期刊文献+

基于多级安全策略的云计算数据完整性保护模型构建

Construction of Cloud Computing Data Integrity Protection Model Based on Multi Level Security Policy
下载PDF
导出
摘要 为提高云计算环境下的用户数据的安全性,除保证传统的静态数据安全性元不能满足安全要求。对此,提出一种基于包含静态数据和动态数据在内的多种安全策略数据完整性保护模型。通过构建多副本的数据完整性保护方案,保护静态数据的完整性;通过分散流信息控制的数据安全保护模型,对数据对象的细粒度追踪,并对不同云计算用户数据进行隔离和保护,从而通过这种不同的安全策略,实现云计算平台数据的多级安全保护。 In order to improve the security of user data in the cloud computing environment,in addition to ensure that the tra-ditional static data security element can not meet the security requirements,in this paper,a data integrity protection model is pro-posed,which is based on a variety of security policies,including static data and dynamic data. For the establishment of user trust in security static data cloud storage platform,a dynamic update and publicly verified data integrity protection scheme is proposed, which provides remote data integrity verification for the users decentralized information flow control based on the theory,a decentral-ized information flow control model is proposed to protect data security,in order to achieve the fine-grained tracking of data ob-jects,and for different users of cloud computing data isolation and protection.
作者 龚建锋
出处 《计算机与数字工程》 2017年第8期1625-1628,共4页 Computer & Digital Engineering
关键词 静态数据 动态数据 完整性保护 分散信息流 云存储 static data dynamic data integrity protection distributed information flow cloud storage
  • 相关文献

参考文献5

二级参考文献67

  • 1Aleniese G, Burns R, Curtmola R. Provable data possession at untrusted stores [C] //Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:598-609.
  • 2Bowers D, Juels A, Oprea A. Proofs of retrievability: Theory and implementation [C] //Proc of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009: 43-54.
  • 3Erway C, Kupcu A, Papamanthou C, et al. Dynamic provable data possession [C]//Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:213-222.
  • 4Bnwers D, Juels A, Oprea A. HALL: A high-availability and integrity layer for cloud storage [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:187-198.
  • 5Baker M, Shah M, Rusenthal D, et al. A fresh look at the reliability of long term digital storage [J]. ACM SIGG/PS Operating Systems Review, 2006, 40(4): 221-234.
  • 6Zhu Y, Wang H, Hu Z, et al. Efficient provable data possession for hybrid clouds, 2010 234 [R/OL]. San Diego, CA: IACR Cryptology ePrint Archive, 2010[2013-12-10]. http://eprint, iacr. org/.
  • 7Ateniese G. Kamara S, Katz J. Proofs of storage from homomorphic identification protocols [C] //Proc of the 15th Int Conf on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2009:319-333.
  • 8Yamamoto G, Oda S, Aoki K. Fast integrity for large data [C] //ProcofSPEED'07. Berhn: Springer, 2007:21-32.
  • 9Sehe F, Domingo-Ferrer J, Martinez-Balleste A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Trans on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
  • 10Zeng K. Publicly verifiable remote data integrity [C] //Proc of the 10th Int Conf on Information and Communications Security. Berlin: Springer, 2008:419-434.

共引文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部