期刊文献+

基于可信第三方的多提供商安全云存储系统设计 被引量:2

The Design of a Security Cloud Storage System Based on the Trusted Third Party Providers
下载PDF
导出
摘要 云存储作为一种服务日益普及,但消费者无法根据量化指标(如存储安全系数、数据分块存储的云服务器数量等)来订制自己的云存储服务,也无法保证云存储提供商对隐私数据的保护,为隐私数据的泄漏带来隐患。为解决这些问题,提出了基于可信第三方的云存储架构方案,将用户数据信息与用户身份信息隔离存储,并通过注册制审核云存储提供商的资格,实现将对云存储提供商的服务质量评估交由可信第三方,并利用可信第三方的质量评估体系对云存储提供商进行评估;同时用户可根据数据的安全性高低选择不同等级的云存储服务,真正实现"按需服务"。经过安全性分析与实验,结果表明,所提出的方案对性能损耗可以接受,而且安全性得到显著提高,具有一定的应用价值。 Cloud storage is becoming more and more popular as a service,while consumers cannot choose a cloud storage provider via quantitative indicators,and there is no guarantee that cloud storage providers would protect the privacy of data,which brings privacy data leakage risk.In order to solve these problems,put forward a cloud storage architecture scheme based on trusted third party,which separates user data information from user identity information,and audits the cloud storage providers through qualification registration system,so that the trusted third party could evaluate the service quality of cloud storage providers and users can choose different grades of cloud storage services based on the security of the data as"on-demand service".Through safety analysis and experiment,the results show that the proposed scheme is acceptable to the performance loss while the security is improved,so it is valuable in practice.
作者 詹洋 聂文惠
出处 《软件导刊》 2018年第2期186-188,共3页 Software Guide
关键词 云存储 可信第三方服务器 多提供商 cloud storage trusted third-party server multi-provider
  • 相关文献

参考文献7

二级参考文献72

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 4Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43.
  • 5Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html.
  • 6Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html.
  • 7Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177.
  • 8Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 9Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192.
  • 10Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192.

共引文献427

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部