期刊文献+

基于GID的车联网数据安全方案

Data Security Scheme of IOV Based on GID
下载PDF
导出
摘要 车联网在"端-管-云"三层架构的基础上,提供丰富的智能交通综合服务。然而,将数据放置在云端处理和存储,加大了数据被非法用户窃取的风险。为此,提出了基于网络基因GID(Gene IDentification)的车联网数据安全方案。利用GID标示数据上传者和云中可被外界访问的数据,保证数据在上传和存储在云中时的唯一性。进行数据访问时,通过比较待访问数据的网络基因与预先提取的可访问数据的基因是否一致,如果一致,则允许数据流出云端,供用户使用。经过分析和仿真表明,基于GID的车联网数据安全方案在保证数据安全性的同时,可以减少云端存储空间的浪费,增大数据上传的速率。 As a specific application of IOT( Internet Of Things),IOV( Internet Of Vehicle) based on " terminal- pipe- cloud" three-tier system,provides a wealth of intelligent transportation integrated services. However,the data placed in the cloud processing can increase the risk that the illegal user data can steal the secrets. For this,a cloud data security scheme of IOV based on network GID( Gene IDentification) is put forward. Using GID to label data uploaded by data owners and cloud data accessed by the outside world can ensure the uniqueness of the data at the time of uploading and storing in the cloud. When data users want to access data,they can access and use the data only when the gene of data to be accessed is consistent with the pre- extracted gene of data which can be accessed. Analysis and simulation showthat the cloud data security scheme of IOV based on network GID not only ensures data security but also reduces the waste of cloud storage space,while increasing the data upload speeds.
出处 《计算机技术与发展》 2016年第4期101-104,131,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(61302100 61471203 61201162) 中国博士后研究基金(2013M531391) 教育部博士点基金(20133223120002) 江苏省基础研究计划-重点研究专项基金(BK2011027 BK2012434) 江苏省博士后研究基金(1202083C)
关键词 车联网 云存储 数据安全 网络基因 IOV cloud storage data security network gene
  • 相关文献

参考文献11

  • 1王建强,吴辰文,李晓军.车联网架构与关键技术研究[J].微计算机信息,2011,27(4):156-158. 被引量:126
  • 2王建强,李世威,曾俊伟.车联网发展模式探析[J].计算机技术与发展,2011,21(12):235-238. 被引量:38
  • 3常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126. 被引量:191
  • 4刘南杰.崛起中的车联网[J].营赢,201l,(11):18-23.
  • 5Cisco. Cisco ironport data loss prevention[ EB/OL]. 2013. http://www, irenport, com/kr/technology/irenport_dlp_overview. html.
  • 6Mydlp. Web-based data leakage prevention[ EB/OL]. 2014. http ://www. mydlp, com/.
  • 7Hao F, Kodialam M, Lakshman T V, et al. Protecting cloud data using dynamic inline fingerprint checks [ C ]//Proc of INFOCOM. Turin: IEEE,2013 : 2877 -2885.
  • 8王志文,王强.云计算敏感数据防泄露技术研究[J].信息安全与通信保密,2013,11(8):85-87. 被引量:10
  • 9Puttaswamy K, Sala R, Zhao B Y, et al. Starclique : guaranteeing user privacy in social networks against intersection attacks [ C]//Proc of CoNEXT. [s. 1. ] :Is. n. ] ,2009.
  • 10Puttaswamy K, Marshall C, Subramanian V R, et al. Docx2go: collaborative editing of fidelity reduced documents on mobile devices[ C]//Proc of MobiSys. [ s. 1. ]: [ s. n. ] ,2010.

二级参考文献86

共引文献351

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部