期刊文献+

基于封闭环境加密的云存储方案 被引量:9

Cloud storage scheme based on closed-box encryption
下载PDF
导出
摘要 针对保护云存储中用户数据机密性的问题,提出了一种在云服务提供商处加密数据的云存储方案。通过虚拟机隔离技术来构造封闭计算环境,改进RSA公钥加密算法使其不需要重新产生大素数就能实现密钥变化,并通过SSL安全链接传输数据以及密钥,将数据在封闭计算环境中安全加密后再存储至分布式文件系统。封闭计算环境能阻止操作系统中不良应用以及云管理员的攻击,有效防范数据泄露。实验结果表明,用户数据的机密性得到了提升,并且相较于其他在云端加密的云存储方案,所提方案所带来的性能损耗降低了许多。 Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.
作者 杜瑞忠 王少泫 田俊峰 DU Rui-zhong;WANG Shao-xuan;TIAN Jun-feng(College of Computer Science and Technology, Hebei University, Baoding 071002,China;Key Lab on High Trusted Information System in Hebei Province, Baoding 071002,China)
出处 《通信学报》 EI CSCD 北大核心 2017年第7期1-10,共10页 Journal on Communications
基金 国家自然科学基金资助项目(No.61170254 No.60873203) 河北省自然科学基金资助项目(No.F2014201098) 河北省高等学校科学技术研究基金资助项目(No.ZD2016043) 河北省物联网数据采集与处理工程技术研究中心基金资助项目(No.河北065201)~~
关键词 云存储 分布式文件系统 封闭计算环境 RSA cloud storage distributed file system closed-box computing environment RSA
  • 相关文献

参考文献8

二级参考文献187

  • 1Dignan L. Cloud computing hasn't gone fortune 500 yet, but it's coming[EB/OL]. [2011-04]. http://blogs.zdnet.com/ BTL/?p=8199.
  • 2Shamir A. Identity-based cryptosystems and signature schemes[C]//LNCS 196: Proceedings of the Advances in Cryptology (CRYPTO), 1985. Berlin, Heidelberg: Springer- Verlag, 1985: 47-53.
  • 3Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of the Advances in Cryptology (CRYPTO), 2001. Berlin, Heidelberg: Springer- Veflag, 2001: 213-229.
  • 4Sahai A, Waters B. Fuzzy identity based encryption[C]// Proceedings of the Advances in Cryptology (EUROCRYPT), Aarhus, Denmark, 2005. Berlin, Heidelberg: Springer- Verlag, 2005: 457--473.
  • 5Goyal V, Pandey O, Sahai A, et al. Attribute based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA: ACM, 2006: 89-98.
  • 6Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Proceedings of the 2007 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2007. Washington, DC, USA: IEEE Computer Society, 2007: 321-334.
  • 7Liang Xiaohui, Cao Zhenfu, Lin Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]//Proceedings of the 4th International Symposium on Information, Computer and Communications Security (ASIACCS 2009). New York, NY, USA: ACM, 2009: 276-286.
  • 8Hong Cheng, Zhang Min, Feng Dengguo. AB-ACCS: a cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47(Suppl): 259-265.
  • 9Pirretti M, Traynor P, McDaniel P, et al. Secure atrribute-based systems[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06). New York, NY, USA" ACM, 2006: 99-112.
  • 10Yu Shucheng, Wang Cong, Ren Kui, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th International Symposium on Information, Computer and Communications Security (ASIACCS 2010). New York, NY, USA: ACM, 2010: 261-270.

共引文献431

同被引文献89

引证文献9

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部