期刊文献+

基于多比特重复数据删除的云存储信道隐藏 被引量:1

Cloud Storage Channel Hiding Based on Multiple Bit Repeating Data Deletion
下载PDF
导出
摘要 为提高云存储用户数据上传的效率和安全性,提出一种基于多比特重复数据删除的云存储信道隐藏方法。构建包含云存储提供商、受害者和攻击者的交叉用户信道隐藏框架,采用消息的选择上传机制,以消除"0"文件上传的必要性,减少上传文件的数量。同时,为实现多比特隐藏信道无差错解码,提出一种新的同步技术对文件进行时间戳排序,从而提高数据传输的秩序。在云存储服务器SugarSync和BaiduYun中的测试结果,验证了该方法的有效性和安全性。 In order to improve the efficiency and security of data upload for cloud storage users,a cloud storage channel hiding algorithm based on multiple bit repeating data deletion is proposed.A framework for cross user covert channels including cloud storage providers,victims and attackers is built,and the use of the message selection upload mechanism eliminates the need for “0” file upload,so as to reduce the number of uploaded files.At the same time,in order to realize error free decoding of multiple bit covert channel,a new synchronization technique is proposed,which sorts files with time stamp,so as to improve the order of data transmission.Finally,in the cloud storage service SugarSync and BaiduYun,the performance of the proposed algorithm is tested,and the results verify the effectiveness and security of the algorithm.
作者 施南业 袁莹 汪昕晨 俞俊杰 SHI Nanye, YUAN Ying,WANG Xinchen,YU Junjie(Department of Computer and Information Technology,Zhejiang Police College,Hangzhou 310000,Chin)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第6期111-116,共6页 Computer Engineering
基金 公安部科技计划项目(2015LLYJJKST010)
关键词 多比特 重复数据删除 云存储 信道隐藏 时间戳 multiple bit repeating data deletion cloud storage channel hiding time stamp
  • 相关文献

参考文献5

二级参考文献82

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Armbrust M, Fox A, Griffith R, et al. A view of cloud com- puting [J]. Commun ACM, 2010, 53(4): 50-58. 被引量:1
  • 5Azure. Update on azure storage service interruption [EB/OL]. [2014-11-19]. http://azure.microsofl.com/blog/ 2014/11 / 19/update-on-azure-storageservice-interruption/. 被引量:1
  • 6Gantz J, Reinsel D. The digital universe decade-are you ready?[EB/OL]. [2014-05-01]. http://www.emc.com/collat- eral/analyst reports/idc-digitaluniverse-are-you-ready.pdf. 被引量:1
  • 7Halevi S, Harnik D, Pinkas B, et al. Proofs of ownership in remote storage systems[C]//Proceedings of Computer and Communications Security. New York: ACM Press, 2011: 491-500. 被引量:1
  • 8Zheng Q, Xu S. Secure and efficient proof of storage with deduplication[C]//Proceedings of the ACM Conference on Data and Application Security and Privacy. New York: ACM Press, 2012: 1-12. 被引量:1
  • 9Yuan J, Yu S. Secure and constant cost public cloud storage auditing with deduplication[C] //Proceedings of the IEEE Communications and Network Security. Piscataway: IEEE Press, 2013: 145-153. 被引量:1
  • 10Storer M W, Greenan K, Long D D, et al. Secure data dedu- plication[C] // Proceedings of the 4th ACM International Workshop on Storage Security and Survivability. New York: ACM Press, 2008: 1-10. 被引量:1

共引文献224

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部