期刊文献+

云存储安全问题分析与研究 被引量:1

Security analysis of cloud storage
下载PDF
导出
摘要 随着云计算和云存储技术发展及其应用的日益广泛,在给人们带来极大便利的同时,云存储的各种安全问题也日益突出,成为了阻碍云存储继续快速发展的绊脚石.本文首先阐述了云存储的优势.其次,分析了云存储安全问题.最后,就云存储安全问题提出了几条安全策略,具有一定的参考价值. With the development of cloud computing and cloud storage technology and the increasingly widespread application, it brings great convenience to people at the same time, a variety of cloud storage security issues have become increasingly prominent, become an obstacle to the rapid development of cloud storage. First of all, this paper expounds the advantages of cloud storage. Secondly, the security of cloud storage is analyzed. Finally, several security policies are proposed for cloud storage security, which has some reference value.
作者 杨海亮 YANG Hai-liang(Qinghai Vocational College of Police Officers,Xining 810006,China)
出处 《青海师范大学学报(自然科学版)》 2018年第1期17-19,共3页 Journal of Qinghai Normal University(Natural Science Edition)
关键词 云计算 云存储 安全 策略 cloud computing cloud storage security strategies
  • 相关文献

参考文献6

二级参考文献47

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2ARMBRUsT M,FOX A,GRIFFITH R,et al.Above the Clouds:A Berkeley View of Cloud Computing[R].Berkeley,CA,USA:University of California,2009.
  • 3Google docs-Online Documents.Spreadsheets,Present[EB/OL].[2009-07-29] http://docs.google.com.
  • 4Windows Azure Platform[EB/OL].[2009-07-12].http://www.microsoft.com/windowsazure/.
  • 5Amazon Elastic Compute Cloud[EB/OL].[2009-06-24].http://aws.amazon com/ec2.
  • 6SONG D,WAGNER D.PERRIG A.Practical Techniques for Searches on Encrypted Data[C] //Proceedings of the IEEE Symposium on Security and Privacy(S&P'00),May 14-17.2000.Berkeley,CA,USA.Piscataway,NJ,USA:IEEE.2000:44-55.
  • 7BONEH D,CRESCENZO G,OSTROVSKY R.et al.Public Key Encryptlon With Keyword Search[C] //Advances in Cryptology.Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT'04),May 2-6,2004,Interlaken.Switzeriand.LNCS 3027.Berlin,Germany:Springer-Verlag,2004:506-522.
  • 8PARK D,KIM K,LEE P.Public Key Encryption With Conjunctive Field Keyword Search[C] //Proceedings of the 2004 Workshop on Information Security Applications(WISA'04).Oct 29-31,2004,Wuhan,China.LNCS 3325.Berlin.Germany:Springer-Verlag,2004:73-86.
  • 9SWAMINATHAN A,MAO Y,SU G M,et al.Confidentiality-Preserving Rank-Ordered Search[C] //Proceedings of the 2007 ACM Workshop on Storage Security and Survivability(StorageSS'07),Oct 29,2007,Alexandria.VA.USA.New York.NY,USA:ACM.2007:7-12.
  • 10GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[C] //Proceedings of the 41 st Annual ACM Symposium on Theory of Computing(STOC'09).May 31-Jun 2,2009.Bethesda,MD.USA.New York,NY,USA:ACM.2009:169-178.

共引文献1185

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部