期刊文献+

基于第三方可信云的安全协同工作方案

A Secure Collaborative Work Scheme on the Basis of the Third Party Credible Cloud
下载PDF
导出
摘要 随着各种私有云或公有云的普及应用,云计算的安全问题成了热点。在其他学者对于云计算安全研究的基础上,探讨了目前自由云计算环境下的主要安全风险,构建一个基于第三方可信云的安全协调工作方案,并对其结构和原理进行了具体的分析。第三方可信云包括身份认证、密钥发布和数据传输、监控管理三个主要模块,该方案有利于各种云实体安全协同工作且可行性高。 With a variety of private cloud or public cloud universal applications, security issues of cloud computing have become a hot spot. On the basis of other scholars research of cloud security, this paper discusses major security risks in free cloud computing environments nowadays, constructs a secure collaborative work scheme on the basis of the third party credible cloud, and analyzes its detailed structure and principles. The third credible cloud includes three main modules: authentication, key distribution and data transmission, and monitoring management. The scheme conduces to a variety of cloud entities security and is of high feasibility.
作者 潘定 陈婷婷
机构地区 暨南大学
出处 《电子科技大学学报(社科版)》 2014年第6期42-45,56,共5页 Journal of University of Electronic Science and Technology of China(Social Sciences Edition)
基金 国家自然科学基金资助项目(71171097)
关键词 云安全 第三方可信云 IDaas 密钥分配中心 cloud security the third party credible cloud IDaaS key distribution center
  • 相关文献

参考文献11

  • 1TAKABI H, JOSHI J, AHN G. Secure cloud towards acomprehensive security [A]. International Computer Softwareand Applications Conference, 2010: 393-398.
  • 2PRASHANT S,SATYAM S. An architecture based onproactive model for security in cloud computing[A]. RecentTrends in Information Technology (ICRTIT) InternationalConference, 2011:661 - 666.
  • 3FRANK J. Buiding turst into utility cloud computing[D]. Washington: University of Maryland. 2010.
  • 4LI J X,HUAI J P, HU C M, ZHU Y M. A securecollaboration service for dynamic virtual organizations [J].Information Sciences: an International Journal, 2010,180(17):3086-3107.
  • 5ZISSIS D, LEKKAS D. Addressing cloud computingsecurity issuesfJ]. Future generation computer systems-theinternational journal of grid computing and escience. 2012,28(3): 583-592.
  • 6CATTEDDU D. Cloud Computing: Benefit, risks andrecommendations for information security [J]. Web ApplicationSecurity, 2010(72): 17-18.
  • 7冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1063
  • 8VAQUERO L, RODERO M,MORAN D. Locking thesky a survey on IaaS cloud security [J]. Computing, 2011, 91(1):93-118.
  • 9SERAFINI L,TAMILIN A. DRAGO: DistributedReasoning Architecture for the Semantic Web[C]. LNCS3532.Proc of 2nd European Semantic Web Conf. Berlin:Springer-verlag, 2005: 361-376.
  • 10FOSTER I’ ZHAO Y,RAICU I. Cloud Computing andGrid Computing 360-Degree Compared[C]. 2008 GridComputing Environments Workshop (GCE): Austin, Texas:November 16. Curran: IEEE, Feb 2009.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1062

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部