期刊文献+

一种基于雾计算思想的私密性云存储方案 被引量:1

Privacy cloud storage scheme based on fog computing
下载PDF
导出
摘要 云存储作为云计算服务的核心应用之一,凭借其庞大的云服务器存储容量吸引了大量用户。然而,在这种存储模式下,用户将数据完全存储在云服务器上从而失去对数据的控制权,存在很大的隐私泄露风险。传统的隐私保护方案通常建立在加密基础上,但这类方法无法有效防范来自服务器内部的攻击,若密码被泄露则数据随之被泄露。提出一种基于雾计算模式的三级安全云存储方案,通过设计的Hash-Solomon编码算法,将少量数据存储在雾服务器及本地,既可以充分利用云服务强大的存储空间,又可以保护数据不被泄露。通过安全性理论分析和实验测试证明了所提方案的可行性,是对现有云存储方案的有力补充。 As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’data is stored completely in cloud server.In other word,users’right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.
作者 周际援 罗皓 邱磊 王田 ZHOU Jiyuan;LUO Hao;QIU Lei;WANG Tian(Department of Computer Science and Technology,Huaqiao University,Xiamen 361021,China)
出处 《物联网学报》 2019年第1期65-72,共8页 Chinese Journal on Internet of Things
基金 国家自然科学基金资助项目(No.61772148,No.61672441) 福建省自然科学基金资助项目(No.2018J01092)
关键词 云存储 雾计算 隐私保护 三级安全云存储 cloud storage fog computing privacy protection three-level secure cloud storage
  • 相关文献

参考文献8

二级参考文献218

  • 1刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 2王睿,杨欣宇.两种常用加密算法的研究[J].齐齐哈尔大学学报(自然科学版),2006,22(1):62-64. 被引量:1
  • 3王国军,王田,贾维嘉.无线传感器网络中一种基于行进启发的地理位置路由[J].传感技术学报,2007,20(2):382-386. 被引量:16
  • 4Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43.
  • 5Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html.
  • 6Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html.
  • 7Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177.
  • 8Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 9Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192.
  • 10Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192.

共引文献388

同被引文献15

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部