期刊文献+

一种基于云存储环境下的数据处理机制 被引量:1

A Data Processing System based on Cloud Storage Environment
下载PDF
导出
摘要 随着信息时代的迅速发展,全球的数据正爆发式的增长,如何对这些海量的数据进行有效存储使用并保证其隐私性正成为人们关注的焦点。本文利用云存储服务技术和云计算技术有效的解决了人们所担忧的问题。用户把海量的数据上传到多个云服务器,当用户使用这些数据时,传统的方法是把数据下载到本地,再进行相关处理,或者在云上运用隐式安全机制直接进行处理。本文方案中,我们借助云计算的功能及加密操作,对在云端存储的加密数据进行运算,得到我们想要的结果,再由用户解密。该方案既节省了数据恢复到本地的存储空间和计算代价,又能够保护用户在云端数据的隐私性。在当前的技术环境下,有较广泛的应用前景。 With the rapid development of information age, the global data is explosive growing. How to store and use the massive data effectively and ensure the privacy is becoming the focus of attention. In this paper, the use of cloud storage service technology and cloud computing technology solved the problem that people concern effectively. Users upload the massive data to multiple cloud servers. When users want to use these data, the traditional method isto download data to a local server and to do some related processing, or to use the implicit security mechanism to process in the cloud directly. In our paper, we use encryption operation of cloud computing to do some computation with the encrypted data in the cloud. Then the users can encrypt the result. The scheme not only saves the local storage space and computation cost, but also pro-tects the users’ privacy in the cloud. In the current technological environment, our scheme has a wide applied prospect.
出处 《软件》 2015年第1期141-144,共4页 Software
基金 国家自然科学基金项目(编号:61300181 61272057 61202434 61170270 61100203 61121061) 中央高校基本科研业务费专项资金资助(编号:2012RC0612)
关键词 数据处理 云存储 隐式安全 数据隐私性 云计算 Data Processing Cloud Storage Implicit Security Data Privacy Cloud Computing
  • 相关文献

参考文献16

  • 1Chiang C,Lin C,Chang R.A new scheme of key distributionusing implicit security in wireless sensor networks. Proceedings of the 12th International Conference on AdvancedCommunication Technology . 2010
  • 2M. van Dijk,C. Gentry,S. Halevi,V. Vaikuntanathan.Fully homomorphic encryption over the integers. EUROCRYPT 2010 . 2010
  • 3Abhishek Parakh,Subhash Kak.Space efficient secret sharing for implicit data security[J]. Information Sciences . 2010 (2)
  • 4WANG Q,WANG C,LI J,et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Proceedings of 14thEuropean Symposium on Research in Computer Security . 2009
  • 5Parakh A,Mahoney W.Privacy Preserving Computations Using Implicit Security. Computer Communications and Networks (ICCCN),2013 22nd International Conference on . 2013
  • 6Daniele Micciancio.A first glimpse of cryptography’s Holy Grail[J]. Communications of the ACM . 2010 (3)
  • 7Craig Gentry.Computing arbitrary functions of encrypted data[J]. Communications of the ACM . 2010 (3)
  • 8Miller M.Cloud computing. Journal of Women s Health . 2009
  • 9Abhishek Parakh,Subhash Kak.Online data storage using implicit security[J]. Information Sciences . 2009 (19)
  • 10Yan Zhu,Hongxin Hu,Gail-Joon Ahn.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Transactions on Parallel and Distributed Systems . 2012

二级参考文献25

  • 1OPC Foundation. OPC Common Definitions and InterfacesVersion 1.0[S]. October, 1998.
  • 2Simens,How to accomplish data accessing through OPCby C#, Beijing:Simens, 2009.
  • 3SQL Server 2005 Integration Services专家教程耐特(gangJar.B.)、弗尔曼(Veerman.E.)、冯飞.
  • 4深入 ,A. SQL Server2008 Michael Coles, Fabio Ferracchiati, Robert Rae, Donald Farmer.
  • 5王鹏.走进云计算[M]北京:人民邮电出版社,2009.
  • 6雷万云.云计算技术、平台及应用案例[M]北京:清华大学出版社,2011.
  • 7崔倩楠;袁玉宇.基于云计算环境的虚拟化资源平台研究与评价[D]北京:北京邮电大学,2010.
  • 8刘士军;武蕾.应用虚拟化模式研究[A],200986-90.
  • 9姚继锋.未来需要云计算[J]高性能计算机发展与应用,2009(01):16-18.
  • 10Ashish Thusoo,Joydeep Sen Sarma,Namit Jain,Zheng Shao,Prasad Chakka,Suresh Anthony,Hao Liu,Pete Wyckoff,Raghotham Murthy.Hive: a warehousing solution over a map-reduce framework. Proceedings of the VLDB Endowment . 2009

共引文献63

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部