期刊文献+

基于可信计算机制的云计算盲数据处理 被引量:1

Blind data processing in cloud computing based on trusted computing mechanisms
原文传递
导出
摘要 针对云计算环境下数据处理时敏感数据易受非授权访问和非法篡改的问题,提出一种基于可信计算机制的盲数据处理方法。首先利用可信平台模块在云计算环境中建立可信根,确保敏感数据与云计算系统状态相绑定;然后构建盲数据处理环境,通过可信平台模块加密云间传输的信息,进行系统完整性度量和远程验证;最后采用椭圆曲线加密算法完成从源端到目标端的数据迁移。分析结果表明该方法可以为云计算数据处理提供安全的执行环境。 Aimed at solving the problem that sensitive data was subjected to unauthorized access and illegal tampering during data processing in cloud computing environment, a new approach called blind data processing based on trusted computing mechanisms was proposed. First, the root of trust in cloud computing environment was established by using trusted platform module(TPM) to ensure that the sensitive data was bound to a particular state of a cloud computing system. Then, the blind data processing environment was constructed. The messages transmitted over the cloud were encrypted by using TPM. The system integrity was measured and the remote attestation was carried out. Data migration from the source to the target side was completed by using elliptic curve cryptographic algorithms. The analysis showed that the secure execution environment for data processing in cloud computing was provided by the proposed approach.
作者 季涛 李永忠
出处 《山东大学学报(工学版)》 CAS 北大核心 2012年第5期30-34,共5页 Journal of Shandong University(Engineering Science)
基金 江苏省高校自然科学基金资助项目(05KJD52006) 江苏省研究生培养创新工程资助项目(CXZZ12-0722) 江苏科技大学科研资助项目(2005DX006J) 江苏科技大学研究生科技创新计划项目
关键词 云计算 可信计算 可信平台模块 完整性度量 盲数据处理 cloud computing trusted computing trusted platform module integrity measurement blind data processing
  • 相关文献

参考文献20

  • 1陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1312
  • 2孟祥旭,刘士军,武蕾,潘丽.云制造模式与支撑技术[J].山东大学学报(工学版),2011,41(5):13-20. 被引量:31
  • 3LIN Dan, SQUICCIARINI A. Data protection models for service provisioning in the cloud[ C]// Proceedings of the 15th ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2010: 183-192.
  • 4WANG Weichao, LI Zhiwei, OWENS R, et al. Secure and efficient access to outsourced data[C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM Press, 2009:55-66.
  • 5KAUFMAN L M. Data security in the world of cloud computing[J]. IEEE Security and Privacy, 2099, 7(4) :61-64.
  • 6陈丹伟,黄秀丽,任勋益.云计算及安全分析[J].计算机技术与发展,2010,20(2):99-102. 被引量:88
  • 7FRANCISCO R, SALVADOR A, MIGUEL C. The final frontier: confidentiality and privacy in the cloud [ J]. Computer, 2011, 44(9):44-50.
  • 8MIRANDA M, SIANI P. A client-based privacy manager for cloud computing [C]//Proceedings of the Fourth International ICST Conference on Communication System Soft- ware and Middleware. New York: ACM Press, 2009 : 1-8.
  • 9AHMAD-REZA S, THOMAS S, MARCEL W. Token- based cloud computing : secure outsourcing of data and arbitrary computations with lower latency [C]//Proceedings of the 3rd International Conference on Trust and Trustworthy Computing. Berlin : Springer-Verlag Press, 2010 : 417-429.
  • 10SIANI P, SHEN Y, MIRANDA M. A privacy manager for cloud computing [C]// Proceedings of the 1 st International Conference on Cloud Computing. Berlin: Springer-Verlag Press, 2009: 90-106.

二级参考文献68

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218.

共引文献1429

同被引文献13

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部