期刊文献+

支持隐私保护的云存储框架设计 被引量:12

Design of Cloud Storage Framework with Privacy-Preserving
下载PDF
导出
摘要 针对云存储中的隐私安全问题,设计了一个支持隐私保护的、高效且安全的云存储框架.该框架采用多叉树结构构建数据索引,设计密钥推导算法EKDA(Extirpation-Based Key Derivation Alogrithm)实现密钥的管理和分发,构建关键字检索算法DLSEK(Discrete Logarithm-Based Search on Encrypted Keyword)实现对数据共享和密文检索的支持,并结合延迟更新技术解决用户访问权限变更和数据更新问题.从EKDA的有效性、DLSEK的性能和隐私安全方面进行实验评估和安全分析,结果表明:EKDA能有效地减少通信和存储负载,DLSEK是一种具有单向性安全的支持检索的加密技术,整个框架的设计能有效地保护用户的隐私,同时支持高效的数据访问. An efficient and secure framework of cloud storage is proposed to support privacy security in cloud storage. The framework adopts a multi-tree structure for indexing, designs an extirpation-based key derivation algorithm (EKDA) for key management, and constructs a discrete logarithm-based search on encrypted keyword (DLSEK) for data sharing and ciphertext retrieval. The lazy revocation is combined into the framework to deal with the changes of users' access right and dynamic operations of data. Analyzing results for the effectiveness of EKDA, the performance of DLSEK and the privacy security of the framework show that EKDA can efficiently reduce the communication and storage overheads and that DLSEK is an encryption technique which supports ciphertext retrieval and is one-way security. The proposed framework is privacypreserving while supporting data access efficiently.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2011年第10期1-6,12,共7页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60873071) 国家高技术研究发展计划资助项目(2008AA01Z410) IBM共享高校研究计划资助项目
关键词 云存储 密钥推导 离散对数 密文检索 cloud storage key derivation discrete logarithm ciphertext retrieval
  • 相关文献

参考文献11

  • 1BENALOH J, CHASE M, HORVITZ E, et al. Pa- tient controlled encryption: ensuring privacy of elec- tronic medical records [C] // Proceedings of the 2009 ACM workshop on Cloud computing security. New York,USA: ACM, 2009: 103-114.
  • 2THOMPSON B, HABER S, HORNE W G, et al. Privacy-preserving computation and verification of ag- gregate queries on outsourced databases [C]//Pro- ceedings of the 9th International Symposium on Priva- cy Enhancing Technologies. New York, USA:ACM, 2009 : 185-201.
  • 3WANG Weichao, LI Zhiwei, OWENS R, et al. Se- cure and efficient access to outsourced data [C]//Pro- ceedings of the 2009 ACM Workshop on Cloud Com- puting Security. New York, USA: ACM, 2009:55- 66.
  • 4LIU Qin, WANG Guojun, WU Jie. An efficient priva cy preserving keyword search scheme in cloud computing[C] // Proceedings of the 2009 International Con ferenee on Computational Science and Engineering. New York, USA: ACM, 2009: 715-720.
  • 5BONECH D, CRESCENZO D G, OSTROVSKY R, et al. Public-key encryption with keyword search [C] //Proceedings of Eurocrypt 2004. Berlin, Germany: Springer, 2004: 506-522.
  • 6CHANG Yancheng, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data [EB/OL]. [2011-07-06]. http://eprint, iacr. org/ 2004/051. pdf.
  • 7OHTAKI Y. Partial disclosure of searchable encrypted data with support for Boolean queries [C] // Proceed- ings of the 2008 Third International Conference on Availability, Reliability and Security. New York, USA: ACM, 2008:1083-1090.
  • 8BELLOVIN S, CHESWICK W. Privacy-enhanced searches using encrypted bloom filters [EB/OL]. [2011-07-06]. http://citeseerx.ist. psu. edu/viewdoc/ download:jsessionid = FDCF3E4971210ETBF4E2BA-AD9939371C? doi = 10.1.1.58. 6899&rep = rep1&. type= pdf.
  • 9WONG W K, CHEUNG D W, KAO Ben, et al. Se cure kNN computation on encrypted databases[C]// Proceedings of the 35th SIGMOD International Confer ence on Management of Data. New York, USA: ACM, 2009: 189-152.
  • 10AGRAWAL R, KIEMAN J, SRIKANT R, et al. Order preserving eneryption for numeric data [C]//Pro ceedings of the 2004 ACM SIGMOD International Con ference on Management of Data. New York, USA ACM, 2004:563-574.

二级参考文献17

  • 1戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 2Haci gümüs Hakan,Iye Balar,Mehrotra Shared.Providing database as a service//Proceedings of the 18th International Conference on Data Engineering(ICDE 2002).San Jose,USA,2002:29-38.
  • 3Rivest R L,Adleman L M,Dertouzos M L.On data banks and privacy homomorphisms//DeMillo R A et al eds.Foundations of Secure Computation.New York:Academic Press,1978:169-178.
  • 4Agrawal R,Kirenan J,Srikant R,Xu Yirong.Order-preser-ving encryption for numeric data//Proceedings of the ACM SIGMOD Conference.Paris,France,2004:563-574.
  • 5Chung S S.Atni-tamper database research:Query encrypted databases[Ph.D.dissertation].USA:Case Western Reserve University,2002.
  • 6David G I,Wells D L,Kam J B.A database encryption system with subkeys.ACM Transactions on Database Systems,1981,6(2):312-328.
  • 7Ge Tingjian,Zdonik S.Fast,secure encryption for indexing in a column-oriented DBMS//Proceedings of the IEEE 23rd International Conference on Data Engineering(ICDE 2007).Istanbul,Turkey,2007:676-685.
  • 8Bouganim L,Pucheral P.Chip-secured data access:Confidential data on untrusted servers//Proceedings of the 28th International Conference on Very Large Databases(VLDB).Hong Kong,China,2002:131-142.
  • 9Hacigumus H,Lyer B,Li Chen,Mhrotra Sharad.Executing SQL over encrypted data in the database-server-provider model//Proceedings of the ACM SIGMOD.Madison,Wisconsin,USA 2002:216-227.
  • 10Hacigumus H,Lyer B,Li C,Mehrotra S.Efficient executing of aggregation queries over encrypted relational database//Proceedings of the Database Systems for Advanced Applications(DASFAA).Jeju Island,Korea,2004:125-136.

共引文献9

同被引文献111

  • 1林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 2沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:248
  • 3吴丽华,罗云锋,张宏斌.信息检索模型及相关性算法的研究[J].情报杂志,2006,25(12):25-27. 被引量:11
  • 4洪澄 张敏 冯登国.AB-ACCS一种云存储密文访问控制方法.计算机研究与发展,2010,47(1):259-265.
  • 5武永卫.清华云存储:从Corsair到MeePo.Hadoop2011云计算大会.北京.2011.
  • 6Yu S, Wang C, Ren K,et al. Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of IEEE INFOCOM' 10, San Diego, USA, 2010.
  • 7MooseFS. http://www.moosefs.org.
  • 8杨洋.存储层:动态数据、静态数据分而制之.中国计算机报.2008.09-22.
  • 9Wang G J, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud computing. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2010.
  • 10De Capitani di Vimercati S, Foresti S, Jajodia S, et al. Encryption- based policy enforcement for cloud storage. Proceedings of IEEE the 30th International Conference on Distributed Computing Systems Workshops, Genova, Italy, 2010:42-51.

引证文献12

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部