to the explicit privacy data and a segment reconfiguration mechanism with partial data encrypting randomly was applied to the implicit privacy data according to privacy data classification.Based on the proposed mechanism,a cloud backup system which ensured privacy protection was implemented.Experimental results show that the backup system based on the proposed privacy protection mechanism is more efficient than traditional backup system on the same privacy protection level.
出处 《计算机工程与设计》 北大核心 2017年第12期3241-3246,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61373163) 国家科技支撑计划课题基金项目(2014BAH11F02 2014BAH11F01) 四川省教育厅自然科学一般基金项目(15ZB0042)
关键词 云备份 隐私保护 数据分割 明隐私数据 暗隐私数据 cloud backup privacy protection data partition explicit privacy data implicit privacy data
  • 相关文献

参考文献10

二级参考文献140

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1231
  • 2张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1454

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部