期刊文献+

基于安全云计算的大数据信息管理框架研究 被引量:4

Research on Information Management Framework of Big Data Based on Security Cloud
下载PDF
导出
摘要 近年来,随着信息技术的不断发展,对海量数据的高效率处理与分配成为研究热点,由此引申出的基于云计算的大数据存储链条安全机制问题更为凸显。本文提出了一种基于松耦合下的细粒度访问控制架构模型,从云计算环境下大数据组件访问依赖集合、基于同态加密机制的安全云计算、基于实时动态群签名的大数据共享方案等角度研究了基于安全云计算的大数据信息管理框架。仿真验证表明,本文所提基于安全云计算的大数据信息管理框架在大数据存储安全性、加密处理速度、数据存储空间等方面具有较为明显的优势。 In recent years,with the continuous development of information technology,efficient processing and allocation of massive data has become a research hotspot.The security mechanism of large data storage chain based on cloud computing is more prominent.This paper presents a fine-grained access control architecture model based on loosely coupled.The large data information management frame based on secure cloud computing is studied from the following aspects:large data component access dependency set in cloud computing environment,secure cloud computing based on homomorphic encryption mechanism,and large data sharing scheme based on real-time dynamic group signature.Simulation results show that the proposed large data information management framework based on secure cloud computing has obvious advantages in large data storage security,encryption processing speed,data storage space and so on.
作者 刘静 LIU Jing(Lvliang College Fenyang Normal College,Fenyang 032200,China)
出处 《信阳农林学院学报》 2018年第4期118-120,124,共4页 Journal of Xinyang Agriculture and Forestry University
关键词 安全云计算 大数据 细粒度访问控制 同态加密 安全共享 security cloud computing big data fine-grained access control homomorphic encryption security sharing
  • 相关文献

参考文献6

二级参考文献89

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2魏大宽,黄兵,周献中.不完备模糊目标信息系统粗集模型与知识约简[J].计算机工程,2006,32(8):48-51. 被引量:28
  • 3SCHELL R R.Security--A big question for big data[R].California:University of Southern California,2013:1-24.
  • 4SENGUPTA S,KAULGUD V,SHARMA V S.Cloud computing security-trends and research directions[C]//IEEE World Congress on Digital.2011:524-531.
  • 5YU S,WANG C,REN K,et al.Achieving secure,scalable,and finegrained data access control in cloud computing[C]// IEEE INFOCOM.2010:1-9.
  • 6DI VIMERCATI S D C,FORESTI S,JAJODIA S,et al.A data outsourcing architecture combining cryptography and access control[C]//Proc of the ACM Workshop on Computer Security Architecture(CSAW).2007:63-69.
  • 7KUMAR A,LEE B G,LEE H J,et al.Secure storage and access of data in cloud computing[C]//ICT International Conference on Convergence(ICTC).2012:336-339.
  • 8WANG W,LI Z,OWENS R,et al.Secure and efficientaccess to outsourced data[C]// Proc of the ACM Cloud Computing Security Workshop.2009:55-65.
  • 9KAMARA S,LAUTER K.Cryptographic cloud storage[C]//Proc of Financial Cryptography:Workshop on Real Life Cryptographic Protocolsand Standardization.2010:136-149.
  • 10SANKA S,HOTA C,RAJARAJAN M.Secure data access in cloud computing[C]// IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA).2010:1-6.

共引文献177

同被引文献25

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部