期刊文献+

云存储安全技术综述 被引量:7

Survey of secure cloud storage
下载PDF
导出
摘要 将云存储相关的安全技术问题归结为5类(用户需求3类,服务商需求2类),并结合最新学术研究成果逐一进行阐述。分析表明云存储安全技术涉及面广、风险高。相关技术发展至今,产生了一些很好的成果,但仍然有很多问题尚未解决,需要进一步深入研究。 Security challenges are classfied into 5 categories(3 for consumers, 2 for operators), and describe them based on the latest research results. Analysis shows that security technologies for cloud storage are related to various areas and there are high threats in this area. While some good results have been generated by researchers, there are still many problems to be solved.
出处 《电子技术应用》 北大核心 2013年第4期130-132,共3页 Application of Electronic Technique
基金 国家自然科学基金(61003216)
关键词 云计算 云存储 网络安全 Could computing cloud storage network security
  • 相关文献

参考文献10

  • 1MELL P, GRANCE T, NIST special publication 800-145: the NIST definition of cloud computing[S]. National Institute of Standards and Technology, 2011.
  • 2SION R. TUTORIAL: secure data outsourcing[C]. 13th International Conference on Management of Data(COMAD 2006), 2006.
  • 3FELDMAN A J, ZELLER W P, FREEDMAN M J, et al. SPORC: group collaboration using untrusted cloud resources[C]. Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI' 10), 2010.
  • 4GENTRY C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 41st annual ACM symposium on Symposium on theory of computing-STOC'09, 2009.
  • 5PERLMAN R. File system design with assured delete[C]. Network and distributed system security symposium proceedings (NDSS'07), 2007.
  • 6TANG Y, LEE P P C, LUI J C S, et al. FADE: secure overlay cloud storage with file assured deletion[C]. Security and Privacy in Communication Networks(SecureComm' 10),2010.
  • 7TSAI T, AMPORNPUNT N T, BAGCHI S. A study of soft error consequences in hard disk drives[C]. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 2012.
  • 8STEFANOV E, SHI E, SONG D. Towards practical oblivious RAM[C]. Network and Distributed System Security Symposium (NDSS'12), 2012.
  • 9HALEVI S, HARNIK D, PINKAS B, et al. Proofs of own-ership in remote storage Systems[C]. Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS' 11), 2011.
  • 10HAMILTON J, TREADWELL D. Resource consumption Shaping [EB/OL]. [ 2008 - 12-17 ]. http://www. perspectives. mvdirona, am/2008/12/17/ResourceConsumption shaping.aspx.

同被引文献37

  • 1张桂刚,李超,张勇,邢春晓.一种基于海量信息处理的云存储模型研究[J].计算机研究与发展,2012,49(S1):32-36. 被引量:23
  • 2SMITH D M. The cost of lost data[J]. Journal of Contemporary Business Practice, 2003,6(3): 113-119.
  • 3PATFERSON D, BROWN A, BROADWELL P, et al. Re covery oriented computing(ROC): motivation, definition, techniques, and case studies[R]. Computer Science Technical Report UCB/CSD-0201175, San Francisco: U.C. Berkeley, 2002:997-1013.
  • 4SANKARAN A, GUINN K, NGUYEN D. Volume shadow copy service[J]. Power, 2004,14(2):2272-2284.
  • 5SNIA. Continuous data protection-solving the problem of Recovery[EB/OL].(2008-08-08) [2014-02-22]. http://www snia. org / forums / dmf/knowledge / whi te_papers and_reports / CDP_Solving_recovery_20080808. pdf.
  • 6SNIA. D MF- Getting started_with_ILM - 20050415 [ E B / OL ]. (2005-04-15) [ 2014- 02- 22 ]. http ://www. snia. org/forums/ dmf/programs / ilmi / DMF - Getting_started_with_ILM - 20050415.pdf.
  • 7PIERNAS J, CORTES T,CARC'IA J, DualFS: a new journaling file system without meta-data duplication[C]. In Proceedings of the 16th International Conference on Super- computing. New York: ACM press, 2002:146-159.
  • 8KAVALANEKAR S, WORTHINGTON B, ZHANG Q, et al Characterization of storage workload traces from production Windows servers[C]. In IEEE International Symposium on Workload Characterization, IEEE press, 2008:671-686.
  • 9河海大学;淮安水利局.水利云平台关键技术研究与应用示范[M]淮安:淮安水利局,20133-100.
  • 10王祖印,邢德龙,王景波,王伟.基于Internet网络的水利工程自动化系统研究[J].海河水利,2008(1):58-61. 被引量:5

引证文献7

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部