期刊文献+

基于云计算的用户核心数据保护模型研究 被引量:9

A Users’ Core Data Protection Model Based on Cloud Computing
原文传递
导出
摘要 用户数据在公有云计算环境中的存储位置是用户无法有效控制的,这样就给用户数据的安全造成了较大的威胁.为了保护云计算中用户核心数据的安全,提出了采用混合云架构保护用户数据安全的思想,为此设计了基于云计算的用户核心数据保护模型,将用户的数据分解成核心数据和一般数据,核心数据将存储在用户可控的私有云中,一般数据经过过滤后存储在服务商的公有云中,有效地解决了用户核心数据的保护和安全问题.通过利用已有的网络安全产品,并结合所设计的数据分类算法,按模型构建了基于云计算的企业核心数据保护系统,经过实际使用验证了模型的有效性,为云计算中用户核心数据的保护探索了新的方法. Users aren't able to effectively obtain control of the storage position of their own data in the public cloud, which considerably threatens the security of users' data. In order to protect the users' core data in cloud com puting, we proposed that we could protect users; data with the hybrid cloud architecture, thus we designed the Users' Core Data Protection Model Based on Cloud Computing, UCDPMBCC. This model divides users' data into two parts, the core data and the general data. The core data would be stored in private cloud which users can control, while the general data would be stored in the public cloud from the service provider after being filtered. This effectively solves the protection and security problem of users' core data. By taking advantage of the existing internet security products, we constructed the Users' Core Data Protection Model Based on Cloud Computing according to the model together with the algorithm for data sorting designed by us. The effectiveness of the model has been testified with actual use and it explores a new approach to provide the users with the protection for their core data.
作者 王立伟
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2013年第2期165-170,共6页 Journal of Wuhan University:Natural Science Edition
基金 贵州省自然科学基金资助项目(黔科合J字LKS[2009]12号)
关键词 云计算 核心数据 安全模型 保护系统 cloud computing core data security model protection system
  • 相关文献

参考文献11

二级参考文献38

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2ARMBRUsT M,FOX A,GRIFFITH R,et al.Above the Clouds:A Berkeley View of Cloud Computing[R].Berkeley,CA,USA:University of California,2009.
  • 3Google docs-Online Documents.Spreadsheets,Present[EB/OL].[2009-07-29] http://docs.google.com.
  • 4Windows Azure Platform[EB/OL].[2009-07-12].http://www.microsoft.com/windowsazure/.
  • 5Amazon Elastic Compute Cloud[EB/OL].[2009-06-24].http://aws.amazon com/ec2.
  • 6SONG D,WAGNER D.PERRIG A.Practical Techniques for Searches on Encrypted Data[C] //Proceedings of the IEEE Symposium on Security and Privacy(S&P'00),May 14-17.2000.Berkeley,CA,USA.Piscataway,NJ,USA:IEEE.2000:44-55.
  • 7BONEH D,CRESCENZO G,OSTROVSKY R.et al.Public Key Encryptlon With Keyword Search[C] //Advances in Cryptology.Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT'04),May 2-6,2004,Interlaken.Switzeriand.LNCS 3027.Berlin,Germany:Springer-Verlag,2004:506-522.
  • 8PARK D,KIM K,LEE P.Public Key Encryption With Conjunctive Field Keyword Search[C] //Proceedings of the 2004 Workshop on Information Security Applications(WISA'04).Oct 29-31,2004,Wuhan,China.LNCS 3325.Berlin.Germany:Springer-Verlag,2004:73-86.
  • 9SWAMINATHAN A,MAO Y,SU G M,et al.Confidentiality-Preserving Rank-Ordered Search[C] //Proceedings of the 2007 ACM Workshop on Storage Security and Survivability(StorageSS'07),Oct 29,2007,Alexandria.VA.USA.New York.NY,USA:ACM.2007:7-12.
  • 10GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[C] //Proceedings of the 41 st Annual ACM Symposium on Theory of Computing(STOC'09).May 31-Jun 2,2009.Bethesda,MD.USA.New York,NY,USA:ACM.2009:169-178.

共引文献1118

同被引文献63

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2Kim, J. & Moon, J. .(2014), Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments [ EB/ OL]. International Journal of Distributed Sensor Networks, 2014 .(2014), [ 2014-5 -20 ]. http://www, hindawi, com/journals/ijdsn/ 2014/828092/.
  • 3StatCounter ( 2014 ). Platform Comparison [ DB/OL ]. Stat- Counter Global Stats. [ 2014-4-10 ]. http ://gs. statcounter, corn/# all- comparison-ww -monthly -201301-201401.
  • 4StatCounter. Top 5 Browsers from Apr 2013 to Apr 2014[DB/OL]. [2014-05-30].http ://gs.statcounter.com/.
  • 5微信公共平台开发者文档[DB/OL].[2014-04-28].http://mp.weixin.qq.com/wiki/index.php.
  • 6Babu L D, Krishna P V. Applying operations management mod- els for facility location problem in cloud computing environ- ments[J]. International Journal of Services and Operations Man- agement, 2013,15(1).
  • 7Feng Xu, Hongxu Ma. Deploying and researching Hadoop in virtual (ICAL). 2012 2012. machines. Automation and Logistics IEEE International Conference on. Aug,.
  • 8钱文静,邓仲华.云计算与信息资源共享管理[J].图书与情报,2011,14(21):147-152.
  • 9潘基鑫,雷要曾,程璐璐,石华.泛在学习理论研究综述[J].远程教育杂志,2010,28(2):93-98. 被引量:216
  • 10蔡盈芳.基于云计算的信息系统安全风险评估模型[J].中国管理信息化,2010,13(12):75-77. 被引量:28

引证文献9

二级引证文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部