期刊文献+

云计算技术在计算机网络安全中的应用 被引量:9

Application of Cloud Computing Technology in Computer Network Security
原文传递
导出
摘要 分析云计算技术实现数据共享为核心,使用户数据信息共享实现频繁交流,为用户提供优良的网络环境,阐述带来机遇同时存在的风险、云计算技术的安全问题与应对措施。 This paper analyzes the cloud computing technology to achieve data sharing as the core,so that the user data information sharing to achieve frequent exchanges,to provide users with a good network environment.It describes the opportunities and risks,cloud computing technology security problems and countermeasures.
作者 张俊 ZHANG Jun(Changzhou Institute of Information Technology,Jiangsu 213164,China)
出处 《电子技术(上海)》 2021年第1期120-121,共2页 Electronic Technology
关键词 云计算技术 计算机网络 安全存储 cloud computing technology computer network secure storage
  • 相关文献

参考文献5

二级参考文献49

  • 1Huang R W, Gui X L, Yu S, Zhuang W. Study of privacypreserving framework for cloud storage. Computer Science and Information Systems, 2011, 8(3):801-819.
  • 2Liu Q, Wang G J, Wu J. An efficient privacy preserving keyword search scheme in cloud computing//Proceedings of the 12th IEEE International Conference on Computational Science and Engineering (CSE' 09). Vancouver, Canada, 2009:715-720.
  • 3Bonech D, Crescenzo G D, Ostrovsky R, Persiano G. Public-key eneryption with keyword search//Proceedings oI the Eurocrypt 2004. Interlaken, Switzerland, 2004: 506-522.
  • 4Song D X, Wagner P, Perrig P. Practical techniques for searches on encrypted data//Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000:44-55.
  • 5Wang W C, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, Illinois, USA, 2009:55-66.
  • 6Bellovin S M, Cheswick W R. Privacy-enhanced searches using encrypted bloom filters. Technical Report 2004/022, IACR ePrint Cryptography Archive, 2004.
  • 7Ohtaki Y. Partial disclosure of searchable encrypted data with support for boolean queries//Proeeedings of the 3th International Conference on Availability, Reliability and Seeurity(ARES'2008). Barcelona, Spain, 2008: 1083-1090.
  • 8Li J, Wang Q, Wang C et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th Conference on Computer Communications (INFOCOM 2010). San Diego, California, USA, 20101 1-5.
  • 9Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data//Proceedings of the 30th International Conference on Distributed Computing Systems(ICDCS'2010). Genoa, Italy, 2010: 253-262.
  • 10Boldyreva A, Chenette N, Lee Y, O'Neill A. Order preserving symmetric encryption//Proceedings of the 28th Annual International Conference on Advances in Cryptology (Euro crypt 2009). Cologne, Germany, 2009:224-241.

共引文献119

同被引文献41

引证文献9

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部