期刊文献+

云存储模式下数据安全保护研究

Research on Data Security Protection in Cloud Storage Mode
下载PDF
导出
摘要 云存储模式的开发与推广为用户带来了很大便捷,但与此同时也伴随数据安全问题发生。为了全面保障数据安全性,必须通过技术手段加以保护。因此,本文对云存储模式下的数据安全保护进行研究,分析了云存储模式下的数据安全风险,并发现使用完整性审计技术、权限控制技术、密文检索技术、收敛加密技术、安全存储技术以及数据销毁技术,可以确保数据的安全性。 The development and promotion of cloud storage mode has brought great convenience to users,but at the same time,it is also accompanied by data security problems.In order to fully ensure data security,it must be protected by technical means.Therefore,this paper studies the data security protection under the cloud storage mode,analyzes the data security risks under the cloud storage mode,and finds that the use of integrity audit technology,authority control technology,ciphertext retrieval technology,convergence encryption technology,secure storage technology and data destruction technology can ensure the security of data.
作者 张鹏 ZHANG Peng(Shengda Trade Economics&Management College of Zhengzhou,Zhengzhou Henan 451191,China)
出处 《信息与电脑》 2021年第13期177-179,共3页 Information & Computer
关键词 云存储模式 数据安全 保护 cloud storage mode data security protection
  • 相关文献

参考文献10

二级参考文献43

  • 1Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. and Song, D.: 'Provable Data. Possession at Untrusted Stores'. Pro. 14th ACM Conference on Computer and Communications Security ( Alexandria, VA, Oct. 28-31 ) , ACMPress, NewYork, 2007, pp. 598-609. 被引量:1
  • 2Juels, A., Kaliski, B.S. and Pots, Jr. : 'Proofs of Retrievability for Large Files'. Proc. the 14th ACM conference on Computer and communications security ( CCS'07 ) , 2007, pp. 584-597. 被引量:1
  • 3Shacham, H. and B. Waters. : 'Compact Proofs of Retrievability'. Proc. the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACR.YPT'08) , 2008, pp. 90-107. 被引量:1
  • 4Erway, C., Kupcu, A., Papamanthou, C. and Tamassia, R.: 'Dynamic Provable Data Possession'.Proc. 16th ACM Conference on Computer and Communications Security ( Chicago, Nov. 9-13 ) . ACM Press, New York, 2009, pp. 213-222. 被引量:1
  • 5Wang, Q., Wang, C., Li, J., Ren, K. and Lou.W.: 'Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing'. Proc. 14th European Syrup, Research in Computer Security (ESORICS 09) , 2009, pp. 355-370. 被引量:1
  • 6Curtmola, R., Khan, O., Bums, R. and Ateniese, G.: 'MR-PDP: Multiple-Replica Provable Data Possession'. Proc. ICDCS'08, 2008, pp. 411-420. 被引量:1
  • 7Bowers, K.D., Juels, A., and Oprea, A. : 'Hail: A High-Availability and Integrity Layer for Cloud Storage'. In ACM Conference on Computer and Communications Security, 2009, pp. 187-198. 被引量:1
  • 8A. G. Dimakis, P. G. Godfrey, Y. Wu, M.J. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage Systems." IEEE Trans. Inf. Theory, 56 ( 9 ) , pp. 4539-4551, Sep 2010. 被引量:1
  • 9B. Chen, R. Curtmola, G. Ateniese and R. Bums, "Remote Data Checking for Network Coding-Based Distributed Storage Systems." Proc. 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW2010, pp. 31-42, 2010. 被引量:1
  • 10洪澄等.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010. 被引量:1

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部