期刊文献+

面向云存储的高性能数据隐私保护方法 被引量:17

High-performance Data Privacy Protection for Cloud
下载PDF
导出
摘要 随着云计算和云存储技术的飞速发展,越来越多的企业和个人使用云存储来保存数据或备份数据.但用户将私有数据上传到云端的同时,也丧失了对数据的绝对控制权,用户数据的隐私保护问题成为云存储发展不得不解决的问题.为了解决这一问题,提出一种新的针对云存储的数据隐私保护方法BSBC(Bit Split Bit Combine),它在上传前,将数据按照比特位进行拆分,重新组装后形成多个数据文件,再分别上传到云存储服务器;下载时,先将所有数据文件下载,然后通过位合并再恢复成原始文件.实验证明这种方法可以保护用户数据的隐私,同时可比传统加解密获得17~35倍的性能提升.然后将核心的位拆分、位合并代码模块用汇编语言进行优化,对汇编语言进行指令调度优化,以减少数据冲突和流水线停顿.最终,采用BSBC方法比传统加解密可以获得25~35倍的性能提升. With the rapid development of technology of cloud computing and cloud storage,more and more businesses and individuals use cloud storage to store data or backup data.When uploading private data to the cloud,the user will lose the absolute control of the data,them data privacy protection becomes a problem that cloud storage has to solve.In order to solve this problem,BSBC (Bit Split Bit Combine),a new data privacy protection method was presented.Before uploading the data,BSBC splits the data according to bit and re-assembled to form a number of data files,then uploads the data to cloud storage servers; when downloading the data,BSBC downloads all the data files,then through the hit combination,revert them to the original file.Experiments show that this method can protect the privacy of users' data,obtain 17~35 times performance improvement compared with traditional encryption.Then assembly language is used is used to optimize the core codes of bit split and bit combination,and instruction scheduling optimization of assembly language to reduce the data conflict and pipeline stalls.Eventually,compared with traditional encryption,BSBC can get 25 ~35 thmes performance improvement.
出处 《计算机科学》 CSCD 北大核心 2014年第5期137-142,共6页 Computer Science
基金 北京市教育委员会科技计划面上项目(KM201110772014) 北京市优秀人才培养资助项目(2012D005007000009) 北京市属高等学校创新团队建设与教师职业发展计划项目(IDHT20130519)资助
关键词 云存储 数据安全 隐私保护 指令调度优化 Cloud storage Data security Privacy protection Instruction scheduling optimization
  • 相关文献

参考文献16

  • 1Cloud storage[EB/OL].http://en.wikipedia.org/wiki/Cloud_stroage,2012-5-10.
  • 2傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145. 被引量:175
  • 3Cloud computing[EB/OL].http://en.wikipedia.org/wiki/Cloud_computing,2012-5-10.
  • 4Twinstrara[EB/OL].http://twinstrara.com,2012-05-10.
  • 5侯清铧,武永卫,郑纬民,杨广文.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7):1146-1154. 被引量:40
  • 6Amazon simple storage service[EB/OL].http://aws.amazon.com/s3,2012-05-10.
  • 7Using Data Encryption[EB/OL].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html,2006-3-1.
  • 8Shraer A,Cachin C,Cidon A,et al.Venus:Verification for untrusted cloud storage[C]//Proc of the 2010 ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:19-30.
  • 9iCloud:iCloud安全性与隐私政策概览[EB/OL].http://sup-port.apple.com com/kb/HT4865? viewlocale=zh_CN&locale=zh_CN,2013-2-11.
  • 10Alani D M M.DES96-Improved DES Security[C]//2010 7th International Multi-Conference on Systems Signals and Devices(SSD).Amman,2010:1-4.

二级参考文献13

  • 1Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43.
  • 2Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html.
  • 3Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html.
  • 4Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177.
  • 5Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 6Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192.
  • 7Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192.
  • 8Lie David, Thekkath Chandramohan, Mitchell Mark, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Syslems. New York: ACM, 2000:168-177.
  • 9Dwoskin Jeffrey S, Lee Ruby B. Hardware rooted trust for secure key management and transient trust [C] //Proe of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:389-400.
  • 10Lee Ruby B, Kwan Peter C S, McGregor John P, et al. Architecture for protecting critical secrets in microprocessors [C] //Proc of the 32nd Int Syrup on Computer Architecture. Washington: IEEE, 2005:2-13.

共引文献204

同被引文献177

引证文献17

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部