期刊文献+

面向移动云的基于时间的增量备份方案

Time based incremental backup scheme for mobile cloud computing
下载PDF
导出
摘要 提出一种面向移动云计算的基于时间的数据安全增量备份方案,该方案针对移动设备的重要数据信息,将时间作为参数引入到数据加密中,依据时间阶段对用户上传的数据进行增量备份,既解决了对最新的敏感数据及时备份问题,又解决了由于备份密钥丢失造成的全部密文泄露问题。 A time-based data secure backup mechanism for moving the cloud was presented. Time was considered as a parameter into the data encryption for the important information in mobile device and backups the users' data according to the time period. It had not only solved the issue of the latest timely backup sensitive data, but also solved the entire ciphertext leak caused by missing the backup key.
出处 《网络与信息安全学报》 2016年第8期48-53,共6页 Chinese Journal of Network and Information Security
基金 新闻出版重大科技工程基金资助项目(No.1681300000119) 国家自然科学基金资助项目(No.61170251) 教育部重点基金资助项目(No.209156) 北京市自然科学基金资助项目(No.4152048) 江苏省自然科学基金资助项目(No.BK20150787) 北京电子科技学院2016年春蕾计划基金资助项目(No.2016CL04)~~
关键词 移动云 时间粒度 增量备份 数据安全 加密 mobile cloud time granularity incremental backup data security encryption
  • 相关文献

参考文献3

二级参考文献65

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3LIN H Y, TZENG W G. A secure decentralized erasure code for distributed network storage [ J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(11) : 1586 - 1594.
  • 4LIN H Y, TZENG W G. A secure erasure code-based cloud storage system with secure data forwarding [ J]. IEEE Transactions on Paral- lel and Distributed Systems, 2012, 23(6): 995-1003.
  • 5SAHAI A, WATERS B. Fuzzy identity-based encryption [C]// EUROCRYPT2005: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Tech- niques, LNCS 3494, Berlin: Spfinger-Verlag, 2005:457-473.
  • 6GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based eneryp- tion for fine-grained access control of encrypted data [ C]//Proceed- ings of the 13th ACM Conference on Computer and Communications Security. New York: ACM Press, 2006:89-98.
  • 7BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-poliey at- tribute-based encryption [ C] // Proceedings of 2007 IEEE Symposi- um on Security and Privacy. Washington, DC : IEEE Computer So- ciety, 2007: 321-334.
  • 8GE A J, ZHANG R, CHEN C, et al. Threshold ciphertext policy attribute-based encryption with constant size ciphertexts [ C]//Pro- ceedings of the 17th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2012:336-349.
  • 9HERRANZ J, LAGUILLAUMIE F, RAFOLS C. Constant size ci- phertexts in threshold attribute-based encryption [ C]// PKC2010: Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, LNCS 6056. Berlin: Springer- Veflag, 2010:19 -34.
  • 10GOYAL V, JAIN A, PANDEY O, et al. Bounded ciphertext policy attribute-based encryption [ C]// ICALP2008: Proceedings of the 35th International Colloquium on Automata, Languages and Pro- gramming, LNCS5126. Berlin: Springer-Verlag, 2008:579-591.

共引文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部