期刊文献+

面向云计算的同态加密隐私保护方法 被引量:11

A Method on Homomorphic Encryption Privacy-preserving for Cloud Computing
下载PDF
导出
摘要 数据安全和隐私保护是云计算面临的安全重大挑战,近年来国内外学者对云计算的安全和隐私保护问题进行了很多研究.同态加密技术可用于安全的云存储和云计算中,但是现有基于公钥密码体制的同态加密技术计算复杂度高,不适用于云计算中用户众多、计算量大且没有可信任云中心的情况.针对这一问题,对同态加密技术进行改进,利用椭圆曲线加密(ECC)算法安全性能好和计算复杂度低的优点,提出基于ECC的同态加密算法,并将该算法用于云存储密文处理和云计算数据聚合隐私保护.通过理论分析和实验数据证明,与现有技术相比,该方法在隐私保护性和计算性能等方面具有其优越性. A great security challenge to cloud computing is data security and privacy-preserving. In recent years, researchers at home and abroad have done much work on security and privacy-preserving of cloud computing. Homomorphic encryption can be used for se- cure cloud-store and cloud-computing. But current homomorphic encryption techniques based on public-key cryptography with high computing complexity are unsuitable for cloud-computing with a lot of cloud clients,large computing, and without a trustable center. According to this situation,this paper improves performance of homomorphic encryption by presenting ECC homomorphic encryption technique due to ECC's performance on better security and less computing-complexity. The paper uses the ECC homomorphic encryp- tion method for cipher-processing in cloud-store and privacy-preserving data aggregation in cloud computing. Based on theory analysis and experiment data, better privacy and computing performance can be achieved, compared to current methods.
出处 《小型微型计算机系统》 CSCD 北大核心 2015年第4期840-844,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金重点项目(71331003)资助 江苏省高校自然科学研究重点项目(10KJA510035)资助 南京市重大科技计划项目(201103003)资助 江苏省研究生创新工程项目(CXZZ11_0404)资助 江苏科技大学研究生教育教学改革研究与实践项目(YJG2012Y_09)资助
关键词 云计算 隐私保护 椭圆曲线加密 同态加密 cloud computing privacy preservation ECC homomorphic encryption
  • 相关文献

参考文献3

二级参考文献42

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2向广利,陈莘萌,马捷,张俊红.实数范围上的同态加密机制[J].计算机工程与应用,2005,41(20):12-14. 被引量:18
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1104

同被引文献70

引证文献11

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部