期刊文献+

大数据安全和隐私保护技术体系的关键技术研究 被引量:2

下载PDF
导出
摘要 大数据时代的到来,往往伴随着大数据安全和隐私保护等问题,数据的完整性、安全方面面临着诸多的挑战。该文试着从大数据安全和隐私保护技术体系的关键技术出发对大数据的安全和隐私保护提出一些行之有效的技术方法,希望可以为数据安全与隐私保护问题提供点借鉴意见。
作者 游康泽
出处 《电脑知识与技术》 2016年第12X期62-63,共2页 Computer Knowledge and Technology
  • 相关文献

参考文献3

二级参考文献114

  • 1Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 2Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 3Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 4Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 5Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 6Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 7Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 8Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 9Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.
  • 10Canetti R, Hohenherger S. Chosen-ciphertext secure proxy re-encryption [C] //Proc of ACM CCS 2007. New York: ACM, 2007:185-194.

共引文献105

同被引文献3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部