期刊文献+

云存储安全网关关键技术研究

Research on the Key Technologies of Cloud Storage Security Gateway
原文传递
导出
摘要 云存储安全网关能够提供安全、高效的数据存储备份服务,克服传统存储备份服务的不足。阐述了云存储网关的研究现状。总结了现有云存储网关研究相关的一些关键技术,其中包括多租户下的数据隔离和隐私保护,访问性能优化和重复数据删除技术,数据访问管理技术和透明加密技术。最后,总结全文并指出云存储网关未来的研究方向。 The cloud storage security gateway can provide a secure,efficient data storage backup service,and overcome the lack of traditional storage backup service.This study expounds the current status of the cloud storage gateway.We summarize the key research technologies of the cloud storage gateway,such as data isolation and privacy protection,access performance optimization and data deduplication techniques,data access management techniques and transparent encryption technology.Finally,we conclude the paper and point out the further study of the cloud storage gateway.
出处 《网络安全技术与应用》 2013年第7期64-66,共3页 Network Security Technology & Application
基金 广东省自然科学基金资助项目(S2012040007746) 东莞理工学院博士科研启动基金项目(ZJ130604) 国家自然科学基金资助项目(61170216)
关键词 云计算 云存储 安全网关 数据备份 Cloud computing Cloud storage Security gateway Data backup
  • 相关文献

参考文献24

  • 1Q. Shen, X. Yang, X. Yu, et al. Towards Data Isolation & Collaboration in Storage Cloud [C]. In Proceeding of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011, pp. 139-146.
  • 2V. Padhye, A. Tripathi. Scalable Transaction Management with Snapshot Isolation on Cloud Data Management Systems [C]. In Proceeding of the 5th International Conference on Cloud Computing, 2012, pp. 542-549.
  • 3黄汝维,桂小林,余思,庄威.云环境中支持隐私保护的可计算加密方法[J].计算机学报,2011,34(12):2391-2402. 被引量:61
  • 4Vivacy preserving approach to policy-based content dissemination [C]. In Proceedings of the 2010 IEEE 26th International Conference on Data Engineering, 2010, pp. 944-955.
  • 5S. Sakr, A. Liu, D.M. Batista, et al. A Survey of Large Scale Data Management Approaches in Cloud Environments[J]. IEEE Communications Surveys & Tutorials, 2011, 13(3): 311-336.
  • 6Z. Lu, J. Wu, W. Fu. A Novel Cloud-Oriented WS-Management-Based Resource Management Model [C]. In Proceeding of the 2010 IEEE International Conference on Web Services, 2010, pp. 676-667.
  • 7Y. Sun, Z. Xiao, D. Bao, et al. An architecture model of management and monitoring on Cloud services resources [C]. In Proceeding of the 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 3207-3211.
  • 8I. Xu, B. Sun, C. Si. The survey of cache management in the shared storage environment [C]. In Proceeding of the 2012 International Conference For Internet Technology And.Secured Transactions, 2012, pp. 139-142.
  • 9J. Park, J. Lee, E. Namgung, et al. A cache management scheme to support offline environment in cloud system [C]. In Proceeding of the 4th International Conference on Cloud Computing Technology and Science, 2012, pp. 387-392.
  • 10敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119

二级参考文献60

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献178

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部