期刊文献+

云存储系统中隐私保护数据的抗泄露加密算法 被引量:5

Encryption Algorithm for Privacy Preserving Data in Cloud Storage System
下载PDF
导出
摘要 混沌映射加密算法,虽然能够对数据进行加密,防止数据泄露,但是针对具有非线性属性的隐私保护数据进行加密时性能差,导致数据泄露。为此提出了一种新的基于可撤销多重循环控制的云存储系统中隐私保护数据的抗泄露加密算法。通过分析云存储系统中的隐私保护数据的数据结构模型,进行隐私保护数据的数据编码序列分析,并设计了云存储系统中隐私保护数据的线性编码和密钥。引入可撤销多重循环控制方法,实现云存储系统中隐私保护数据的抗泄露加密算法的改进,在整个过程中保证了数据的保密性。仿真结果表明,该算法进行云存储系统中的隐私保护数据的抗泄漏加密,数据的密钥编码分布的随机性加强,降低了被破译概率,降低了数据泄露风险,提高了数据加密的隐私保护性能。 Chaotic map encryption algorithm, although able to encrypt data, to prevent data breaches, butthe privacy protection of nonlinear properties when the data is encrypted performance is poor, lead todata leakage. Therefore this paper proposes a new cloud storage system based on multiple loop controlrevocable anti leakage of privacy protection data encryption algorithm. By analyzing the structure of dataprivacy protection in cloud storage system model, analyzed the coding sequence of data privacyprotection, and designed a linear encoding data privacy protection in cloud storage system and the key.Introduction of revocable multiple loop control method, the realization of privacy protection in cloudstorage system data reveal that the encryption algorithm of improvement, in the whole process to ensurethe confidentiality of data. Simulation results show that the algorithm in the cloud storage system antileakage of privacy protection data encryption, data of key code distribution randomness, reduced theprobability of been deciphered, reduce the risk of data leakage, improve the performance of the privacyof data encryption protection.
作者 赵军 Zhao Jun(Jiangsu Food & Pharmaceutical Science College,Huai’an 223004,China)
出处 《科技通报》 北大核心 2016年第7期158-162,共5页 Bulletin of Science and Technology
关键词 云存储 隐私保护 数据加密 泄露 控制 cloud storage privacy protection data encryption leakage control
  • 相关文献

参考文献4

二级参考文献69

  • 1Ahlswede R, Cai Ning, Li Shuo-Yen, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 2Li Shuo-Yen, Yeung R W, Cai Ning. Linear Network Coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381.
  • 3Deb S, Ho E T. Network Coding for Wireless Applications: A Brief Tutorial[C]//Proceedings of International Workshop on Wireless Ad-hoc Networks. London, UK: [s. n.], 2005.
  • 4Ho T, Leong B, Koetter R. Byzantine Modification Detection in Multicast Networks with Random Network Coding[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2830.
  • 5Cai Ning, Yeung R W. Secure Network Coding[C]//Proceedings of IEEE International Symposium on Information Theory. [S. 1.]: IEEE Press, 2002.
  • 6Zhang Yan, Xu Chengqi, Wang Feng. A Novel Scheme for Secure Network Coding Using One-time Pad[C]//Proceedings of Intemational Conference on Networks Security, Wireless Communications and Trusted Computing. [S. 1.]: IEEE Press, 2009 92-98.
  • 7Bhattad K, Narayana K R. Weakly Secure Network Coding[EB/OL]. (2007-05-22). http://netcod.org.papers/06Bhattad N-final.pdf.
  • 8Majid A, Huaping L. Secure Network Coding with Minimum Overhead Based on Hash Functions[J]. IEEE Communications Letters, 2009, 13(12): 956-958.
  • 9张岩.一种改进的安全网络编方案的研究[C]//中国电子学会第十五届信息论学术年会论文集.西安:[出版者不详],2008:962-966.
  • 10洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265.

共引文献17

同被引文献37

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部