期刊文献+

云平台云盘加密性能损耗研究

Study on the Cloud Platform Disk Encryption Performance Loss
下载PDF
导出
摘要 云平台部署的云盘虚拟机是用户数据和业务的载体,当用户对数据安全性要求较高时,一般采用加密的方式,提高云盘数据的安全性规避数据泄露风险.除了安全性,业务性能也同样是用户非常关注的地方,但对于云盘加密后带来的性能损耗情况,各大云厂商却没有明确的数据说明.本文选取了主流的三家云厂商,对他们的加密云盘性能做了多轮的模拟业务测试.通过对比分析云盘在加密和非加密应用时的性能损耗情况,对用户关注的云盘性能给出量化说明及影响分析. The cloud disk virtual machine deployed on the cloud platform is the carrier of user data and business.When users have high requirements for data security,encryption is generally used to improve the security of cloud disk data and avoid the risk of data leakage.In addition to security,business performance is also of great concern to users.However,the major cloud manufacturers have no clear data description on the performance loss caused by cloud disk encryption.In the test scheme of this paper,three mainstream cloud manufacturers are selected to do several rounds of simulation service tests on their encryption cloud disk performance.By comparing and analyzing the performance loss of cloud disk in encrypted and non encrypted applications,this paper gives a quantitative description and impact analysis on the performance of cloud disk concerned by users.
作者 张浩 赵丰收 ZHANG Hao;ZHAO Feng-shou(ZTE Nanjing Research Institute,Nanjing 210012,China)
出处 《南京晓庄学院学报》 2021年第6期66-71,共6页 Journal of Nanjing Xiaozhuang University
关键词 云平台 云盘加密 性能损耗 cloud platform cloud disk encryption performance loss
  • 相关文献

参考文献9

二级参考文献43

  • 1张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 2LIU Qin, WANG Guojun, WU Jie. An efficient privacy preserving keyword search scheme in cloud computing[C]//Proceedings of the 2009 International Conference on Computational Science and Engineering (CSE '09). Washington, DC, USA: IEEE Computer Society, 2009: 715-720 [本文引用:1]. 被引量:1
  • 3Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v2. 1[EB/OL]. [2011-12-05]. http://www.cloudsecurity-alliance.org/guidance/csaguide.v2.1.pdf. 被引量:1
  • 4SAHAI A, WATERS B. Fuzzy Identity-based Encryption[C]// Proceedings of EUROCRYPT'05. Berlin, Germany: Springer-Verlag, 2005: 457-473. 被引量:1
  • 5GGYAL V, PANDEY O, SAHAI A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 89-98. 被引量:1
  • 6BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-basedEncryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2007: 321-334. 被引量:1
  • 7BRAKERSKI Z, VAIKUNTANATHAN V. Efficient fully homomorphic encryption from (stand ard) LWE[C]//Foundations of Computer Science(FOCS), 2011 IEEE 52nd Annual Symposium on. Palm Springs, CA: IEEE, 2011: 97-106. 被引量:1
  • 8SHAI HALEVI, SHOUP V. Design and Implementation of a Homomorphic-Encryption Library[D]. USA: MIT, 2013. 被引量:1
  • 9WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//INFOCOM, 2010 Proceedings of IEEE. USA: IEEE , 2010: 1-9. 被引量:1
  • 10WAHBEH Q, YANG WEINING, LI NINGHUI. Understand ing Hierarchical Methods for Differentially Private Histograms[J]. Proceedings of the VLDB Endowment, 2013, 6(14): 1954-1965. 被引量:1

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部