期刊文献+

基于隐私云的自毁邮件保护系统设计与实现 被引量:1

Design of self-destructing E-mail based on privacy cloud
下载PDF
导出
摘要 随着云计算的发展,云数据安全越来越受到企业等云服务用户的关注。过时、归档的云端数据有泄漏风险,传统加密方案不能全面地满足隐私保护的需求。近年来电子邮件泄密事件频发,电子邮件的数据安全,尤其是企业邮件安全是云数据安全中最为突出的问题之一。文中提出的基于隐私云的数据自毁方法能够实现云数据过期后自动销毁,并基于该方法实现了自毁邮件保护系统,通过测试原型系统,可以实现邮件到期自毁,保护用户隐私不被泄漏。 Cloud data security is gaining more and more attention from enterprise and users and E-mail security may be the most highlighted. Past and archived cloud data is under risk of compromising privacy. Traditional cryptology method cannot meet the security demand in privacy protection. This article proposes a self-destructing data method to realize the self-destruction of cloud data,and uses it to implement a self-destructing email system.
出处 《信息技术》 2016年第5期63-67,77,共6页 Information Technology
基金 江苏省自然科学基金(SBK201221017)
关键词 数据自毁 云数据 隐私 电子邮件 self-destruction cloud data privacy E-mail
  • 相关文献

参考文献9

  • 1Geambasu R,Kohno T,Levy A,et al.Vanish:Increasing data privacy with self-destructing data[C]∥Proceedings of the 18th USENIX Security Symposium.Montreal,Canada,2009:299-315.
  • 2Wang G,Yue F,Liu Q.A secure self-destructing scheme for electronic data[J].Journal of Computerand System Sciences,2013,79(2):279-290.
  • 3王丽娜,任正伟,余荣威,韩凤,董永峰.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272. 被引量:39
  • 4Wolchok S,Hofmann O S,Heninger N,et al.Defeating vanish with low-cost sybil attacks against large DHTs[C]∥Proceedings of the17th Annual Network&Distributed System Security Conference.San Diego,USA,2010:1-15.
  • 5Zeng L,Shi Z,Xu S,et al.Safe Vanish:An improved data self-destruction for protecting data privacy[C]∥Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science.Athens,Greece,2010:52-521.
  • 6Cloud Security Alliance:Security Guidance for Critical Areas of Focus in Cloud Computing V2.1[EB/OL].http:∥www.cloudsecurityalliance.org/guidance/csaguide-cn.v2.1.pdf.
  • 7傅晓,王志坚,等.一种基于网络的数据自毁方法[P].中国专利:CN102571949A,2012-07-11.
  • 8NIST.Advanced encryption standard(AES)[S].Federal Information Processing Standards Publication 197,2001-11-26.
  • 9Klensin J.RFC 2821:Simple Mail Transfer Protocol[S].AT&T Laboratories,Apr.,2001.

二级参考文献16

  • 1武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 2Fengshun Yue,Guojun Wang,Qin Liu.A secure self-destructing scheme for electronic data[A].Proc of EUC 2010[C].New York:IEEE Press,2010.651-658.
  • 3Lingfang Zeng,Zhan Shi,Shengjie Xu,et al.Safevanish:An improved data self-destruction for protecting data privacy[A].Proc of CloudCom 2010[C].New York:IEEE Press,2010.521-528.
  • 4Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 5Weichao Wang,Zhiwei Li,Rodney Owens,et al.Secure and efficient access to outsourced data[A].Proc of CCSW'09[C].New York:ACM Press,2009.55-65.
  • 6J.Falkner,M.Piatek,J John,et al.Profiling a million user DHT[A].Proc of the 7th ACM SIGCOMM conference on Internet measurement[C].New York:ACM Press,2007.129-134.
  • 7Y Xie,F Yu,K Achan,et al.How dynamic are IP addresses?[A].Proc of SIGCOMM'07[C].New York:ACM Press,2007.301-312.
  • 8Vanish.[EB/OL].http://vanish.cs.washington.edu/,2011-07-29/2011-07-29.
  • 9Farla L A De, Boodta J F C, Trasatti S. Physic- chemical and electrochemical characterization of Ru-based ternary oxides containg Ti and Ce [J]. Electrochem Acta, 1992, 37(13): 2511-2518.
  • 10Silava L A Da, Alves V A, Trasatti S,et al.Surface and electrocatalytic properties of ternary oxides Ir0.3Ti (0.7-x)PtxO2:Oxygen evolution from acidic solution [J]. Journal of Electroanlytical Chememistry,1997, 427:97-104.

共引文献38

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部