期刊文献+

云环境下基于证据理论的多服务请求隐私保护 被引量:1

Privacy Protection for Multiple Service Requests Based on Evidence Theory in Cloud Environment
下载PDF
导出
摘要 目前云计算环境下的隐私安全研究多针对数据、用户身份及单服务请求隐私问题,对多服务请求因逻辑关联、时序披露等多维环境因素导致的隐私泄露问题缺乏完备解决方案。针对该问题,提出一种面向多云服务请求的隐私信息重要性度量方法,并基于D-S证据理论对该场景下的隐私泄漏风险进行评估,结合改进的噪声生成与混淆策略构建多云服务请求隐私保护框架。实验结果表明,在不明显增加系统开销的前提下,该方法能确保云计算环境下多服务请求的隐私安全。 Existed privacy security studies focus on privacy and security issues of data,user identity and single service request,and for the privacy leakage problem of multiple cloud service requests causing by multidimensional environment,such as factors logical association and timing series disclosures,there is no complete solution. For such problems,this paper proposes a method for measuring the importance of privacy information for multiple cloud service requests,then makes risk assessment based on D-S evidence theory for this scenario,and finally combines with the improved noise generation and obfuscation strategy to build an effective protection framework for the privacy of multiple cloud service requests. Experimental result shows that the proposed method can ensure the security of multiple cloud service requests without significantly increasing the overhead.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第3期165-171,176,共8页 Computer Engineering
基金 国家自然科学基金资助项目(61300036) 国家科技支撑计划基金资助项目(2013BAH38F01) 教育部青年骨干教师成长基金资助项目
关键词 云计算 隐私保护 多服务请求 风险评估 D-S理论 噪声混淆 cloud computing privacy protection multiple service requests risk assessment D-S theory noise obfuscation
  • 相关文献

参考文献15

  • 1Zhou Minqi,Zhang Rong, Xie Wei, et al. Security and Privacy in Cloud Computing.. A Survey ~ C ]// Proceedings of the 6th International Conference on Semantics Knowledge and Grid. Washington D. C., USA : IEEE Press ,2010 : 105-112.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 3Chen Deyan, Zhao Hong. Data Security and Privacy Protection Issues in Cloud Computing I C ]//Proceedings of 2012 International Conference on Computer Science and Electronics Engineering. Washington D. C. , USA: IEEE Press ,2012:647-651.
  • 4Sinha T, Srikanth V,Sain M, et al. Trends and Research Directions for Privacy Preserving Approaches on the Cloudl C]//Proceedings of the 6tb ACM India Computing Convention. New York, USA: ACM Press, 2013:21-32.
  • 5Ferreira B, Domingos H. Management and Search of Private Data on Storage Clouds [ C ]//Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management. New York, USA: ACM Press ,2012:4-7.
  • 6Itani W, Kayssi A, Chehab A. Privacy as a Service: Privacy-aware Data Storage and Processing in Cloud Computing Architecturesl Cl//Proceedings of Inter- national Conference on Dependable, Autonomic and Secure Computing. Washington D. C. , USA : IEEE Press, 2009:7l 1-716.
  • 7Khan S M, Hamlen K W. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing ~ C 1//Proceedings of the 11 th International Conference on Trust, Security and Privacy in Computing and Communications. Washington D. C. , USA: IEEE Press ,2012 : 170-176.
  • 8Takabi H. Privacy Aware Access Control for Data Sharing in Cloud Computing EnvironmentsI C]// Proceedings of the 2nd International Workshop on Security in Cloud Computing. Kyoto ,Japan : ~ s. n. I ,2014:27-34.
  • 9Bertino E, Paci F, Ferrini R, et al. Privacy-preserving Digital Identity Management for Cloud Computing ~ J ~. IEEE Data Engineering Bulletin,2009,32 ( 1 ) :21-27.
  • 10Zhang Gaofeng,Yang Yun, Yuan Dong, et al. A Trust- based Noise Injection Strategy for Privacy Protection in Cloud I J 1. Software: Practice and Experience, 2012, 42 ( 4 ) :431-445.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部