期刊文献+

一种支持隐私保护的加密方法在云存储中的应用 被引量:5

A support privacy encryption method in the application of the cloud storage
下载PDF
导出
摘要 随着云存储技术的快速发展,云存储的数据安全性成了一个最为关键的问题。加密是一种对数据进行保护的有效方法。为了提高云存储环境中对客户隐私的保护,本文设计研究了一种支持隐私保护的云存储加密方法 CESVMC。通过对矩阵和向量进行加、减、乘、除运算,完成对云存储数据和客户信息的保密工作。最后经过安全分析和对其性能进行评测,证明CESVMC加密技术具有较高的安全性能,以及合理的运算复杂度,满足日常云存储的工作需要。 With the rapid development of cloud storage technology, cloud storage data security has become a key problem. Encryption is an effective method for protection of data. In order to improve the cloud storage environment, the protection of customer privacy, this article design research a kind of support CESVMC privacy cloud storage encryption method. Based on the matrix and vector add, subtract, multiply, divide, complete the cloud storage data and customer information confidential work.Finally through security analysis and performance evaluation, prove CESVMC encryption technology has high safety performance, and reasonable operation complexity, meet the needs of the daily work of cloud storage.
作者 张林
出处 《电子设计工程》 2016年第11期124-126,共3页 Electronic Design Engineering
关键词 云存储 安全 加密 隐私保护 cloud storage safety encryption privacy protection
  • 相关文献

参考文献7

  • 1NAMJOSHI J,GUPTE A. Service oriented architecture forcloud based travel reservation software as a service [C]//Procof the 2009 IEEE International Conference on CloudComputing. Washington DC:IEEE Computer Society,2009:147-150.
  • 2HAYES B.Cloud computing [^.Communications of the ACM,2008,51(7):9-11.
  • 3UN G,DASMALCHI G,ZHU J. Cloud computing and IT asa service: opportunities and challenges [C]//Proc of the 6thIEEE International Conference on Web Services. LosAlamitos: IEEE Computer Society,2008:1-5.
  • 4王娟,李飞,张路桥.限制解空间的PSO云存储任务调度算法[J].计算机应用研究,2013,30(1):127-129. 被引量:13
  • 5黄汝维,桂小林,余思,庄威.云环境中支持隐私保护的可计算加密方法[J].计算机学报,2011,34(12):2391-2402. 被引量:61
  • 6王冠,范红,杜大海.云存储访问控制方案的安全性分析与改进[J].计算机应用,2014,34(2):373-376. 被引量:7
  • 7Agrawal R, Kieman J, Srikant R,et al Order -preservingencryption for numeric data [C]//Proceedings of the 2004ACM SIGMOD International Conference on Management ofData (SIGMOD ’ 04) .Paris,France,2004:563-574.

二级参考文献39

  • 1Huang R W, Gui X L, Yu S, Zhuang W. Study of privacypreserving framework for cloud storage. Computer Science and Information Systems, 2011, 8(3):801-819.
  • 2Liu Q, Wang G J, Wu J. An efficient privacy preserving keyword search scheme in cloud computing//Proceedings of the 12th IEEE International Conference on Computational Science and Engineering (CSE' 09). Vancouver, Canada, 2009:715-720.
  • 3Bonech D, Crescenzo G D, Ostrovsky R, Persiano G. Public-key eneryption with keyword search//Proceedings oI the Eurocrypt 2004. Interlaken, Switzerland, 2004: 506-522.
  • 4Song D X, Wagner P, Perrig P. Practical techniques for searches on encrypted data//Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000:44-55.
  • 5Wang W C, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, Illinois, USA, 2009:55-66.
  • 6Bellovin S M, Cheswick W R. Privacy-enhanced searches using encrypted bloom filters. Technical Report 2004/022, IACR ePrint Cryptography Archive, 2004.
  • 7Ohtaki Y. Partial disclosure of searchable encrypted data with support for boolean queries//Proeeedings of the 3th International Conference on Availability, Reliability and Seeurity(ARES'2008). Barcelona, Spain, 2008: 1083-1090.
  • 8Li J, Wang Q, Wang C et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th Conference on Computer Communications (INFOCOM 2010). San Diego, California, USA, 20101 1-5.
  • 9Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data//Proceedings of the 30th International Conference on Distributed Computing Systems(ICDCS'2010). Genoa, Italy, 2010: 253-262.
  • 10Boldyreva A, Chenette N, Lee Y, O'Neill A. Order preserving symmetric encryption//Proceedings of the 28th Annual International Conference on Advances in Cryptology (Euro crypt 2009). Cologne, Germany, 2009:224-241.

共引文献78

同被引文献38

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部