期刊文献+

利用挑战-响应实现云计算安全的XML查询

Implementation of Secure XML Query in Cloud Computing by Using Challenge-response
下载PDF
导出
摘要 在云计算数据服务的基础上,对云计算中XML数据的完整性和完备性以及挑战-响应安全协议作了简要介绍,针对云平台中的安全的XML查询,提出了利用挑战-响应协议在云计算平台中实现安全的XML数据查询,在云计算平台中建立安全的XML数据查询系统架构,并分析安全的XML数据查询过程,实现安全的XML数据查询,保证查询返回结果的完整性和完备性。 This paper introduces briefly cloud computing XML data integrity and completeness, as well as challenges-response to the security agreement on the basis of cloud computing data services. To XML queries for security in the cloud platform,the challenge- response protocol is used to realize secure XML data query in the cloud computing platform. The secure XML data query system architecture is established in cloud computing platform, and the security of XML data query process is analyzed so as to achieve a secure XML data query and ensure the integrity of the query result integrity and completeness.
出处 《无线电通信技术》 2012年第4期70-73,共4页 Radio Communications Technology
基金 上海市教育委员会科研创新项目(12YZ0951) 上海高校选拔培养优秀青年教师科研专项基金(SLG10006)
关键词 云计算 XML 数据完整性和完备性 挑战-响应协议 cloud computing XML data integrity and data completeness challenge -response protocol
  • 相关文献

参考文献7

  • 1HACIG)MOSH, MEHROTRA S, IYER B. Providing Database as a Service[ C]// Proc. of the Int'| Conf. on Data Engineering. Washington: ]EEE Computer Society Press ,2002:29 - 38.
  • 2田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:62
  • 3MYKLETUN E, NARASIMHA M, TSUDIK G. Authentication and Integrity in Outsourced Databases [J].ACM Trans. on Storage, 2006,2(2) :107-138.
  • 4SION R. Query Execution Assurance Foroutsourced Database [C] // Proc. of the 31st InConf. On Very Large Data Bases. New York: ACM Press, 2005:601 - 602.
  • 5朱青,赵桐,王珊.面向查询服务的数据据隐私保护算法[J].计算机科报,2010,33(8):1316—1323.
  • 6童云海,陶有东,唐世渭,杨冬青.隐私保护数据发布中身份保持的匿名方法[J].软件学报,2010,21(4):771-781. 被引量:45
  • 7LU Jing, PENG Dun-lu, HUO Huan. Analyzing Triggers in XML Data Integration Systems [ J ]. International Journal of Digital Content Technology and its Applications, 2010, 4 ( 5 ) : 38 - 45.

二级参考文献67

  • 1Machanavajjhala A,Gehrke J,Kifer D.l-Diversity:Privacy beyond K-anonymity.In:Liu L,Reuter A,Whang KY,Zhang J,eds.Proc.of the 22nd Int'l Conf.on Data Engineering.Atlanta:IEEE Computer Society,2006.24-35.
  • 2Wong RC,Li J,Fu AW,Wang K.(a,k)-Anonymity:An enhanced K-anonymity model for privacy-preserving data publishing.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.New York:ACM Press,2006.754-759.
  • 3Li N,Li T,Venkatasubramanian S.t-Closeness:Privacy beyond k-anonymity and l-diversity.In:Dogac A,Ozsu T,Sellis T,eds.Proc.of the 23rd Int'l Conf.on Data Engineering.Istanbul:IEEE Computer Society,2007.106-115.
  • 4Xiao X,Tao Y.Personalized privacy protecting.In:Chaudhuri S,Hristidis V,Polyzotis N,eds.Proc.of the Int'l Conf.on Management of Data.Chicago:ACM Press,2006.229-240.
  • 5Fung BCM,Wang K,Yu PS.Top-Down specialization for information and privacy preservation.In:Aberer K,Franklin M,Nishio S,eds.Proc.of the 21st Int'l Conf.on Data Engineering.Tokyo:IEEE Computer Society,2005.205-216.
  • 6LeFevre K,DeWitt DJ,Ramakrishnan R.Incognito:Efficient full-domain K-anonymity.In:Ozcan F,ed.Proc.Of the Int'l Conf.On Management of Data.Maryland:ACM Press,2005.49-60.
  • 7Aggarwal G,Feder T,Kenthapadi K,Motwani R,Panigrahy R,Thomas D,Zhu A.Anonymizing tables.In:Eiter T,Libkin L,eds.Proc.of the 10th Int'l Conf.on Database Theory.Edinburgh:Springer-Verlag,2005.246-258.
  • 8Wang K,Fung BCM.Anonymizing sequential releases.In:Eliassi-Rad T,Ungar LH,Craven M,Gunopulos D,eds.Proc.of the 12th Int'l Conf.on Knowledge Discovery and Data Mining.Philadelphia:ACM Press,2006.414-423.
  • 9Xiao X,Tao Y.Anatomy:Simple and effective privacy preservation.In:Dayal U,Whang KY,Lomet DB,Alonso G,Lohman GM,Kersten ML,Cha SK,Kim YK,eds.Proc.of the 32nd Int'l Conf.on Very Large Data Bases.Seoul:VLDB Endowment,2006.139-150.
  • 10UCI Machine Learning Repository.http://archive.ics.uci.edu/ml/datasets/Adult.

共引文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部