期刊文献+

云存储中的用户数据安全 被引量:4

User Data Security in Cloud Storage Service
下载PDF
导出
摘要 详细分析了目前主流的云服务提供商各自的运行机制、关键技术、安全措施等,从中提取出云中安全需求。提出了一个结合属性加密、可回取证明、代理重加密等技术的云数据安全框架,从保密性、完整性、可用性三个方面保障了云端数据的安全,并由此实现了一个基于云存储服务的安全搜索引擎,使用细粒度的访问控制保证非授权的摘要、关键字等信息不会被泄露,同时仍保持较为高效的数据检索服务。 This paper analyzes the major cloud service providers' key technology and security mechanism to extract the security requirement of current popular cloud services. And based on this analysis, this paper proposes a security framework which integrates cryptography algorithms as attribute-based encryption (ABE), proof of retrievability and proxy re-encryption to ensure the confidentiality, integrity, availability of cloud data. Furthermore, this paper implements a prototype of cloud storage service based efficient search system which employs ABE for fine-grained access control to protect unauthorized users' access to sensitive file information (abstract, keywords) during search process and at the same time keeps the efficiency.
出处 《计算机科学与探索》 CSCD 2013年第12期1093-1103,共11页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金~~
关键词 安全搜索引擎 云存储 属性加密(ABE) 代理重加密 可回取证明 secure search engine cloud storage service attribute-based encryption (ABE) proxy re-encryption proof of retrievability
  • 相关文献

参考文献15

  • 1Wu Zhuhua. Key technology of cloud computing[M]. Bei- jing: Posts and Telecom Press, 2011: 17.
  • 2Amazon. Amazon Web services: overview of security pro- cess. 2011.
  • 3Windows Azure. Creating a shared access signature[EB/OL]. [2012-10]. http://msdn.microsoft.com/en-us/library/windowsa- zure/hh508996.aspx.
  • 4Jennings R. Cloud computing with the Windows Azure plat- form[M].Wang Xin, Ding Bin. Beijing: Tsinghua University Press, 2011: 25.
  • 5BackupTechonology. GMail dala loss affects 150,000 users[EB/OL]. (2011-02) [2012-10]. http://www.backup-technology.com/5844/ gmail-data-loss-affects- 15000-users/.
  • 6Jones C. Hotmail email access issue now resolved[EB/OL]. (2011-01)[2012-10]. http://blogs.windows.com/windowslive/ b/windowslive/archive/2011/01/03/hotmail-email-access-issue- now-resolved.aspx.
  • 7Aislyn Greene. Amazon: some data lost in cloud outage is not recoverable[EB/OL]. (2011-04) [2012-10]. http://www. bizjoumals.com/seattle/blog/techflash/2011/04/Amazon-says- some-data-lost-in-cloud.html?page=all.
  • 8Drop box forums on data loss[EB/OL]. [2012-10]. http:// forums.dropbox.com/tags.php?tag=data-loss.
  • 9Brodkin J. Data movement from Amazon to rival clouds hits speed bump[EB/OL]. (2012-03)[2012-10]. http://arstech-nica.com/business/2012/03/moving-data-into-amazons-cloud- is-easygetting-it-out-not-so-much/.
  • 10Browers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation[C]//Proceedings of the 2009 ACM Work- shop on Cloud Computing Security (CCSW '09). New York, NY, USA: ACM, 2009: 43-54.

同被引文献88

  • 1新华网.云计算从概念走向应用至2015年收人将突破1800亿美元[EB/OL].(2013-12-20)[2014-10-05].http;//news,xinhuanet.com/info/2013-12/20/c_132982365.htm.
  • 2中国工业和信息化部.云计算安全问题及对策[EB/OL].[2014-10-05].http://www.miit.gov.cn/n11293472/n11293832/n15214847/n15218234/15475208.
  • 3新华网.大数据和云计算使的个人隐私四面楚歌[EB/OL].(2013-11-20)[2014-10-05].http://news,xinhuanet.com/info/2013-11/20/c_132902969.htm.
  • 4Columbus L.IDG cloud computing survey:security,integration challenge growth[EB/OL].(2013-08-13)[2014-10-05].http://www.forbcs.com/site.s/louiscolumbus/2013/08/13/idg-cloud-computing-survcy-security-integration-challenge-growth/.
  • 5中文国际.摩根大通数据泄露影响8300 万客户[EB/OL].(2014-10-03)[2014-10-05].http:/ / www.chinadaily.com.cn/hqgj/jryw/2014-10-03/content_12481331.html.
  • 6互动百科.隐私[EB/OL].[2014-10-05],www.baike.com/wiki/隐私.
  • 7Liu F,Tong J,Mao J,et al.NIST cloud computing reference architecture[J].NIST Special Publication,2011,500:292.
  • 8ZDNct.Enterprise cloud outlook:inevitably hybrid,surprisingly agile and(eventually)cheap[EB/OL].(2014-04-03)[2014-10-05].http://www.zdnet.com/enterprise-cloud-outlook-inevitably-hybrid-surprisingly-agile-and-eventually-cheap-7000028032/.
  • 9IBM.IBM hybrid cloud solution[EB/OL].[2014-10-05].http://www-01.ibm.com/software/tivoli/products/hybrid-cloud/.
  • 10Zhang K H,Zhou X Y,Chen Y Y,et al.Sedic:privacy-aware data intensive computing on hybrid clouds[C]//CCS.Proceedings of the 18th ACM conference on computer and communications security.New York:ACM,2011:515-526.

引证文献4

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部