期刊文献+

电子数据安全自毁研究 被引量:1

Survey on Secure Self-destructing for Electronic Data
下载PDF
导出
摘要 阐述了密钥集中管理的数据安全删除、密钥分散管理的数据安全删除和数据定时发布兼自毁等三方面的研究进展,围绕数据自毁、细粒度访问控制、抵抗攻击能力等因素,分析了相关的各种技术方法的优势和不足,并探讨未来的研究方向。 The paper overviewed the research progress in three aspects such as the data secure deletion of key centralized management, key dispersion management and timed-release with data self-destruction. Then it analyzed the advantages and disadvantages of various technical methods according to the factors of data self destruction, fine-grained access control, resistance to attack ability. At last, it also gave some direction for the future research.
出处 《莆田学院学报》 2015年第2期30-34,共5页 Journal of putian University
基金 国家自然科学基金资助项目(61370078 61402109)
关键词 云计算 安全删除 数据自毁 定时发布 访问控制 基于属性加密 cloud computing secure deletion self-destructing timed-release access control attribute-based encryption
  • 相关文献

参考文献35

  • 1Pspper C, Basin D, Capkun S, et al. Keeping data secret under full compromise using porter devices [C]// Proceedings of the 26th Annual Computer Security Applications Conference. New York: ACM Press, 2010: 241-250.
  • 2Joukov N, Papaxenopoulos H, Zadok E. Secure deletion myths, issues, and solutions [C]// Proceedings of the 2 nd ACM Workshop on Security in Storage and Survivability. New York: ACM Press, 2006: 61-66.
  • 3Swanson S, Wei M. SAFE: Fast, verifiable sanitization for SSDs, UCSD[R]. San Diego: University of California, 2010.
  • 4Garfinkel S, Shelat. A Remembrance of data passed: A study of disk sanitization practices[J]. IEEE Security & Privacy, 2003, 1(1): 17-27.
  • 5Wei M, Grupp L M, Spada F M, et al. Reliably erasing data from flash-based solid state drives[C]//Proceedings of the USENIX Conference on File and Storage Technologies. Berkeley: USENIX Association, 2011 : 105-117.
  • 6Diesburg S M, Wang A I. A survey of confidential data storage and deletion methods[J]. ACM Computing Surveys, 2010, 43(1): 1-37.
  • 7Reardon J, Ritzdorf H, Basin D, et al. Secure data deletion from persistent media[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York: ACM Press, 2013: 271-284.
  • 8Reardon J, Basin D, Capkun S. Sok: Secure data deletion [C]//Proc of the 34th Syrup on Security and Privacy. Piscataway: IEEE Computer Society Press, 2013: 1-15.
  • 9Perlman R. File system design with assured delete[C] //Proc of the 3rd International Security in Storage Workshop. Piscataway: IEEE Computer Society Press, 2005 : 83-88.
  • 10Perlman R. File system design with assured delete[C] //Proceedings of the 14th Annual Conference on Network & Distributed System Security. Piscataway: IEEE Computer Society Press, 2007 : 1-7.

二级参考文献111

  • 1ZHANG Hong,HE YePing,SHI ZhiGuo.A formal model for access control with supporting spatial context[J].Science in China(Series F),2007,50(3):419-439. 被引量:7
  • 2武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 3Arrnbrust M, Fox A, Griffith R, et al. Abovc the elouds: A berkeley view of cloud eompuling, UCB/EECS 2009 28 [R]. Berkeley: University of California, EECS Department, 2009.
  • 4Chow R, Golle P, Jakobsson M, et al. Controlling data in the cloud: Outsourcing computation without oulsourcing control [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:85-90.
  • 5Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:199-212.
  • 6Amazon Inc. Amazon Web services cuslomer agreement [EB/OL]. [2009-10-01]. http://aws, amazon. corn/agreement/# 7.
  • 7Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity grid security from two levels of virtualization [J]. Information Security Technical Report, 2007, 12(3): 123-138.
  • 8Cben X, Oarfinkel T, Lewis E, et al. Overshadow: A virtualization based approach to retrofitting protection in commodity operating systems [C] //Proc of the lath lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 9Yang J, Shin K. Using hypervisor to provide data secrecy for user applications on a per-page basis [C] //Proc of the 4th ACM SIGPLAN/SIGOPS lnt Conf on Virtual Execution Environments. New York: ACM, 2008:71-80.
  • 10Chen Haibo, Zhang Fengzhe, Chen Cheng, et al. Tamper- resistant execution in an untrusted operating system using a virtual maehine monitor, 2007-08001 [R]. Shanghai: Fudan University, Parallel Processing Institute, 2007.

共引文献119

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部