期刊文献+

面向数据中心安全的密码保障体系研究

Research on Protection System in Cryptography for Data Center Security
下载PDF
导出
摘要 随着国家电子政务和各行业信息化建设工作的稳步推进,数据中心建设需求和发展趋势越来越明显。数据中心融合了云、大数据、信息安全、密码保密、隐私保护等众多技术,如何有效规范数据中心建设,确保数据安全成为当前研究热点之一。围绕数据中心建设过程中的数据安全管控问题,积极探索并建立以密码技术为核心的数据安全保障体系和安全保障思路,提出基于密码基础设施、信任服务、应用密码服务、网络加密、存储保护等机制的数据安全密码保障技术框架,设计数据安全密码保障流程,为各领域、各行业数字化转型和数据中心建设提供参考。 With the steady progress of National e-government and informationization construction in various industries,the requirement and development trend of data center construction is becoming increasingly apparent.Data center integrates numerous technologies such as cloud,big data,information security,cryptography,and privacy protection,etc.The way of effectively regulating data center construction and ensuring data security becomes one of the current research hotspots.In respond to the data security control problems in the process of data center construction,this paper actively explores and establishes the data security protection system and ideas with cryptography as the core,proposes a technical framework for data security cryptography assurance based on mechanisms such as cryptography infrastructure,trust service,application cryptography service,network encryption,and storage protection,etc.,and designs a data security cryptography assurance process,which provides a reference for digital transformation and data center construction in various industries.
作者 何智 赵海英 雷波 HE Zhi;ZHAO Haiying;LEI Bo(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《信息安全与通信保密》 2024年第1期48-59,共12页 Information Security and Communications Privacy
关键词 数据中心 数据安全 密码保障 data center cloud data security cryptography assurance
  • 相关文献

参考文献10

二级参考文献54

  • 1李红娇,田秀霞,孙超超.可信计算中的动态远程证明研究综述[J].计算机科学,2012,39(S3):51-54. 被引量:1
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3张叶.基于可信计算的P2P认证方案[J].微计算机应用,2007,28(12):1274-1279. 被引量:2
  • 4谭良,周明天.基于可信计算平台的可信引导过程研究[J].计算机应用研究,2008,25(1):232-234. 被引量:8
  • 5SHAMIR A. Identity-based Cryptosystems and Signature Schemes[EB/OL]. http://xueshu.baidu.com/s?wd=pape ruri%3A%28b3c4ef36 lf1358c0814a5f7e50d77db 1%29&fi lter=sc_long sign&tn=SE_xueshusource 2kduw22v&sc_ vurl=http%3A%2F%2Flink.springer.com%2F 10.1007%2F3-540- 39568-7_5&ie=utf-8, 2015-11-20. 被引量:1
  • 6SAHAI A, WATERS B. Fuzzy Identity Based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer-Verlag, 2005: 457-473. 被引量:1
  • 7GOYAL V, PANDEY O, SAHAI A, et al. Attribute Based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. 13th ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, VA, USA. New York: ACM, 2006: 89-98. 被引量:1
  • 8BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Oakland, Califormia, USA. New |ersey: IEEE, 2007: 321-334. 被引量:1
  • 9DAMIANI E, VIMEI~CATI S D C D, FORESTI S, et al. Selective Data Encryption in Outsourced Dynamic Environments[J]. Electronic Notes in Theoretical Computer Science, 2007, 168(1): 127-142. 被引量:1
  • 10HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Computer Research and Development, 2010, 47(zl): 259-265. 被引量:1

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部