Encrypted Storage and Retrieval in Cloud Storage Applications
被引量:1
Encrypted Storage and Retrieval in Cloud Storage Applications
基金
funded by the National Key Technology R & D Program of China under Grant No. 2008BAH37B07
the National Natural Science Foundation of China under Grant No. 60970148
the National Basic Research Program of China ("973" Program) under Grant No. 2007CB310806
参考文献9
-
1ARMBRUST M,FOX A,GRIFFITH R, et al.Above the Clouds: A Berkeley View of Cloud Computing[]..2009
-
2Google docs - Online Documents, Spreadsheets, Present. http://docs.google. com . 2009
-
3BONEH D,CRESCENZO G,OSTROVSKY R, et al.Public Key Encryption With Keyword Search[].Advances in Cryptology Proceedings of the rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT’).2004
-
4PARK D,KIM K,LEE P.Public Key Encryption With Conjunctive Field Keyword Search[].Proceedings of the Workshop on Information Security Applications (WISA’).2004
-
5SWAMINATHAN A,MAO Y,SU G M, et al.Confidentiality-Preserving Rank-Ordered Search[].Proceedings of the ACM Workshop on Storage Security and Survivability (StorageSS’).2007
-
6GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[].Proceedings of the st Annual ACM Symposium on Theory of Computing (STOC’).2009
-
7SONG D X,WAGNER D,PERRIG A.Practical Techniques for Searches on Encrypted Data[].IEEE Symposium on Security and Privacy.2000
-
8Amzon.Amzon elastic compute cloud(Amazon EC2). http://aws.amazon.com/ec2/ . 2009
-
9Windows Azure platform[CP/OL]. http://www.microsoft.com/windowsazure/ . 2009
同被引文献6
-
1张龙立.云存储技术探讨[J].电信科学,2010,26(S1):71-74. 被引量:54
-
2李婷,李晓龙.云计算的资源管理方法研究[J].电脑与电信,2010(1):62-64. 被引量:16
-
3叶钰,李太宁,刘渊.基于SimpleDB进行分布式数据云存储[J].泰州职业技术学院学报,2010,10(1):9-10. 被引量:1
-
4高建秀,吴振新,孙硕.云存储在数字资源长期保存中的应用探讨[J].现代图书情报技术,2010(6):1-6. 被引量:43
-
5王佳隽,吕智慧,吴杰,钟亦平.云计算技术发展分析及其应用探讨[J].计算机工程与设计,2010,31(20):4404-4409. 被引量:153
-
6周平,张超.云计算及云存储的管理技术[J].上海电力学院学报,2010,26(5):498-501. 被引量:18
-
1蒋秀峰,任敏,朱华勇,沈林成,袁鸿翼.一种复杂大容量数据库安全方案[J].战术导弹技术,2004(2):58-61. 被引量:1
-
2虫二.保护闪存盘,刻不容缓![J].电脑爱好者,2006,0(5):47-47.
-
3网评精彩[J].计算机应用文摘,2008(22):5-5.
-
4赵俊环.如何保护Word文档隐私(下)[J].农村青少年科学探究,2011(3):43-43.
-
5夏明伟,林云,姚振强.一个UNIX开发环境下的源码加密保护方法[J].福建电脑,2005,21(10):105-105.
-
6王东红,迟言.实时动态密钥的加密存储网方案研究[J].信息与电脑(理论版),2011(10):61-62.
-
7瞿遥,应艳丽.基于同态加密的生物认证研究[J].信息与电脑(理论版),2015(12):147-149. 被引量:1
-
8老明星.应用软件的综合保护[J].新潮电子,1997(1):31-31.
-
9王志军.QQ密码巧妙粘贴[J].网友世界,2007(18):31-31.
-
10俞木发.安全不落单 闪存盘也要玩加密[J].电脑爱好者,2016,0(24):21-22.