期刊文献+

云计算环境下数据安全与隐私保护 被引量:26

Data Security and Privacy Protection in Cloud Computing
下载PDF
导出
摘要 大数据正在成为当前信息技术产业发展的新热点,大数据时代所面临最严重的挑战就是用户隐私数据的安全如何得到保护.文章给出了对数据安全和隐私保护的具体要求,总结整理应对挑战的几大关键技术,如混合云、加密数据搜索和外包计算以及数据共享等,并给出了一些研究方向. Big data is drawing increasing attention in the development of information technology industry.The biggest challenge is how to protect users' private data in the age of big data.According to this situation,this paper gives some specific requirements for privacy protection and data security,and summarize some key technologies to meet this challenge,such as hybrid cloud,keyword search on encrypted data,outsoucing and data sharing.It also gives some research directions in this filed.
作者 陈克非 翁健
出处 《杭州师范大学学报(自然科学版)》 CAS 2014年第6期561-570,558,共10页 Journal of Hangzhou Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61133014)
关键词 云计算 大数据 数据安全 隐私保护 cloud computation big data data security privacy protection
  • 相关文献

参考文献59

  • 1新华网.云计算从概念走向应用至2015年收人将突破1800亿美元[EB/OL].(2013-12-20)[2014-10-05].http;//news,xinhuanet.com/info/2013-12/20/c_132982365.htm.
  • 2中国工业和信息化部.云计算安全问题及对策[EB/OL].[2014-10-05].http://www.miit.gov.cn/n11293472/n11293832/n15214847/n15218234/15475208.
  • 3新华网.大数据和云计算使的个人隐私四面楚歌[EB/OL].(2013-11-20)[2014-10-05].http://news,xinhuanet.com/info/2013-11/20/c_132902969.htm.
  • 4Columbus L.IDG cloud computing survey:security,integration challenge growth[EB/OL].(2013-08-13)[2014-10-05].http://www.forbcs.com/site.s/louiscolumbus/2013/08/13/idg-cloud-computing-survcy-security-integration-challenge-growth/.
  • 5陶涛.云计算领域隐私权保护的现实困境分析[J].现代情报,2014,34(2):162-167. 被引量:4
  • 6中文国际.摩根大通数据泄露影响8300 万客户[EB/OL].(2014-10-03)[2014-10-05].http:/ / www.chinadaily.com.cn/hqgj/jryw/2014-10-03/content_12481331.html.
  • 7互动百科.隐私[EB/OL].[2014-10-05],www.baike.com/wiki/隐私.
  • 8Liu F,Tong J,Mao J,et al.NIST cloud computing reference architecture[J].NIST Special Publication,2011,500:292.
  • 9ZDNct.Enterprise cloud outlook:inevitably hybrid,surprisingly agile and(eventually)cheap[EB/OL].(2014-04-03)[2014-10-05].http://www.zdnet.com/enterprise-cloud-outlook-inevitably-hybrid-surprisingly-agile-and-eventually-cheap-7000028032/.
  • 10IBM.IBM hybrid cloud solution[EB/OL].[2014-10-05].http://www-01.ibm.com/software/tivoli/products/hybrid-cloud/.

二级参考文献35

  • 1徐敬宏.美国网络隐私权的行业自律保护及其对我国的启示[J].情报理论与实践,2008,31(6):955-956. 被引量:32
  • 2鲍亮,陈荣.深入浅出云计算[M].北京:清华大学出版社,2012.
  • 3中国电子学会云计算专家委员会.云计算技术发展报告[M].北京:科学出版社,2011.
  • 4Wu Zhuhua. Key technology of cloud computing[M]. Bei- jing: Posts and Telecom Press, 2011: 17.
  • 5Amazon. Amazon Web services: overview of security pro- cess. 2011.
  • 6Windows Azure. Creating a shared access signature[EB/OL]. [2012-10]. http://msdn.microsoft.com/en-us/library/windowsa- zure/hh508996.aspx.
  • 7Jennings R. Cloud computing with the Windows Azure plat- form[M].Wang Xin, Ding Bin. Beijing: Tsinghua University Press, 2011: 25.
  • 8BackupTechonology. GMail dala loss affects 150,000 users[EB/OL]. (2011-02) [2012-10]. http://www.backup-technology.com/5844/ gmail-data-loss-affects- 15000-users/.
  • 9Jones C. Hotmail email access issue now resolved[EB/OL]. (2011-01)[2012-10]. http://blogs.windows.com/windowslive/ b/windowslive/archive/2011/01/03/hotmail-email-access-issue- now-resolved.aspx.
  • 10Aislyn Greene. Amazon: some data lost in cloud outage is not recoverable[EB/OL]. (2011-04) [2012-10]. http://www. bizjoumals.com/seattle/blog/techflash/2011/04/Amazon-says- some-data-lost-in-cloud.html?page=all.

共引文献6

同被引文献94

  • 1胡波.大数据云计算环境下的数据安全分析与对策研究[J].市场周刊·理论版,2019(55):156-156. 被引量:1
  • 2曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 3朱萍.虚拟空间管辖权的确定——美国和欧盟实践的启示[J].法商研究,2002,19(4):19-26. 被引量:10
  • 4王娟.对确认网络管辖权的探讨[J].河北法学,2005,23(5):95-97. 被引量:6
  • 5WARD B T, STPIOR J C. The Internet Jurisdiction Risk of Cloud Computing[J]. Information Systems Management, 2010(27):334-339.
  • 6MACKAY M,BAKER T, A1-YASIRI A.Security-oriented Cloud Computing Platform for Critical Infrastructures[J]. Computer Law & Security Review, 2012(28):679-686.
  • 7ZISSIS D, LEKKAS D. Addressing Cloud Computing Security Issues[J]. Future Generation Computer System, 2012(28):583-592.
  • 8FIRDHOUS M, GHAZALI O, HASSAN S. Trust Management in Cloud Computing: A critical Review[J]. International Journal on Advances in ICT for Emerging Regions, 2011,4(2):24-36.
  • 9DYKSTRA J, SHERMAN A T. Acquiring Forensic Evidence from Infrastructure-as-a-service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques[J]. Digital Investigation, 2012(9):90-98.
  • 10陈科有.混合云计算数据安全与隐私保护问题研究[D].江西师范大学2013

引证文献26

二级引证文献112

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部