期刊文献+

基于区块链的云存储安全研究进展 被引量:11

Research Progress on Blockchain-based Cloud Storage Security Mechanism
下载PDF
导出
摘要 云存储使得用户能够随时随地通过网络连接按需获取廉价的在线存储服务,但因云服务提供商、第三方机构和用户的不可信以及不可避免的恶意攻击,存在诸多云存储安全漏洞。区块链拥有去中心化、持久性、匿名性和可审计性的特点,具有建立可信平台的潜力。因此,基于区块链技术的云存储安全机制研究已成为一种研究趋势。据此,首先概述云存储系统安全架构与区块链技术的安全性,然后从访问控制、完整性验证、重复数据删除和数据溯源4个方面进行文献综述与对比分析,最后对基于区块链的云存储安全进行技术挑战分析,并总结全文与展望未来。 Cloud storage enables users to obtain cheap online storage services on demand through network connection anytime and anywhere.However,due to the untrustability of cloud service providers,third-party institutions and users as well as the inevitable malicious attacks,there are many security vulnerabilities of cloud storage.Blockchain has the potential to build a trusted platform with its characteristics of decentralization,persistence,anonymity and auditability.Therefore,the research on cloud storage security mechanism based on blockchain technology has become a research trend.Based on this,the security architecture of cloud sto-rage system and the security of blockchain technology are first outlined,then the literature review and comparative analysis are conducted from four aspects of access control,integrity verification,data deduplication and data provenance.Finally,the technical challenges of blockchain-based cloud storage security mechanism are analyzed,summarized and prospected.
作者 徐堃 付印金 陈卫卫 张亚男 XU Kun;FU Yin-jin;CHEN Wei-wei;ZHANG Ya-nan(College of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China)
出处 《计算机科学》 CSCD 北大核心 2021年第11期102-115,共14页 Computer Science
基金 国家自然科学基金(61402518) 江苏省自然科学基金(BK20191327)。
关键词 云存储安全 区块链 访问控制 完整性验证 重复数据删除 数据溯源 Cloud storage security Blockchain Access control Integrity verification Data deduplication Data provenance
  • 相关文献

参考文献4

二级参考文献23

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 4MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008. 被引量:1
  • 5SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010. 被引量:1
  • 6LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010. 被引量:1
  • 7XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010. 被引量:1
  • 8Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987. 被引量:1
  • 9BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973. 被引量:1
  • 10LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992. 被引量:1

共引文献306

同被引文献79

引证文献11

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部