期刊文献+

云存储中的ORAM研究综述

Survey of ORAM Research in Cloud Storage
下载PDF
导出
摘要 在云存储环境中,服务器或者第三方可以仅通过对用户访问行为进行分析来获取信息,对用户信息安全造成威胁。ORAM通过构造精巧设计的存储结构和冗余的访问机制,有效地隐藏用户访问行为与访问目标之间的对应关系。隐藏用户访问意图的安全访问机制,是现阶段隐藏用户访问模式的主要手段之一。通过对ORAM基本理论和发展历程进行研究,归纳分析了ORAM的基本方案;建立了SSIBT性能评价指标体系,对经典ORAM算法及其优化方案进行了分析比较;最后,在分析现阶段主要研究重点的基础上,总结提出了ORAM未来可能的主要研究方向。 In a cloud storage environment,servers and the third party can fetch information through analyzing the users’access behaviour,which may cause threats to users’information security.ORAM mechanism is one of the main strategies which can hide users’visiting patterns.This mechanism can effectively conceal the corresponding relationships between the access behaviour and the visiting targets.Secure access mechainsm to hide user’s access intention is one of the main means to hide user’s access model at present.Through the study of the basic theories and the development process of the ORAM,this paper concluded the basic scheme of this mechanism and set up a SSIBT performance evaluation index system to make comparisons and analysis between the classic ORAM mechanism and its optimization scheme.Finally,possible research directions of ORAM were summarized based on the main research focus.
作者 顾晨阳 付伟 刘金龙 孙刚 GU Chen-yang;FU Wei;LIU Jin-long;SUN Gang(Department of Information Security,Naval University of Engineering,Wuhan 430033,China;Naval Confidential Password Office,Beijing 100841,China)
出处 《计算机科学》 CSCD 北大核心 2019年第S11期341-347,375,共8页 Computer Science
基金 国家自然科学基金项目(61672531) 总装后勤科技重大项目子课题(AWS14R013)资助
关键词 云存储 ORAM 行为安全 访问机制 隐私保护 Cloud storage ORAM Behavioral security Access mechanisms Privacy protection
  • 相关文献

参考文献11

二级参考文献100

  • 1王俊,贾连兴,姚海潮,何建平.基于RBAC的文件级分布式安全访问控制系统的研究[J].计算机研究与发展,2011,48(S1):24-29. 被引量:2
  • 2ZHANG Hong,HE YePing,SHI ZhiGuo.A formal model for access control with supporting spatial context[J].Science in China(Series F),2007,50(3):419-439. 被引量:7
  • 3Wang C, Ren K, Lou W J, et al. Toward publicly auditable secure cloud data storage services. IEEE Network, 2010, 24( 4): 19-24.
  • 4Uels A, Kaliski B S. Pors: proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007:584-597.
  • 5Ateniese G, Burns R, Curtmolar R, et cd. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007:598-609.
  • 6Shacham H, Waters B. Compact Proofs of Retrievability. Proceedings of Asiacrypt '08, Melbourne, Australia, 2008.
  • 7Dodis Y, Vadhan S P, Wichs D. Proofs of retrievability via hardness amplitication. Proceedings of the 6th Theory of Cryptography Conference, San Francisco, 2009:109-127.
  • 8Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs. Journal of the ACM, 1996, 43 (3):431-473.
  • 9Elaine S T H, Chan H, Stefanov E, et ol. Oblivious RAM with O ((logn)3) worst-case cost. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, 2011.
  • 10Pinkas B, Reinman T. Oblivious ram revisited. Proceedings of CRYPTO, California, USA, 2010.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部