期刊文献+

云计算数据安全 被引量:7

Cloud computing data security
下载PDF
导出
摘要 提出了一种可以同时解决云环境下数据的隐私性、可用性和完整性安全挑战的方法。综述了当前具有代表性的数据安全技术,着重分析了它们的功能单一性缺陷,并通过改进使之更加完善。提出了使用第三方审计不仅可以批量验证云租户数据的完整性,还可以构建云环境的可信链以及保障云租户数据隐私性的新思路。 提出了一种可以同时解决云环境下数据的隐私性、可用性和完整性安全挑战的方法。综述了当前具有代表性的数据安全技术,着重分析了它们的功能单一性缺陷,并通过改进使之更加完善。提出了使用第三方审计不仅可以批量验证云租户数据的完整性,还可以构建云环境的可信链以及保障云租户数据隐私性的新思路。
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2012年第S1期332-336,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(61070154) 上海教委科技创新项目(20110546) 广州市2009难题招贤项目 广东省科技攻关项目(2010B090400160) 中国博士后科学基金项目(20110490091) 上海海事大学科研基金项目(20110014)
关键词 云计算 数据安全 第三方审计 隐私 分级保护 cloud computing data security third party auditor privacy hierarchical protection
  • 相关文献

参考文献6

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1067
  • 2Amazon.Amazon Simple Storage Service. http://aws.amazon.com/s3/ . 2012
  • 3Gary Anthes.Security in the cloud[].Communications of the ACM.2010
  • 4ZHUO Hao,SHENG Zhong,NENG Hai-yu.A privacy-preserving re-mote data integrity checking protocol with data dynamics and publicverifiability[].IEEE Trans on Knowledge and Data Engineer-ing.2011
  • 5D Zissis,D Lekkas.Addressing cloud computing security issues[].Future Generation Computer Systems.2012
  • 6Zhou Min-qi,Zhang Rong,Xie Wei,et al.Securityand privacy in cloud computing:a survey[].SixthInternational Conference on Semantics Knowledgeand Grid (SKG).2010

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1066

同被引文献65

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 3王大虎,杨维,魏学业.WEP的安全技术分析及对策[J].中国安全科学学报,2004,14(8):97-100. 被引量:10
  • 4Algirdas Avizienis, Jean - Claude Laprie, Brian Randell, et al. Basic concepts and taxonomy of dependable and se- cure computing [ J ]. IEEE Transactions on Dependable and Secure Computing,2004 ( 1 ) : 11 - 33.
  • 5Steffen Becker, Marko Boskovic,Abhishek Dhama. Trust- worthy Software Systems:A Discussion of Basic Concepts and Terminology [ J ]. ACM SIGSOFT Software Engineer- ing Notes,2006,31:1 - 18. ISO/IEC 9126 - 1 - 2001.
  • 6Software engineering - product quality, Part 1 : Quality model [ S ]. 2001.
  • 7Statement of Financial Accounting Concepts No. 8 [ R]. 2010.
  • 8财政部会计准则委员会.企业会计准则2006[M].北京:中国财政经济出版社,2006.
  • 9Jack Koziol;吴薄峰;孙默;许诚.Snort入侵检测实用解决方案[M]{H}北京:机械工业出版社,2009.
  • 10Park J S,Dicoi D. Wlan Security:Current and Future[J].{H}IEEE Internet Computing,2003,(05):60-65.

引证文献7

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部