期刊文献+

基于数据分割的云存储中数据的安全共享 被引量:7

Data sharing of cloud storage based on data segmentation
下载PDF
导出
摘要 针对云环境中第三方服务器不可信的问题,提出一种基于数据分割的密钥聚合加密方法。利用数据分割的思想将文件分割为大数据和多个小数据块,采用密钥聚合加密算法分别加密后将文件分块存储在云端。文件共享时,提取多个数据块的密钥为一个聚合密钥,实现一个密钥对多个文件的解密。进行理论分析及仿真实验,结果表明该方案可以降低对第三方服务商的可信要求,在数据共享时减轻了密钥的传输开销,仅需一个固定长度的聚合密钥即可。 To solve the problem of untrustworthy third-party servers in cloud environment,a key aggregation encryption method based on data segmentation was proposed.Using the idea of data segmentation,the file was divided into big data and many small data blocks.After encryption,the file was stored in the cloud.In file sharing,the key of multiple data blocks was extracted as an aggregate key to decrypt multiple files with one key.Theoretical analysis and simulation experiments were carried out.The results show that the scheme can reduce the trust requirements for the third-party service providers,reduce the transmission overhead of the key when data sharing,and it only needs a fixed length aggregation key.
作者 苏艳霞 王庆生 陈永乐 SU Yan-xia;WANG Qing-sheng;CHEN Yong-le(College of Information and Computer,Taiyuan University of Technology,Jinzhong 030600,China)
出处 《计算机工程与设计》 北大核心 2021年第10期2742-2747,共6页 Computer Engineering and Design
基金 山西省重点研发计划基金项目(高新技术领域)(201903D121121)。
关键词 云存储 数据分割 密钥聚合机制 聚合密钥 数据安全共享 cloud storage data segmentation key aggregation mechanism aggregation key data security sharing
  • 相关文献

参考文献4

二级参考文献45

  • 1张鹏,童云海,唐世渭,杨冬青,马秀莉.一种有效的隐私保护关联规则挖掘方法[J].软件学报,2006,17(8):1764-1774. 被引量:53
  • 2张薇,马建峰.LPCA——分布式存储中的数据分离算法[J].系统工程与电子技术,2007,29(3):453-458. 被引量:14
  • 3邹德清,金海,羌卫中,等.云计算安全挑战与实践[J].中国计算机学会通讯,2011,7(12):55-61.
  • 4VAQUERO L M, RODERO-MERINO L, CACERES J, et al. A break in the clouds:towards a cloud definition [ J]. ACM SIGCOMM Com- puter Communication Review,2009,39 ( 1 ) :50-55.
  • 5金海,吴松,廖小飞,等.云计算的发展与挑战,180734[R].北京:机械工业出版社,2010.
  • 6WANG Qian, WANG Cong, REN Kui, et al. Enabling public audit- ability and data dynamics for storage security in cloud computing[ J]. IEEE Trans on Parallel and Distributed Systems,2011,22 (5) : 84?-859.
  • 7HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a service[ C ]//Proc of the 18th International Conference on Data Engi- neering. 2002:29-40.
  • 8王保军.电子数据分离存储于安全恢复系统的研究及实现[D].南京:南京邮电大学,2009.
  • 9SAHAI A, WATERS B. Fuzzy identity-based encryption [ C ]//Proc of the 24th Annum International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2005:457-473.
  • 10GOYAL V, PANDEY O, SAHAI A, et al. Attribute based encryption for fine-grained access control of encrypted data [ C ]//Proc of ACM Conference on Computer and Communications Security. New York: ACM Press,2006:89-98.

共引文献73

同被引文献99

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部