期刊文献+

基于新媒体写作数据保护的安全云存储系统 被引量:1

Secure cloud storage system based on new media writing data protection
下载PDF
导出
摘要 为保护新媒体写作数据的安全性和用户云盘存储文件的私密性,设计一个基于国密算法的安全云存储系统。该系统基于Android平台开发使用C/S架构,在服务端和客户端交互的过程中,利用SM2和SM4算法相结合的方式保证数据传输的安全性和加解密过程效率。SM4算法用来加密数据明文文件产生数据密文,在服务器端利用SM2公钥算法对SM4算法的对称密钥进行加密,并分配给客户端用户私钥,用以实现数据文件的加解密过程。在Pixel 3设备的测试结果表明,该系统运行良好,能有效保护用户数据,提高新媒体写作存储的安全性。 In order to protect the security of new media writing data and the privacy of users cloud disk storage files,a secure cloud storage system based on state secret algorithm is designed.The system is based on Android platform and adopted C/S architecture.In the process of server and client interaction,SM2 and SM4 algorithms are combined to ensure the security of data transmission as well as the efficiency of encryption and decryption process.The SM4 algorithm is used to encrypt the plaintext file to generate the ciphertext.The SM2 public key algorithm on the server encrypts the symmetric key of the SM4 algorithm,and assigns the private key to the client to implement the encryption and decryption process of the data file.Test results on Pixel 3 devices show that the system works well,can effectively protect user data and improve the security of new media writing storage.
作者 熊英琴 刘兆 韩刚 罗维 XIONG Yingqin;LIU Zhao;HAN Gang;LUO Wei(School of Humanities,Shangluo University,Shangluo 726000,China;School of Cyberspace Security,Xi an University of Posts and Telecommunications,Xi an 710121,China)
出处 《西安邮电大学学报》 2023年第1期62-71,共10页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金项目(62102312)。
关键词 数据保护 云存储 新媒体写作 加密 data protection cloud storage new media writing encryption
  • 相关文献

参考文献7

二级参考文献90

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2方黎明.带关键字搜索公钥加密的研究[D].南京:南京航空航天大学,2012.
  • 3Mell P,Grance T.The NIST definition of cloud computing[S/OL].(2011-10-25)[2015-01-20].http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
  • 4Sasikala P.Research challenges and potential green technological applications in cloud computing[J].International Journal of Cloud Computing,2013,2(1):1-19.
  • 5Sidhu J S S.Security in Computing and Communications[M].Springer Berlin Heidelberg,2014.
  • 6An M,Lee H.Design of the integrated logistics information system based on cloud computing[J].Lecture Notes on Software Engineering,2015,3(1):31-34.
  • 7Furuncu E,Sogukpinar I·.Scalable risk assessment method for cloud computing using game theory[J].Computer Standards&Interfaces,2015(38):44-50.
  • 8Armbrust M,Fox A,Grifftth R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
  • 9O’driscoll A,Daugelaite J,Sleator R D.‘Big data’,hadoop and cloud computing in genomics[J].Journal of Biomedical Informatics,2013,46(5):774-781.
  • 10Manvi S S,Shyam G K.Resource management for infrastructure as a service(IaaS)in cloud computing:a survey[J].Journal of Network and Computer Applications,2013(41):424-440.

共引文献50

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部