期刊文献+

面向云隐私保护的5A问责制协议设计 被引量:1

5A accountability privacy protocol with privacy-preservingfor cloud computing
下载PDF
导出
摘要 云计算的隐私保护是目前业界最为关注的问题。文中基于云计算参与者实际交互需求机制,在5A问责制的隐私建模研究基础上,从云运行实际机制和隐私问责保护实际需要出发,提炼、设计符合云隐私保护实际需求的问责制协议方案。在云租户与服务提供方之间、服务提供方之间以及云参与者与云系统之间进行协议的提炼和归纳,设计符合问责隐私保护实际需求的协议机制,使隐私问责制系统具有实用性和可行性。重点从云参与者的隐私需求描述、隐私服务承诺、网络行为审计、隐私暴露条件、违约认定和处罚方面进行协议设计,并基于协议测试仪Smart bit 6000C对问责制系统进行建模、测试与验证,测试结果验证了协议技术的正确性和可行性。 Currently,the privacy protection of cloud computing is the most important issue in the industry.Based on the actual interaction demand and the mechanism of cloud computing participants,and the actual operation mechanism of cloud operation and the actual needs of privacy accountability protection,this paper designs a protocol scheme meeting actual needs in 5A accountability system.Refining protocols from cloud participants,including cloud tenants,cloud service providers and the cloud system,the design of this paper can meet the actual needs of the accountability mechanism that realizes agreement privacy protection protocols,making the privacy accountability system have the practicability and the feasibility.The protocols are mainly focused on cloud user privacy requirement description,privacy guarantee of cloud computing system,network behavior auditing,privacy exposure condition,breach of contract recognition,and punishment.The simulation environment is constructed based on the tester Smart bit 6000C.The experimental results verify the efficiency and the feasibility of the designed protocol.
作者 王杰 陈志刚 钱漫匀 焦铬 程宏兵 WANG Jie;CHEN Zhigang;QIAN Manyun;JIAO Ge;CHENG Hongbing(College of Software,Central South University,Changsha 410012,China;College of Computer Science & Technology,Hcngyang Normal College,Hengyang 421002,China;College of Computer Science &Technology,Zhejiang University of Technology,Hangzhou 310023,China)
出处 《南京邮电大学学报(自然科学版)》 北大核心 2018年第6期68-76,共9页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(61402413 61672540) 湖南省自然科学基金(2017JJ2010) 湖南省科学研究青年项目(16B039)资助项目
关键词 云计算 隐私保护 问责制 协议设计 cloud computing privacy-preserving accountability protocol design
  • 相关文献

参考文献8

二级参考文献92

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4Diffie W,Hellman ME.New directions in cryptography.IEEE Trans.on Information Theory,1976,22(6):644-654.[doi:10.1109/TIT.1976.1055638].
  • 5Merkle RC.Secure communications over insecure channels.Communications of the ACM,1978,21(4):294-299.[doi:10.1145/359460.359473].
  • 6Gardner M.A new kind of cipher that would take millions of years to break.Scientific American,1977,237:120-224.[doi:10.1038/scientificamerican0877-120].
  • 7Rivest RL,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM,1978,21(2):120-126.[doi:10.1145/359340.359342].
  • 8Adleman LM.On distinguishing prime numbers from composite numbers.In:Proc.of the 21st Annual Symp.on Foundations of Computer Science.New York:IEEE,1980.387-406.[doi:10.1109/SFCS.1980.28].
  • 9Jr Lenstra HW.Factoring Integers with Elliptic Curves.Annals of Mathematics,1987,126:649-673.
  • 10Coppersmith D.Fast evaluation of logarithms in fields of characteristic two.IEEE Trans.on Information Theory,1984,30(4):587-594.[doi:10.1109/TIT.1984.1056941].

共引文献313

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部