期刊文献+

基于物联网的云数据存储访问和隐私保护机制研究 被引量:6

ON MECHANISM OF CLOUD DATA STORAGE ACCESS AND PRIVACY PROTECTION BASED ON INTERNET OF THINGS
下载PDF
导出
摘要 针对物联网环境下云数据的可信存储、用户隐私信息的可靠保护和访问控制的有效性等问题,提出基于物联网的云数据存储访问与隐私保护机制。在该机制中,首先对云数据库中的数据信息进行基于关系模式的最小属性分解,针对单独属性或属性子集对象进行动态交换加密,生成满足隐私约束规则的最小粒度的密钥,然后针对用户隐私信息从预处理和在线查询两个方面进行保护,当用户进行数据信息访问时,依据授权进行密钥获取,并依据解密算法进行明文解析,当用户授权被撤销时,依据数据库代理服务器更新算法进行信息更新。实验证明,该机制具有良好的执行效率,当资源规模较大时,该访问机制更具有优势。 In light of the issues of trustable storage of cloud data and the effectiveness of reliable protection and access control of users privacy information in environment of Internet of Things, we propose an Internet of Things-based mechanism for cloud data storage access and privacy protection. In this mechanism, first the minimum attribute decomposition is applied based on relationship model to the data information in cloud data database, the dynamic exchange is performed on single attribute or attributes subset objects for encryption to generate the key with minimum grain size and meeting the privacy constraint rules, and then, the protection is implemented for user privacy information from two aspects of pretreatment and online query, when the user access the data information, they ask the key acquisition according to the authorisation, and parse the plaintext according to decryption algorithm ; if users authorisation has been revoked, then the information will be updated according to the update algorithm of proxy server of database. Experimental results prove that the mechanism has good implementation efficiency, when the resources are in large scale, this mechanism are in more advantage.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第9期319-322,共4页 Computer Applications and Software
关键词 物联网 云数据 隐私保护 动态加密 授权 lntemet of Things Cloud data Privacy protection Dynamic encryption Authorisation
  • 相关文献

参考文献20

二级参考文献103

  • 1尚晋,徐江峰,黄小粟.基于B/S结构的数据库加密研究[J].计算机科学,2005,32(8):80-82. 被引量:5
  • 2杨梅娟,尹德春.CRC算法的研究[J].计算机与数字工程,2006,34(2):30-31. 被引量:9
  • 3朱青,王珊,丁博麟,张孝,蔡宏艳,姚佳丽.基于数据网格面向服务的查询算法[J].计算机学报,2006,29(7):1234-1240. 被引量:8
  • 4戴一奇,尚杰,苏中民.密文数据库的快速检索[J].清华大学学报(自然科学版),1997,37(4):24-27. 被引量:21
  • 5www. rsa. com/rsalabs/aes/.
  • 6Kalisi B S Jr,Yin Y L On. The Security of RC5 Encryption Algorithm [ J]. RSA Laboratories Technical Report. 1998,9 ( 11 ) : 10 - 12.
  • 7Han J,Kamber M.Data Mining:Concepts and Techniques.2nd Edition.San Francisco:Morgan Kaufmann Publishers,2006.
  • 8Machanavajjhala A,Gehrke J,Kifer D,Venlita-Subramaniam M.1-diversity:Privacy beyond k-anonymity//Proceedings of the 22nd International Conference on Data Engineering(ICDE).Atlanta,Georgia,USA,2006:24-35.
  • 9Li N,Li T.t-closeness:Privacy beyond k-anonymity and l-diversity//Proceedings of the 23rd International Conference on Data Engineering (ICDE).Istan Buttom-up k-anonymity,Turkey,2007:106-115.
  • 10Sweeney L.Achieving k-anonymity privacy protection using generalization and suppression.International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):571-588.

共引文献203

同被引文献58

  • 1周承毅,何大可.一种基于无线传输的数据加密存储系统[J].信息安全与通信保密,2006,28(11):94-96. 被引量:4
  • 2李万领,杨锁昌,周伟,武建辉.基于LXI总线的网络化自动测试系统方案设计[J].国外电子测量技术,2006,25(11):35-37. 被引量:14
  • 3尹洪涛,黄灿杰,付平,宋洪武.LXI标准概述[J].国外电子测量技术,2007,26(5):15-18. 被引量:6
  • 4张毅刚.计算机自动测试[M].哈尔滨:哈尔滨工业大学出版社,2005.
  • 5LXI.Consortium.LXI Standard v1.0[EB/OL].[2015-09-15].www.lxistandard.org.
  • 6Madoff L. ProMED-mail:an early warning system for emerging diseases( J ]. Clinical Infectious Diseases,2004,39 ( 2 ) : 227 -232.
  • 7Yachin D. 2009 M&A overview: cloud computing [ R ]. [ s. l. ] : International Data Corporation ,2010.
  • 8Vaquero L M, Rodero-Merino L, Caceres J, et al. A break in the clouds:towards a cloud definition[ J ]. A CM SIGCOMM Computer Communication Review ,2009,39 (1) :50-55.
  • 9Arutyunov V V. Cloud computing: its history of development, modem state, and future considerations [ J ]. Scientific and Technical Information Processing, 2012,39 ( 3 ) : 173- 178.
  • 10齐同斌,李勇,张瑞生.LXI总线特点及其在自动测试系统中的应用研究[J].黑龙江科技信息,2008(5):39-40. 被引量:2

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部