期刊文献+

基于模糊门限的分布式数据存储系统 被引量:1

Distributed Data Storage System Based on Fuzzy Threshold
原文传递
导出
摘要 如何在高速发展的网络环境下构建大规模、高性能、高可靠性及高可扩展性的分布式存储系统,是分布式存储技术面临的新发展课题。利用Shamir门限方案分割秘密方法的重要思想对共享数据进行分割,并将得到不同的份额再根据模糊数学中的隶属度来构造出子数据集,而后将子数据集分发给各参与者进行存储,根据用户的需要进行数据恢复。核心是把分割生成的子数据扩充生成子数据集,以此来增强数据恢复的可靠性。 Distributed data storage system have the ability to accommodate great number of users, and to deal with massive storage data distributed in the Internet environment, and provide high data availability and high performance of storage service. How to build up this data storage system with good scalability, efficiency, and reliability is a valuable and urgent job in the field of distributed storage technology. A new data distribution algorithm is proposed in this paper, in which Shamir's threshold scheme is used to divide the data, and then the Fuzzy data sets are constructed from the sub-share that is segmented from the original data. The sub-shares are distributed to every participant for storage at the terminal system, and also the original data could be restored according to users' requirements. The main contribution of this dissertation is to strengthen the reliability of data restoration by adding redundancy to the sub-shares.
出处 《信息安全与通信保密》 2010年第8期76-78,共3页 Information Security and Communications Privacy
关键词 分布式存储 秘密共享 门限方案 隶属度 distributed storage secret sharing threshold scheme membership
  • 相关文献

参考文献6

  • 1GOWDA T, VRUDHULA S. A Decomposition Based Approach for Synthesis of Multi-level Threshold Logic Circuits[C]// Proceedings of ASP-DAC. Seoul, Korea: IEEE Computer Society Press, 2008: 125-130.
  • 2杨伦标,高英仪.模糊数学原理及应用[M].广州:华南理工大学出版社,1995
  • 3魏峰,张建中.一个完善的秘密分享方案[J].信息安全与通信保密,2006,28(1):64-65. 被引量:2
  • 4SHAMIR A. How to Share A Secret[J]. Communications of the ACM, 1979, 24: 612-613.
  • 5BLAKLEY G. Safeguarding Cryptographic Keys[C]//Proceedings of National Computer Conference. Montvale, N J, USA: AFIPS Press, 1979: 313-317.
  • 6[美]STALLINGSWilliam.密码编码学与网络安全--原理与实践[M].孟庆树,王丽娜,傅建明,等,译.北京:电子工业出版社,2004:74-78.

二级参考文献8

  • 1刘锋,张建中.一个具有完善保密性的秘密分享方案[J].济南大学学报(自然科学版),2005,19(2):124-125. 被引量:4
  • 2Desmedt Y. Threshold cryptography[J].European Transactions On Telecommunications,1994, 5(4): 449-457.
  • 3Shamir A.How to Share a Secret[J].Communications of the ACM. 1979, 22(11): 612-613.
  • 4Bricken E F,Dare port DM. On the Classification of Idea Secret Sharing Scheme[J]. J Cryptology, 1991, 4(2).
  • 5Asmuth C,Bloom J. A modular approach to key safeguarding[J].IEEE Transactions on Information Theory, 1983, 29(2): 208-210.
  • 6D Chaum.Blind signature system[J].Advances in Cryptology[C].Cryupto‘83.Plenum.153.
  • 7张建中,肖国镇.一个可防止欺诈的秘密分享方案[J].电子科学学刊,1999,21(4):516-521. 被引量:12
  • 8姚赤峰,蒋兴浩,刘小红,陈抗生.两个基于离散对数的盲签名方案[J].计算机工程与应用,2001,37(9):106-107. 被引量:7

共引文献30

同被引文献6

  • 1马兰.阈下信道的安全性研究[J].信息安全与通信保密,2005,27(4):33-35. 被引量:1
  • 2CHOR B, GOLDREICH O, KUSHILEVITZ E, et al. Private Information Retrieval[C]//Proceedings of the 36th Annual Symposium on the Foundations of Computer Science. California, United States: IEEE Computer Society Press, 1995: 41-50.
  • 3BEIMEL A, ISHAI Y, MALKIN T. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing[C]//Springer. CRYPTO 2000.Santa Barbara, USA: Springer-Verlag, 2000: 55-73.
  • 4AGUILARMELCHOR C, GABORIT P. A Lattice-Based Computationally-Efficient Private InformationRetrieval Protocol[C]//WEWORC 2007.Bochum, Germany: Cryptology Eprint Archive, 2007: 50-54.
  • 5GOLDBERG Ian. Improving the Robustness of Private Information Retrieval[C]//Proceeding of the 2007 IEEE Symposium on Security and Privacy. Washington, USA: IEEE Publications, 2007: 131-148.
  • 6BEIMEL A, STAHL Y. Robust Information-TheoreticPrivate Information Retrieval[C]//Proceedings of the 3rd International Conference on Security in Communication Networks. Berlin, Germany : Springer-Verlag, 2002 : 326-341.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部