期刊文献+

基于云计算的大数据安全隐私保护

Research on Big Data Security Privacy Protection Based on Cloud Computing
下载PDF
导出
摘要 基于混合云提出了一种高效数据隐私保护模型,研究表明:通过引入非对称加密算法来加密双方通信用的对称密钥,较好地提高了云传输的安全性. At present, cloud processing encryption protection still has a big problem. Hybrid cloud is a cloud processing scheme that is often used at present. This paper proposes an efficient data privacy protection model based on hybrid cloud. The research shows that the asymmetric encryption algorithm is introduced. To encrypt the symmetric key used for communication between the two parties, the security of cloud transmission is improved.
作者 张涛 ZHANG Tao(Department of Network Security,Shanxi Police College, Shanxi Taiyuan 030401, China)
出处 《淮阴师范学院学报(自然科学版)》 CAS 2019年第3期218-221,227,共5页 Journal of Huaiyin Teachers College;Natural Science Edition
关键词 云计算 大数据 混合云 隐私保护 cloud computing big data hybrid cloud privacy protection
  • 相关文献

参考文献6

二级参考文献31

  • 1刘高嵩 张传昌.网格环境下统一身份认证的研究.网络安全技术与应用,2008,(10):19-21.
  • 2Top Threats to Cloud Computing V1.0[EB/OL].[2015-07-10].http://wenku.baidu.com/view/db3506ea81c758f5f61f-67e5.html.
  • 3GENTRY C.Fully Homomorphic Encryption Using Ideal Lattices[M].New York:Association for Computing Machinery,2009:169-178.
  • 4ATENIESE G,BURNS R,CURTMOLA R.Provable Data Possession at Untrusted Stores://Proc of the 14th ACM Confon Computer and Communications Security(CCS'07)[C].New York:ACM,2007:598-609.
  • 5JUELS A,Jr KALISKI B S.PORs:Proofs of Retrievability for Large FIles://Proc of the 14th ACM Conf on Computer and Communications Security(CCS'07)[C].New York:ACM,2007:584-597.
  • 6SWAMINATHAN A,MAO Y N,SU G M,et al.Confidentiality-Presving Rank-Ordered Search://Proceedings of the 2007ACM Workshop on Storage Security and Survivability(Storage SS'07)[C].New York:ACM,2007:7-12.
  • 7AGRAWAL R,KIERNAN J,SRIKANT R,et a1.Order Preserving Encryption for Numeric Data://Proc of the 2004 ACM SIGMOD Int Conf on Management of Data(SIGMOD'04)[C].New York:ACM,2004:563-574.
  • 8赵海霞,刘万国,洛凤军.数字图书馆安全的用户分级研究[J].图书馆学研究,2008(11):50-52. 被引量:7
  • 9黄永峰,张久岭,李星.云存储应用中的加密存储及其检索技术[J].中兴通讯技术,2010,16(4):33-35. 被引量:33
  • 10周波.基于云计算的图书馆服务模式研究[J].现代情报,2010,30(10):44-47. 被引量:31

共引文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部