期刊文献+

云计算数据安全问题 被引量:1

下载PDF
导出
摘要 随着云计算的快速发展和推广应用,在云计算环境中数据安全成为云计算研究中的关键问题,本文对云计算数据安全问题进行了讨论。 With the rapid development of cloud computing and application, the data security in cloud computing environment become the key problem in the study of the cloud computing, security issues are discussed in this paper, the cloud data.
出处 《电子世界》 2014年第2期8-9,共2页 Electronics World
基金 西安文理学院大学生创新计划项目
关键词 云计算 数据安全 云存储 cloud computing data security Cloud Storage
  • 相关文献

参考文献4

二级参考文献22

  • 1王鹏.云计算的关键技术与应用实例[M].北京:人民邮电出版社,2009.
  • 2SONG D,WAGNER D,PERRIG A. Practical Techniques for Searches on Encrypted Data,Proceedings of the IEEE Symposium on Security and Privacy(S&P" 00), May 14 - 17,2000, Berkeley, CA, USA. Piscataway, N J, USA : IEEE, 2000 : 44 - 55.
  • 3BONEH D,CRESCENZO G,OSTROVSKY R,et al. Public Key Encryption With Keyword Search , Advances in Cryptology. - ceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 04), May 2- 6,2004, Interlaken,Switzerland. LNCS 3027. Berlin,Germany: Springer-Verlag,2004 : 506- 522.
  • 4PARK D,KIM K,LEE P. Public Key Eneryption With Conjunctive Field Keyword Search,Proceedings of the 2004 Workshop on Information Security Applications (WISA'04) ,Oct 29- 31,2004, Wuhan,China. LNCS 3325. Berlin,Germany: Springer-Verlag, 2004 : 73- 86.
  • 5SWAMINATHAN AoMAO Y, SU G M, et al. Confidentiality-Preserving Rank-Ordered Search , Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS 07), Oct 29,2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007:7-12.
  • 6Damiani E,et al. Key management for multi-user encrypted databases ,Proc of the 2005 ACM Workshop on Storage Security and Survivability. New York: ACM, 2005 : 74- 83.
  • 7Kallahalla M,Riedel E, Swaminathan R, et al. Plutus-scalable secure file sharing on untrusted storage , Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST). Berkeley: USENIX, 2003 : 29- 42.
  • 8Goh E,Shacham H,Modadugu N,et al. SiRiUS:Securing remote untrusted storage,NDSS. San Diego:ISOC,2003:131- 145.
  • 9Tian X,Wang X,Zhou A. DSP RE-encryption:A flexible mechanism for access control enforcement management in DaaS, Proc of IEEE Int Conf on Cloud Computing. Washington:IEEE,2009:25-32.
  • 10Vimereati S D C,Foresti S,Jajodia S, et al. Over-encryption: Management of access control evolution on outsoureed data, Proc of VLDB 2007. 2007 : 123- 134.

共引文献49

同被引文献9

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部