期刊文献+

云计算下基于特殊差分方程的(m+1,t+1)门限秘密共享方案 被引量:2

(m+1,t+1) Threshold Secret Sharing Scheme Based on Special Difference Equation for Cloud Computing
下载PDF
导出
摘要 针对非可信云计算服务提供商窃取用户隐私数据的问题,以齐次常系数线性差分方程为工具,将秘密共享技术应用到云计算环境中,提出一种新的(m+1,t+1)门限秘密共享方案。通过对用户隐私数据的解密密钥进行管理,利用齐次常系数线性差分方程为用户与云服务提供商分别分配特殊秘密份额与普通秘密份额,在没有用户参与的情况下,云服务提供商不能恢复用户隐私数据。分析结果表明,该方案能较好地保障用户隐私数据的存储安全,并且通过优化秘密份额减少了存储开销。 To solve the problem that untrusted cloud computing service providers steal user's privacy data,this paper uses the homogeneous linear difference equations with constant coeffcients as a tool,applies secret sharing technology in cloud computing,and proposes a novel (m + 1,t + 1) threshold secret sharing scheme.This scheme manages the decryption key of the user privacy data,and distributes a special secret share to user and a common secret share to each computing service provider by homogeneous linear difference equations with constant coeffcients.Cloud computing service providers cannot recover the user's privacy data without the user's involvement.Analysis reslut shows that the scheme resolves the problem that untrusted cloud computing service providers steal user's privacy data,and reduces the cost of memory overhead by optimizing secret share.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第1期8-12,共5页 Computer Engineering
基金 国家自然科学基金(61272540)
关键词 云计算 存储安全 非可信云服务提供商 差分方程 (m+1 t+1)门限 秘密共享 cloud computing storage security untrusted cloud service provider difference equation (m + 1,t + 1)threshold secret sharing
  • 相关文献

参考文献6

二级参考文献62

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2王明生,刘卓军,张艳硕.权重不同参与者之间的秘密共享(英文)[J].北京电子科技学院学报,2005,13(2):1-8. 被引量:20
  • 3李滨.基于特殊访问权限的差分秘密共享方案[J].四川大学学报(自然科学版),2006,43(1):78-83. 被引量:20
  • 4Parakh A, Kak S. Space efficient secret sharing for implicit data security [J]. Information Sciences, 2011, 181(2): 335 - 341.
  • 5Itani W, Kayssi A, Chehab A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures [C]// Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Chengdu, China: IEEE Computer Society, 2009:711-716.
  • 6Roy I, Ramadan H, Setty S, et al. Airavat: Security and privacy for map reduce [C]// Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. San Jose, USA: USENIX Association Berkeley, 2010: 297 -312.
  • 7Mowbray M, Pearson S. A client based privacy manager for cloud computing [C]// Proceedings of the 4th International ICST Conference on Communication Syslem Software and Middleware. New York, USA: Association for Computing Machinery, 2009.
  • 8Muntes -Mulero V, Nin J. Privacy and anonymization for very large datasets [C]// Proceedings of the ACM 18th International Conference on Information and Knowledge Management. New York, USA: Association for Computing, 2009, 2117-2118.
  • 9Creese S, Hopkins P, Pearson S, et al. Data protection aware design for cloud services [C]// Proceedings of the 1st International Conferenee on Cloud Computing. Lecture Notes in Computer Science. Beijing, China: Springer, 2009:119 - 130.
  • 10Ghemawat S, Gobioff H, Leung S. The Google file system [C]// Proceedings of the 9th ACM Symposium on Operating Systems Principles. New York, USA: Association for Computing Machinery, 2003.

共引文献268

同被引文献21

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部