期刊文献+

一种基于云存储的数据安全与隐私保护系统 被引量:6

A data security and privacy protection system based on cloud storage
下载PDF
导出
摘要 针对现有数据存储和云存储的安全性和数据隐私问题,提出了一种连接企业内应用和公有云存储平台的私有云存储模型。它通过将本地私有数据备份到公有云存储平台来实现数据保护,并在传输前通过加密来保障私有数据的隐私性,从而解决了企业数据存储中的安全备份和隐私保护问题。设计并实现了原型系统,通过一系列实验,结果表明该系统可在隐私保护的前提下提供数据备份保护,并通过实验数据分析影响系统性能的因素,提出优化方案。 An efficient private cloud storage model connecting between the interior enterprise applications and public cloud storage platform is proposed which is designed for data security and privacy protection problem in data storage area. The data security is achieved through backup from the local private data to public cloud storage and privacy protection is achieved through encryption before data transmission. The prototype system is designed and implemented, and some experimental results show it can protect data security and privacy. The result data are also analyzed and some methods to improve the performance are put forward.
出处 《北京信息科技大学学报(自然科学版)》 2013年第2期87-90,96,共5页 Journal of Beijing Information Science and Technology University
基金 北京市教育委员会科技计划面上项目(KM201110772014) 北京信息科技大学网络文化与数字传播北京市重点实验室开放课题
关键词 数据存储 数据安全 隐私保护 云存储 data storage data security privacy protection cloud storage
  • 相关文献

参考文献8

  • 1梁彪,曹宇佶,秦中元,张群芳.云计算下的数据存储安全可证明性综述[J].计算机应用研究,2012,29(7):2416-2421. 被引量:26
  • 2Junseok Oh, Young Bae Yoon, Jong Ryeol Suh. The difference of awareness between public instituti-ons and private enterprises for cloud computing security [ J ]. In International Journal of Secur-ity and Its Applications. 2012,6 ( 3 ) : 1 -10.
  • 3Michael Vrable, Stefan Savage, Geoffrey M Voelker. Bluesky:A cloud-backed file system for the enterprise [ C ] //10th USENIX Conference on File and Storage Technologies ( FAST' 12 ). California: ACM SIGOPS,2012:248 - 252.
  • 4Pletka R, AdNovum Inf AG, Zurich. Mass storage systems and technologies [ C ]///24^th IEEE Conforence. Mexico : ICTA1,2007:24 - 27.
  • 5Amazon Web Services. Amazon simple storage service [ EB/OL ]. ( 2012-08-13 ) [ 2012-10- 10 ] , http ://-aws. amazon, com/s3/.
  • 6王睿,杨欣宇.两种常用加密算法的研究[J].齐齐哈尔大学学报(自然科学版),2006,22(1):62-64. 被引量:1
  • 7A Bessani, M Correia, B Quaresma, et al. DepSky: dependable and secure storage in a cloud-of-clouds [ C ] J//EuroSys' 11 Proceedings of the sixth conference on Computer system. New Yourk, NY, USA : ACM,2011:31 - 46.
  • 8Vrable M, Savage S, Voelker G M. Cumulus : Filesystem Backup to the Cloud [ C ] //J Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST). Austin: USENIX ,2009 : 192 - 195.

二级参考文献21

  • 1钟向群.黑客大曝光[M].北京:清华大学出版社,2002
  • 2程秉辉.黑客人物实战[M].北京:希望电子出版社.2002
  • 3MELL P,GRANCE T. The NIST difinition of cloud computing[S].Gaithersburg,MD:NIST Special Publication,2011.
  • 4WANG Cong,REN Kui,LOU Wen-jing. Toward publicly auditable seeu(e)e cloud data storage (services)[J].IEEE/ACM Transactions on Networking,2010,(04):19-24.
  • 5Amazon.com. Amazon S3 availability event[EB/OL].http://status.aws.amazon.com/s3-20080720.html,2008.
  • 6ARRINGTON M. Gmail disaster:reports of mass email deletions[EB/OL].http://www.(techcrunch).com/2006/12/28/gmail-disaster-reports-of-mass-email-deletions/,2006.
  • 7KRIGSMAN M. Apple' s mobileme experiences post-launch pain[EB/OL].http://blogs.zdnet.com/projectfailures/? p =908,2008.
  • 8JUELS A,Jr KALISKI B S. PORs:proofs of retrievability for large files[A].New York:acm Press,2007.584-597.
  • 9ATENIESE G,BURNS R,CURTMOLA R. Provable data possession st untrusted stores[A].New York:acm Press,2007.598-609.
  • 10CURTMOLA R,KHAN O,BURNS R. MR-PDP:Multiple-replica provable data possession[A].Washington,DC:IEEE Computer Society,2008.411-420.

共引文献25

同被引文献33

引证文献6

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部