期刊文献+

云计算环境数据安全研究 被引量:3

Research on Data Security in Cloud Computing
下载PDF
导出
摘要 云计算是网格计算、分布式计算、效用计算等技术发展融合的产物,如今普及速度非常快。亚马逊、谷歌、微软等企业向用户提供了在云环境中开发应用和远程访问应用的功能。由于云环境的数据托管给服务商存储在远程服务器中,且应用数据通过互联网传输,数据存储和传输安全是一个重要的问题。在实现云计算之前,首先应该解决由此带来的安全问题。论文描述了云计算中数据安全相关的挑战,研究了对于数据安全不同层面的解决方案。 Cloud computing is the product of the integration of the technology development of grid computing, distributed computing, utility computing,and this trend is rapidly increasing. Amazon, Google, Microsoft and other enterprise have provided users with the function of the application and remote access in the cloud environment. As data in the cloud environment is stored in remote server, and the application of data is transmitted through the Internet,data storage and transmission security is an important issue. Before apply cloud computing, we should first address related security issues. This paper describes the chal enges of data security in cloud computing, and studies the solutions for different levels of data security.
出处 《信息安全与技术》 2015年第12期23-26,共4页
基金 2014年上海科委科技创新行动计划技术标准项目:云计算信息安全检测技术标准研究(No.14DZ0502600)
关键词 云计算 数据安全 属性基加密 代理重加密 cloud computing data security attribute-based encryption proxy re-encryption
  • 相关文献

参考文献9

  • 1Shucheng Yu,Cong Wang,Kui Ren,Wenjing Lou.Achieving Secure, Scalable,and Fine-grained Data Access Control in Cloud Computing. INFOCOM,2010Proceedings . 2010
  • 2KABOOZA.Global backup survey. http //www.kabooza.com/globalsurvey.html . 2009
  • 3Wang, Guojun,Liu, Qin,Wu, Jie.Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency Computation Practice and Experience . 2011
  • 4Kaitai Lianga,Man Ho Au.A secure and efficient CiphertextPolicy Attribute-Based Proxy Re-Encryption for cloud data sharing(OL)http://dx.doi.org/10.1016/j.future.2014.11.016 . 2014
  • 5Goyal V,Pandey O,Sahai A. et al.'Attribute-based encryption for fine-grained access control of encrypted data'. ACM Conference on Computer and CommunicationsSecurity . 2006
  • 6John Bethencourt,Amit Sahai,Brent Waters.Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy . 2007
  • 7BLAZE M,BLEUMER G,STRAUSS M.Divertible Protocols and Atomic Proxy Cryptography. Eurocrypt 1998 . 1998
  • 8Luis M. Vaquero,Luis Rodero-Merino,Juan Caceres,Maik Lindner.A break in the clouds[J]. ACM SIGCOMM Computer Communication Review . 2008 (1)
  • 9赵丽丽.代理重加密技术在云计算中的应用[J].信息安全与通信保密,2012,10(11):135-137. 被引量:7

二级参考文献12

共引文献10

同被引文献17

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部