期刊文献+

加密与密文检索云服务系统 被引量:1

Design of Open Cloud Service Method and System for Cipher-text Storage and Cipher-text Retrieval
在线阅读 下载PDF
导出
摘要 云存储将存储资源作为服务通过互联网提供给用户使用,是云计算中基础设施即服务的一种重要形式。云存储可以将众多廉价的存储介质整合为一个存储资源池,用户可以按自己对存储资源的实际需求量向云服务提供商租用池内资源,省去了本地的存储硬件及人员投入。同时,将存储的基础设施交由专业的云服务提供商来维护可以保证更好的系统稳定性。但是由于大部分云存储服务提供商存储在云端的文件是明文状态而且用户丧失了对数据的绝对控制权,因此针对云服务提供商的所有安全隐患都将直接关系到用户数据的安全性。文章全面分析了云服务系统中存在的安全隐患,提出了相应的应对措施,设计实现了一套密文存储与密文检索开放云服务方法和系统,打消了用户选用云方案的顾虑,对于促进云计算的发展、增加信息系统的使用效率都具有十分重要的意义。 Cloud storage provides storage resources as services to users through the Internet. It is an important form of infrastructure as a service in cloud computing. Cloud storage can consolidate many inexpensive storage me-dia into one storage resource pool. Users can rent pool resources to cloud service providers according to their actual demand for storage resources, eliminating local storage hardware and personnel investment. At the same time, maintaining the storage infrastructure with a professional cloud service provider can ensure better system stability. However, since most cloud storage service providers store files in the cloud in plain text and users lose absolute control over the data, all security risks for cloud service providers will directly affect the security of user data. The article comprehensively analyzes the hidden dangers in the cloud service system, proposes corresponding counter-measures, designs and implements a set of cipher text storage and cipher text retrieval open cloud service methods and systems, and dispels the concerns of users using cloud solutions. The development of cloud computing and the increasing efficiency of the use of information systems are of great significance.
作者 孙军 谈鹏图 林文兴 左晋佺 SUN Jun;TAN Peng-tu;LIN Wen-xing;ZUO Jin-quan(Shenzhen Cloudta Information Technology Co.,Ltd.,Shenzhen 518057,China;Jinan University,Guangzhou 510632,China)
出处 《软件》 2018年第10期92-96,共5页 Software
关键词 信息安全 密文存储 密文检索 云服务 Information security Cipher-text storage Cipher-text search Cloud service
  • 相关文献

参考文献12

二级参考文献88

  • 1王珊珊.计算机网络安全防范措施探讨[J].软件,2013,34(8). 被引量:11
  • 2Daryl Miller,辛磊夫(翻译).网络安全比加密更重要[J].软件,2007,28(1):60-60. 被引量:1
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1143

同被引文献19

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部