期刊文献+

代理重加密技术在云计算中的应用 被引量:7

Application of Proxy Re-encryption in Cloud Computing
原文传递
导出
摘要 云计算中的数据机密性风险极大地阻碍了云计算的应用,而在用户端加密的模式对于数据共享来说非常不便,用户频繁的获取和释放授权将使得用户端数据加解密工作繁重。代理重加密技术在云端进行数据的密文转换,减轻了用户端的负担,同时加强了云端数据的保密性。文中研究了云计算中代理重加密的应用模式,并简要描述了在云计算中使用代理重加密实现数据共享、授权管理、访问控制等安全机制的方法,能够提高云计算的安全性。 The data protection risks in cloud computing severely hinders the application of cloud computing greatly,while the encryption mode by the client is quite inconvenient to the data sharing,and the frequent acquisition and release of authorization make the client' s encryption work more heavy. The proxy re-encryption transforms cipher text in the cloud,thus reducing the burden of the client and increasing the security of the data in the cloud. This paper discusses the application mode of proxy re-encryption in cloud computing,and describes how to use the proxy re-encryption for realizing data sharing,authorization management and access control in cloud computing. And these would improve the cloud computing security.
作者 赵丽丽
出处 《信息安全与通信保密》 2012年第11期135-137,共3页 Information Security and Communications Privacy
关键词 云计算 云存储 代理重加密 cloud computing cloud storage proxy re-encryption
  • 相关文献

参考文献12

二级参考文献65

  • 1王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 2王鹏.云计算的关键技术与应用实例[M].北京:人民邮电出版社,2009.
  • 3Lampson B W.Protection[A].Proc.of The 5th Princeton Symposium on Information Science and Systems[C].Princeton,New Jersey,USA,March,1971.437-443.
  • 4Denning P J.Protection-principles and practice[A].Proc.of the Spring Joint Computer Conference[C].Montvale,New York,1972.40.
  • 5Harrison M A,et al.Protection in operation system[J].Communications of the ACM,1976,19(8):14-24.
  • 6Denning D E.Database Security[M].Annual Review Inc,1988.
  • 7Costich O,et al.A multilevel transaction problem for multilevel secure database systems and its solution for replicated architecture[A].Proc.of IEEE Computer Society Symposium on Research in Security and Privacy[C].Oakland,CA,1992.192-203.
  • 8Denning D E,et al.A multilevel relational data model[A].Proceedings of the First International Workshop on Object-Oriented Database Systems[C].Pacific Grove,1986.
  • 9Dwyer P A,et al.Multilevel security in database management systems[J].Computers and Security,1987,6(3):252-260.
  • 10Harrington A,et al.Cryptographic access control in a distributed file system[A].Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies[C].Como,Italy,2003.158-165.

共引文献184

同被引文献36

  • 1郭平,但光祥.云计算中的混合加密算法[J].吉林大学学报(工学版),2012,42(S1):327-331. 被引量:5
  • 2杜立健,唐晓燕,李守荣.几种信息加密算法的比较研究[J].网络安全技术与应用,2006(8):88-89. 被引量:10
  • 3张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 4GENSF. IT Cloud Service User Survey, pt. 2: Top Benefits & Challenges. IDC exchange [ EB/OL] ( 2008 - 10 - 02 ). http:// blogs, idc. corn/e/9 p =210.
  • 5乔纳森.卡茨,耶胡达.林德尔.现代密码学原理与协议[M].北京:国防工业出版社,2011.
  • 6Craig Gentry. Fully Homomorphic Encryption Using Ideal Lattices [ C]. STOC' 09, Bethesda, Mmyland, USA : ACM, 2009 : 169 - 178.
  • 7GIUSEPPE ATENIESE, KEVIN FU, MATFHEW GREEN, et al. Improved Proxy Re - Encryption Schemes With Applications to Se- cure Distributed Storage [ J ]. ACM Transactions on Information and System Security,2006,9( 1 ) :1 -30.
  • 8Luis M. Vaquero,Luis Rodero-Merino,Juan Caceres,Maik Lindner.A break in the clouds[J]. ACM SIGCOMM Computer Communication Review . 2008 (1)
  • 9BLAZE M,BLEUMER G,STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography. Eurocrypt 1998 . 1998
  • 10Shucheng Yu,Cong Wang,Kui Ren,Wenjing Lou.Achieving Secure, Scalable,and Fine-grained Data Access Control in Cloud Computing. INFOCOM,2010Proceedings . 2010

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部