期刊文献+

云存储安全增强系统的设计与实现 被引量:19

The Design and Implementation of the Cloud Storage Based Security Enhancement System
下载PDF
导出
摘要 云存储是一种新型的网络存储形式,并逐步为大家所接受,企业和个人用户都开始使用云存储作为其网络存储媒介。目前很多著名的IT企业都推出了云存储服务,其中Amazon公司推出的Simple Storage Service(S3)就是商用云存储服务的典型代表。随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题。文章基于Amazon S3的云存储服务,设计并实现了一款云存储安全增强系统,对用户上传至Amazon S3的数据进行加密保护,使得文件以密文形式存储于Amazon S3,可以有效防止数据在传输和存储过程中的泄漏;同时系统还对从S3下载的文件进行完整性校验,检测其内容与上传时是否一致,以防止文件被篡改;最后,系统还提供了多用户访问控制支持,多个用户可以共享同一个S3账号,同时保证各自存储的内容互相隔离,禁止一个用户非授权访问其他用户存储的文件。 The cloud storage is a novel kind of network storage and is becoming more and more popular, Large quantities of enterprises and individual users adopt the cloud storage as their network storage mediums. So far, there are kinds of cloud storage service afforded by the famous IT enterprises, such as Simple Storage Service (S3), which is provided by Amazon. As the widespread use, the security issues of the cloud storage catch the eyes of researchers, such as data leakage and data tampering. In this paper, we proposed and implemented a security enhancement system, which is based on Amazon S3. The system is to protect users' data through encrypting the plain texts before uploading them to Amazon S3, and when users want to download the texts, the system downloads and checks the integrity of the uploaded texts before decrypting and saving them on local file system. On this wise, we are capable of ensuring the data security while transmitting and storing, and guaranteeing the data integrity. What's more, we proposed the fine-grained access control mechanism to achieve that many users are able to utilize the same Amazon S3 account while preserving the effective isolation of their files, and to prevent the unauthorized access to the uploaded files effectively,
出处 《信息网络安全》 2012年第3期38-41,共4页 Netinfo Security
关键词 云存储 加解密 完整性校验 访问控制 cloud storage encipher and decipher integrity check access control
  • 相关文献

参考文献8

  • 1尚涛.CIFS协议的分析与实现[D].上海:上海交通大学论文库,2001.
  • 2陈丹伟,黄秀丽,任勋益.云计算及安全分析[J].计算机技术与发展,2010,20(2):99-102. 被引量:88
  • 3AnthonyJones JimOhlund著 杨合庆译.Windows网络编程[M].北京:清华大学出版社,2002..
  • 4SNIA CIFS Technical Work Group. Common Internet File System (CIFS) Technical Reference Revision: 1.0 [C].2002.
  • 5Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman. Secure Overlay Cloud Storage with File Assured DeletionlJ]. Computer Science and Engineering ,2010.
  • 6Amazon Simple Storage Service (S3),[DB/OL].http://aws.amazon. com/s3/,2012/2/21.
  • 7王雷,荆继武,向继.基于CIFS协议的存储加密代理设计与实现[C].第二十四次全国计算机安全学术交流会,2009.
  • 8王雷,向继,荆继武,高能,张令臣.基于NFS协议的存储加密代理设计与实现[J].信息网络安全,2011(9):194-196. 被引量:1

二级参考文献18

  • 1STEELC,NAGAPPANR,LAIR.安全模式[M].陈秋萍,罗邓,袁国忠,译.北京:机械工业出版社,2006.
  • 2Foster I,Zhao Yong. Cloud Computing and Grid Computing 360 - Degree Compared[M]//2008 Grid Computing Environments Workshop, IEEE. Austin, Texas: [s. n. ] ,2008.
  • 3Aymerich F M, Fenu G, Sureis S. An Approach to a Cloud Computing Network[ C]//2008 First International Conference on Applications of Digital Information and Web Technologies, IEEE. Czech Republic: Technical University of Ostrava, 2008: 113-118.
  • 4Youseff L,Butrico M,Silva D D. Toward a Unified Ontology of Cloud Computing [ M ]//2008 Grid Computing Environments Workshop, IEEK. Austin, Texas: [ s. n. ] ,2008.
  • 5Johnston W, Metzger J,O'Connor M,et al. Network Communication as a Service- Oriented Capability[ M]//High Performance Computing and Grids in Action. [ s. l. ] : IOS Press, 2008:1 - 35.
  • 6Hanemann A,Boote J W,Boyd E L,et al. Perfsonar: A service - oriented architecture for multi - domain network monitoring [M]//ICSOC, ser. Lecture Notes in Computer Science, B. B. et al. [s. l. ]:Springer, 2005:241-254.
  • 7Hofstader J. Communications as a Service[ EB/OL]. 2007 - 11. http://msdn. microsoft. com/en - us/library/bb896003. aspx.
  • 8Koh Y,Knauerhase R C,Brett P,et al. An analysis of performance interference effects in virtual environments [ C]//ISPASS. [s.l. ] : IEEE Computer Society, 2007:200 - 209.
  • 9Buyya R, Yeo C S, Venugopal S. Market - Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C]//Proc. of 10th IEEE Conference on HIKe' 08, IEEE. Dalian, China: [s. n. ] ,2008:5 - 13.
  • 10IBM, Microsoft. Security in a Web Services World: A Proposed Architecture and Roadmap[ EB/OL]. 2002 - 04 - 07. http://msdn2. microsoft.com/en - us/library/ms977312. aspx.

共引文献91

同被引文献112

  • 1闵晓勇,雷玉勇.网络技术在煤矿安全监测监控中的应用[J].矿山机械,2005,33(4):71-72. 被引量:31
  • 2李龙.网络秩序的特质与构建[J].法制与社会,2008(26). 被引量:2
  • 3陈龙,王国胤.计算机取证技术综述[J].重庆邮电学院学报(自然科学版),2005,17(6):736-741. 被引量:48
  • 4刘志强.煤矿安全监测监控系统解决方案[J].山西科技,2007(1):155-156. 被引量:9
  • 5寇晓蕤,王清贤.网络安全协议:原理、结构与应用[M].北京:高等教育出版社,2009.
  • 6IPSecVPN技术规范[K].国家密码管理局,2008-01-08.
  • 7Luis Martin Garcia. Programming with Libpcap - Snifiqng the Network From Our Own Application[J]. Hakin9,2008, ( 2 ) :38-46.
  • 8周志洪,蒋兴浩,李建华,等.基于流的IPSecVPN协议深度检测方法[P].中国,200810038552.
  • 9昊荣焕,周锋.基于Libpcap的高速率数据包捕获与解析[EB/OL]中国科技论文在线,2012-09-21.
  • 10Damien Rame. How to fix L2TP/IPSec PSK VPN connection on Android ICS 4.0.x[EB/OL].http://www.vircom.com/security/how-to- fix-12tpipsec-psk-vpn-connection-on-android-ics-4-0-x/, 2012- 10-12.

引证文献19

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部