期刊文献+

云存储安全技术综述

Survey of Secure Cloud Storage
下载PDF
导出
摘要 云存储是未来信息存储的一种理想方式,它提供方便易用的存储空间,但数据安全问题是云存储普及最大的障碍,因此云存储安全一直是云存储研究的重点。文章介绍了云存储的安全需求及研究现状,最后探讨了安全云存储系统未来的研究方向。 Cloud storage is a future ideal way of information storage, it provides user-friendly storage space, but the data security has been the biggest obstacle to the popularization of cloud storage, so cloud storage security has always been emphasis in cloud storage. This paper introduces the security demand and the current status of cloud storage, at last we discuss the future research directions of secure cloud storage system.
出处 《电脑知识与技术(过刊)》 2014年第6X期3989-3990,共2页 Computer Knowledge and Technology
关键词 云存储 数据安全 加密存储 访问控制 cloud storage data security encrypted storage access control
  • 相关文献

参考文献1

二级参考文献16

  • 1YUMEREFENDI A R, CHASE J S. Strong accountability for network storage [J]. ACM Transactions on Storage, 2007, 3(3): 6-6.
  • 2KUBIATOWICZ J, BINDEL D, CHEN Y, et al. OceanStore: An architecture for global-scale persistent storage [ C]// Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems. New York: ACM Press, 2000:190-201.
  • 3ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [C]// CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007:598 -609.
  • 4ATENIESE G, PIETRO R D, MANCINI L V, et al. Scalable and efficient provable data possession [C]// SecureComm'08: Proceedings of the dth International Conference on Security and Privacy in Communication Networks. New York: ACM Press, 2008:1-10.
  • 5ATENIESE G, KAMARA S, KATZ J. Proofs of storage from homomorphic identification protocols [C]//ASIACRYPT'09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer-Verlag, 2009:319 -333.
  • 6CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP: Multiplereplica provable data possession [C]//The 28th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2008:411 -420.
  • 7SHAH M A, BAKER M, MOGUL J C, et al. Auditing to keep online storage services honest [C]// HOTOS'07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems. Berkeley, CA: USENIX Association, 2007:1-6.
  • 8ZHU Y, WANG H, HU Z, et al. Efficient provable data possession for hybrid clouds [C]//CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010:756-758.
  • 9GHEMAWAT S, GOBIOFF H, LEUNG S-T. The Google file system [C]// Proceedings of the 19th ACM Symposium on Operating Systems Principles. New York: ACM Press, 2003:29-45.
  • 10CHANG E-C, JIA X. Remote integrity check with dishonest storage server [C]// Proceedings of the 13th European Symposium on Research in Computer Security. Berlin: Springer-Verlag, 2008: 223- 237.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部