共查询到20条相似文献,搜索用时 0 毫秒
1.
存储在云端服务器中的敏感数据的保密和安全访问是云存储安全研究的重要内容.针对真实的云存储环境中云服务提供商不可信的情况,采用基于属性的加密算法,提出了一种安全、高效、细粒度的云存储密文访问控制方案.与现有方案相比,该方案在用户撤销时,通过引入广播加密技术,使得撤销用户即使和云服务提供商共谋,也不能对私钥进行更新,保证了数据的安全性;方案将大部分密文重加密和用户私钥更新工作转移给云服务提供商执行,在保证安全性的前提下,降低了数据属主的计算代价;另外该方案还可支持多用户的同时撤销.最后分析了方案的安全性和计算复杂性,并测试了用户撤销时的运行效率. 相似文献
2.
3.
在基于云计算的存储与删除服务中,由于外包数据所有权和管理分离,现有的逻辑删除机制使云上的数据很容易暴露给未经授权的用户,甚至云服务器可能未遵循用户要求删除相应数据.为此,该文提出一种细粒度的安全云端数据存储与删除方案.基于椭圆曲线构造了基于密文策略的属性基加密以实现外包数据细粒度访问控制,应用区块链实现可公开验证的安全数据删除.该文方案具有责任可追踪性以及两方删除与可验证性等特性.理论分析与实验结果表明该文方案具有较好的安全性和较高的性能,能够满足云数据共享与安全删除的需求. 相似文献
4.
5.
安全存储与云存储安全 总被引:1,自引:0,他引:1
王会波 《信息安全与通信保密》2010,(12):18-19
云存储是整个存储业发展的趋势。随着信息技术的高速发展和社会经济的发展进步,社会公众服务对信息化的依赖性越来越高,整个社会正逐步进入"数字化"社会,信息技术也已经进入"云"时代,而这些都对数据存储带来了爆炸式的增长,对传统存储系统带来了新的挑战,传统存储系统不管是在建设和运营成本方面还是在动态增长方面,都不能适应"绿色环保、节能减排"的社会发展步伐。 相似文献
6.
《电子学报:英文版》2016,(4):753-760
Due to the use of the cloud computing technology, the ownership is separated from the adminis-tration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing poli-cies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access con-trol conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC. 相似文献
7.
8.
Kotha Sita Kumari Rani Meesala Shobha Subedi Bharat Chunduru Anilkumar Karrothu Aravind Neupane Bipana Sathishkumar V E 《Wireless Personal Communications》2022,122(3):2161-2181
Wireless Personal Communications - In this paper, we derive the throughput of non orthogonal multiple access (NOMA) through reconfigurable intelligent surfaces (RIS) with energy harvesting. The... 相似文献
9.
In order to provide a practicable solution to data confidentiality in cloud storage service, a data assured deletion scheme, which achieves the fine grained access control, hopping and sniffing attacks resistance, data dynamics and deduplication, is proposed. In our scheme, data blocks are encrypted by a two-level encryption approach, in which the control keys are generated from a key derivation tree, encrypted by an All-Or- Nothing algorithm and then distributed into DHT network after being partitioned by secret sharing. This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an owner- specified data lifetime. Besides confidentiality, data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption. The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost. 相似文献
10.
11.
Wireless Personal Communications - At the beginning of its development, the Blockchain, with its own features, was commonly used in many areas. However, at the same time, its security problems are... 相似文献
12.
目前一些用户外包至云存储的数据面临着泄密风险,很多学者提出利用密钥管理员对数据加密后再外包,但相关协议并不能阻止密钥管理员截获并解密用户数据。针对该问题,将密钥管理员视为半可信第三方,构建了新的系统模型和安全模型,改进了利用密钥管理员加密数据的算法,提出基于半可信第三方的用户云数据安全存储协议(UKC),分别在单密钥管理员和多密钥管理员情形下设计了用户文件上传和下载的算法,有效地防止了来自密钥管理员的安全威胁,并节省运行时间开销。通过定理证明了本协议对密钥管理员攻击是IND-CCA安全的,性能仿真实验显示该协议的运行时间开销较低。 相似文献
13.
Bharat S. Rawal V. Vijayakumar Gunasekaran Manogaran R. Varatharajan Naveen Chilamkurti 《Wireless Personal Communications》2018,103(2):1161-1177
Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing security and integrity in cloud resources. Most security instruments have a finite rate of failure, and the intrusion comes with more complex and sophisticated techniques; the security failure rates are skyrocketing. In this paper, we have proposed a secure disintegration protocol (SDP) for the protection of privacy on-site and in the cloud. The architecture presented in this paper is used for cloud storage, and it is used in conjunction with our unique data compression and encoding technique. Probabilistic analysis is used for calculating the intrusion tolerance abilities for the SDP. 相似文献
14.
韦大伟 《微电子学与计算机》2006,23(Z1):46-48
结合对称加密技术和门限加密技术,提出了一种适用于分布式数据存储需要的有效的系统机密性保护方案,其中对称加密技术用于对所存储的文件进行加密,分布式门限加密技术则对对称加密方案中所用的密钥进行保护,可在不带来密钥存储问题情况下满足恶意环境中分布式数据存储系统的机密性要求。 相似文献
15.
基于Kademlia的云存储系统数据冗余方案研究 总被引:3,自引:0,他引:3
云存储是分布式存储技术与虚拟化技术结合的产物,是分布式存储技术的最新发展。云存储意味着存储可以作为一种服务,通过互联网提供给用户。相对于当前各种C/S计算模式的GFS、HDFS、Sector等云存储文件系统,提出了一种基于对等计算模式的云存储文件系统通用模型,并采用Kademlia算法构建了原型系统MingCloud。主要进行了存储系统冗余方案的选择与设计,实验中采用Cauchy Codes作为编码算法,分别从K桶大小对系统可用性影响、文件分块数量对系统可用性的影响、相同的冗余度下系统可用性比较等方面对系统进行了评估。与完全副本冗余模式相比,纠删码冗余模式能获得较理想的系统可用性,更适合应用于提议的对等云存储系统。 相似文献
16.
17.
Data sharing in Internet of Vehicles (IoV)makes it possible to provide personalized services for users by service providers in Intelligent Transportation System... 相似文献
18.
结合DiffServ网络QoS控制与AAA安全机制,文中设计了一种网络区域边界安全的MIPv6接入方案。方案采用AAA认证授权,实现MIPv6转交地址配置和应用层与网络层身份一一映射,为DiffServ区域提供了边界保护;采用应用层与网络层安全协同,减轻了边界路由安全负荷。 相似文献
19.
Wireless Personal Communications - Data storage has been one of the most prevalent services that has been offered by cloud computing. One of the challenges associated with data storage has been the... 相似文献
20.
大数据场景下的云存储技术与应用 总被引:1,自引:0,他引:1
文章认为随着大数据应用规模的扩大,新业务环境和场景对海量云存储需求的迫切,云存储平台需要打破原有的框架,改变组网和管理方式,以满足新的业务需求。文章分析了各种场景,提出了云存储的需求及关键技术等。文章指出大数据需求促进了云存储的发展,而云存储的发展则带动了新的业务应用。 相似文献