随着云计算在学术界和工业界的兴起,云计算也不可避免的带来了一些安全问题.本文对云计算的安全需求进行了总结,指出云计算不仅在机密性、数据完整性、访问控制和身份认证等传统安全性上存在需求,而且在可信性、配置安全性、虚拟机安全...随着云计算在学术界和工业界的兴起,云计算也不可避免的带来了一些安全问题.本文对云计算的安全需求进行了总结,指出云计算不仅在机密性、数据完整性、访问控制和身份认证等传统安全性上存在需求,而且在可信性、配置安全性、虚拟机安全性等方面具有新的安全需求.我们对云计算的两个典型产品Amazon Web Services和Windows Azure的安全状况进行了总结,并阐述了针对云计算的拒绝服务攻击和旁通道攻击.基于云计算的安全需求和面临的攻击,对现有安全机制进行了优缺点分析,系统的总结了现有的安全机制.展开更多
Beginning with a discussion on the difficulties in the long-term preservation of digital information,this paper introduces some strategies for the long-term preservation of digital information,e .g .technical strategy...Beginning with a discussion on the difficulties in the long-term preservation of digital information,this paper introduces some strategies for the long-term preservation of digital information,e .g .technical strategy,safety strategy and management strategy .展开更多
[目的/意义] Five Safes是当前较为科学的一种结构化的敏感数据安全访问框架,被广泛应用于敏感数据安全访问的描述、评估、规划、培训和监管等方面,我国图书馆领域敏感数据的安全访问可借鉴其应用经验,提高图书馆领域敏感数据的安全使用...[目的/意义] Five Safes是当前较为科学的一种结构化的敏感数据安全访问框架,被广泛应用于敏感数据安全访问的描述、评估、规划、培训和监管等方面,我国图书馆领域敏感数据的安全访问可借鉴其应用经验,提高图书馆领域敏感数据的安全使用。[方法/过程]通过对Five Safes安全框架应用情况的调研、分析,归纳研究主题,并进行论述。[结果/结论]应用Five Safes安全框架,图书馆领域应提高敏感数据的共享意识,科学规划敏感数据的安全访问,合理地进行数据敏感度分级,加强对用户数据访问的试验应用和监控,通过培训提高用户的合规思维,从而全面提高图书馆领域敏感数据安全使用水平。展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
文摘随着云计算在学术界和工业界的兴起,云计算也不可避免的带来了一些安全问题.本文对云计算的安全需求进行了总结,指出云计算不仅在机密性、数据完整性、访问控制和身份认证等传统安全性上存在需求,而且在可信性、配置安全性、虚拟机安全性等方面具有新的安全需求.我们对云计算的两个典型产品Amazon Web Services和Windows Azure的安全状况进行了总结,并阐述了针对云计算的拒绝服务攻击和旁通道攻击.基于云计算的安全需求和面临的攻击,对现有安全机制进行了优缺点分析,系统的总结了现有的安全机制.
文摘Beginning with a discussion on the difficulties in the long-term preservation of digital information,this paper introduces some strategies for the long-term preservation of digital information,e .g .technical strategy,safety strategy and management strategy .
文摘[目的/意义] Five Safes是当前较为科学的一种结构化的敏感数据安全访问框架,被广泛应用于敏感数据安全访问的描述、评估、规划、培训和监管等方面,我国图书馆领域敏感数据的安全访问可借鉴其应用经验,提高图书馆领域敏感数据的安全使用。[方法/过程]通过对Five Safes安全框架应用情况的调研、分析,归纳研究主题,并进行论述。[结果/结论]应用Five Safes安全框架,图书馆领域应提高敏感数据的共享意识,科学规划敏感数据的安全访问,合理地进行数据敏感度分级,加强对用户数据访问的试验应用和监控,通过培训提高用户的合规思维,从而全面提高图书馆领域敏感数据安全使用水平。
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.