期刊文献+

云计算环境下的安全 被引量:4

Security in cloud computing
下载PDF
导出
摘要 云计算给人们的工作生活带来了不可比拟的便利,然而安全问题是其优势进一步发挥的最大障碍。文章对云计算的特点进行了分析,从云计算的三层架构和内容层次对安全问题进行了深入讨论,着重探讨了可搜索公钥加密和外包数据完整性验证的研究现状以及存在的问题。 Cloud computing facilitates people's working and daily life with unparalleled advantages; however, security is an important issue that cloud computing should face on its way to become even more successful. This paper Features of cloud computing is analyzed in this paper. Security problems from the three layers and the contents are studied respectively with focuses on the current research and exist problems of searchable publickey encryption and outsourced data integrity verification.
出处 《西安邮电大学学报》 2015年第4期1-9,共9页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金资助项目(61272436) 保密通信重点实验室基金资助项目(9140C110206140C11050) 中国科学院信息工程研究所信息安全国家重点实验室开放课题资助项目(2015-MS-10)
关键词 云计算安全 可搜索公钥加密 数据完整性验证 security in cloud computing, searchable public key encryption, data integrity verification
  • 相关文献

参考文献70

  • 1Mell P,Grance T.The NIST definition of cloud computing[S/OL].(2011-10-25)[2015-01-20].http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
  • 2Sasikala P.Research challenges and potential green technological applications in cloud computing[J].International Journal of Cloud Computing,2013,2(1):1-19.
  • 3Sidhu J S S.Security in Computing and Communications[M].Springer Berlin Heidelberg,2014.
  • 4An M,Lee H.Design of the integrated logistics information system based on cloud computing[J].Lecture Notes on Software Engineering,2015,3(1):31-34.
  • 5Furuncu E,Sogukpinar I·.Scalable risk assessment method for cloud computing using game theory[J].Computer Standards&Interfaces,2015(38):44-50.
  • 6Armbrust M,Fox A,Grifftth R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
  • 7O’driscoll A,Daugelaite J,Sleator R D.‘Big data’,hadoop and cloud computing in genomics[J].Journal of Biomedical Informatics,2013,46(5):774-781.
  • 8Manvi S S,Shyam G K.Resource management for infrastructure as a service(IaaS)in cloud computing:a survey[J].Journal of Network and Computer Applications,2013(41):424-440.
  • 9Mauch V,Kunze M,Hillenbrand M.High performance cloud computing[J].Future Generation Computer Systems,2013,29(6):1408-1416.
  • 10Miao S,Li Z,Qu W,et al.Progressive transmission based on wavelet used in mobile visual search[J].International Journal of Embedded Systems,2014,6(2/3):114-123.

二级参考文献47

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献62

同被引文献19

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部