期刊文献+

物联网环境下云数据存储安全及隐私保护策略研究 被引量:24

Cloud Data Storage Security and Privacy Protection Policies under IoT Environment
下载PDF
导出
摘要 物联网依托云计算强大的数据处理能力实现信息智能,而目前云计算对数据和服务的管理并不值得用户完全信赖。针对物联网环境下云数据安全性问题,在云计算中为了保证用户数据的准确性和隐私性,提出了一种物联网环境下云数据存储安全及隐私保护策略。实验结果表明该方案有效、灵活,且能抵御Byzantine失效、恶意修改数据甚至是服务器共谋攻击。 The Internet of Things implements information intelligence relying on the powerful data processing capability of cloud computing.However,it is not worthy of user trust that cloud computing manages data and services.According to cloud data security issues in the environment of the IoT,the cloud data storage security and privacy policies were raised,in order to ensure the accuracy and privacy of user data in the cloud.The experimental results show that the program is effective and flexible,and can resist the Byzantine failure,malicious modification of data,and even server collusion attack.
出处 《计算机科学》 CSCD 北大核心 2012年第5期62-65,90,共5页 Computer Science
基金 国家自然科学基金(60974086) 江苏省自然科学基金(BK2010132)资助
关键词 物联网 云计算 分布式数据库 隐私保护 IoT Cloud computing Distributed database Privacy protection
  • 相关文献

参考文献12

  • 1Bowers K D, J uels A, Oprea A. HAIL: A High-Availability and Integrity Layer for Cloud Storage[R]. 2008/489. Cryptology ePrint Archive, 2008. http://eprint. iacr. org/.
  • 2Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing[M]. April 2009.
  • 3Juels A, Burton J, Kaliski S. PORs: Proofs of Retrievability for Large Files[C]//Proc. of CCS '07. 2007 : 584-597.
  • 4Shacham H, Waters B. Compact Proofs of Retrievability[C]// Proc. of Asiacrypt '08. Dee. 2008.
  • 5Bowers K D,Juels A,Oprea A. Proofs of Retrievability:Theory and Implementation[R]. 2008/175. Cryptology ePrint Archive,2008. http://eprint. iacr. org/.
  • 6Ateniese G, Burns R,Curtmola R, et al. Provable Data Possession at Untrusted Stores[C]//Proc. Of CCS '07. 2007:598 609.
  • 7Ateniese G, Pietro R D, Mancini L V, et al. Scalable and Efficient Provable Data Possession[C]//Proc. of SecureComm'08. 2008:1-10.
  • 8Schwarz T S J, Miller E L. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage[C]// Proc. of ICDCS '06. 2006:12.
  • 9Lillibridge M, Elnikety S, Birrell A, et al. A Cooperative Internet Backup Scheme[C]//Proc. of the 2003 USENIX Annual Tech nical Conference(General Track). 2003:29 41.
  • 10Hendricks J, Ganger G, Reiter M. Verifying Distributed Era surecoded Data[C]//Proe. 26th ACM Symposium on Principles of Distributed Computing. 2007:139-146.

同被引文献191

引证文献24

二级引证文献169

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部