期刊文献+

面向健康云的定制化网络安全服务

Customized Network Security Service for Health Cloud
下载PDF
导出
摘要 针对传统的云计算网络安全模式无法满足云用户不同的网络安全需求,本文提出一种面向健康云的定制化网络安全服务方案.该方案首先根据健康云用户的网络安全需求填写安全模板;然后,将安全模板进行加密;最后,由定制化网络安全服务系统自动分析处理,建立有效的安全规则,最终保护云用户安全.在医疗健康云平台上展开实验,对比传统方法,实验结果显示本文方法在性能改善上的有效性. In view of the traditional cloud computing network security model can not satisfy the different network security needs of cloud users,this study proposes a customized network security service solution for health cloud.This scheme firstly fills in the security spec according to the health cloud user’s network security requirements.Then,encrypt the security spec.Finally,the customized network security service system automatically analyzes and processes to establish effective security rules and ultimately protect the cloud user security in the medical health cloud platform.Compared with the traditional method,the results show that the proposed method is effective in improving performance.
作者 陈雅琳 刘薇 徐安 李巧平 何进 陈雷霆 CHEN Ya-Lin;LIU Wei;XU An;LI Qiao-Ping;HE Jin;CHEN Lei-Ting(Computer Science and Engineering Academy, University of Electronic Science and Technology of China, Chengdu 611731, China;Dongguan Data Science Software Technology Co. Ltd., Dongguan 523808, China;Chengdu Vocational and Technical College of Industry, Chengdu 610218, China;Institute of Electronic and Information Engineering in Dongguan, University of Electronic Science and Technology of China Dongguan 523808, China;Govemmem Affairs Service Center of Guangdong Provincial Health Department, Guangzhou 510060, China)
出处 《计算机系统应用》 2018年第8期81-86,共6页 Computer Systems & Applications
基金 国家863计划(2015AA016010) 广东省应用型科技研发专项基金(2015B010131002) 东莞市重大科技项目(2015215102)~~
关键词 健康云 网络安全 定制化 安全模板 health cloud network security customization security spec
  • 相关文献

参考文献2

二级参考文献64

  • 1Amazon. Amazon S3. http://aws.amazon.com/s3/.
  • 2Windows azure, http://www.microsoft.com/windowsazure/.
  • 3Weber T. Cloud computing after Amazon and Sony: Ready for primetime? 2011. http://www.bbc.co.uk/news/business-13451990.
  • 4Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Syrup. on Security and Privacy. Berkeley: IEEE Computer Society, 2000.44-55. [doi: 10. 1109/SECPRI.2000.848445].
  • 5Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp. San Diego: The Internet Society, 2004. http://www.isoc.org/isoc/conferences/ndss/04/ proceedings/.
  • 6Goh E. Secure Indexes. In: Cryptology ePrint Archive. 2003. http://eprint.iacr.org/2OO3/216.pdf.
  • 7Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proc. of the 2nd Int'l Conf. on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer-Verlag, 2004. 31-45. [doi: 10.1007/978-3-540-24852- 1_3].
  • 8Wang C, Cao N, Li J, Ren K, Lou WJ. Secure ranked keyword search over encrypted cloud data. In: Proc. of the IEEE 30th Int'l Conf. on Distributed Computing Systems (ICDCS). Genoa: IEEE Computer Society, 2010. 253-262. [doi: 10.1109/ICDCS. 2010.34].
  • 9Li J, Wang Q, Wang C, Cao M, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the IEEE INFOCOM Mini-Conf. San Diego: IEEE Computer Society, 2010. 1-5. [doi: 10.1109/INFCOM.2010.5462196].
  • 10Li M, Yu S, Cao N Lou W. Authorized private keyword search over encrypted data in cloud computing. In: Proc. of the IEEE Int'l Conf. on Distributed Computing Systems (ICDCS). Minneapolis: IEEE Computer Society, 2011. 383-392. [doi: 10.1109/ICDCS. 2011.55].

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部