期刊文献+

基于云存储的数据安全保护关键技术研究 被引量:3

原文传递
导出
摘要 0引言 随着存储技术、虚拟化、分布式计算、云计算等网络技术及新概念的快速发展,通过网络提供一种可配置的、虚拟化的存储及数据服务方式,逐渐形成了人们研究的热点,即云存储。与传统的存储方式相比较而言,它能够将网络中不同类型的存储资源,通过分布式文件系统、分布式计算或网格计算等形式集合起来协同工作,从而提高现有硬件对数据的存储和处理能力。
出处 《网络安全技术与应用》 2015年第12期61-62,共2页 Network Security Technology & Application
  • 相关文献

参考文献6

二级参考文献147

  • 1张大朋,蔡克,张敏,徐震.云计算数据安全支撑平台架构研究[J].计算机研究与发展,2011,48(S3):261-267. 被引量:11
  • 2SONG D,WAGNER D,PERRIG A. Practical Techniques for Searches on Encrypted Data,Proceedings of the IEEE Symposium on Security and Privacy(S&P" 00), May 14 - 17,2000, Berkeley, CA, USA. Piscataway, N J, USA : IEEE, 2000 : 44 - 55.
  • 3BONEH D,CRESCENZO G,OSTROVSKY R,et al. Public Key Encryption With Keyword Search , Advances in Cryptology. - ceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 04), May 2- 6,2004, Interlaken,Switzerland. LNCS 3027. Berlin,Germany: Springer-Verlag,2004 : 506- 522.
  • 4PARK D,KIM K,LEE P. Public Key Eneryption With Conjunctive Field Keyword Search,Proceedings of the 2004 Workshop on Information Security Applications (WISA'04) ,Oct 29- 31,2004, Wuhan,China. LNCS 3325. Berlin,Germany: Springer-Verlag, 2004 : 73- 86.
  • 5SWAMINATHAN AoMAO Y, SU G M, et al. Confidentiality-Preserving Rank-Ordered Search , Proceedings of the 2007 ACM Workshop on Storage Security and Survivability (StorageSS 07), Oct 29,2007, Alexandria, VA, USA. New York, NY, USA: ACM, 2007:7-12.
  • 6Damiani E,et al. Key management for multi-user encrypted databases ,Proc of the 2005 ACM Workshop on Storage Security and Survivability. New York: ACM, 2005 : 74- 83.
  • 7Kallahalla M,Riedel E, Swaminathan R, et al. Plutus-scalable secure file sharing on untrusted storage , Proc of the 2nd USENIX Conf on File and Storage Technologies (FAST). Berkeley: USENIX, 2003 : 29- 42.
  • 8Goh E,Shacham H,Modadugu N,et al. SiRiUS:Securing remote untrusted storage,NDSS. San Diego:ISOC,2003:131- 145.
  • 9Tian X,Wang X,Zhou A. DSP RE-encryption:A flexible mechanism for access control enforcement management in DaaS, Proc of IEEE Int Conf on Cloud Computing. Washington:IEEE,2009:25-32.
  • 10Vimereati S D C,Foresti S,Jajodia S, et al. Over-encryption: Management of access control evolution on outsoureed data, Proc of VLDB 2007. 2007 : 123- 134.

共引文献156

同被引文献10

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部