首页 | 本学科首页   官方微博 | 高级检索  
     

双云安全计算架构
引用本文:王强,陈剑锋,王剑锋. 双云安全计算架构[J]. 信息安全与通信保密, 2012, 0(4): 99-101
作者姓名:王强  陈剑锋  王剑锋
作者单位:1. 保密通信重点实验室,四川成都610041/中国电子科技集团公司第三十研究所,四川成都610041
2. 中国电子科技集团公司第三十研究所,四川成都,610041
基金项目:保密通信重点实验室基金资助项目
摘    要:针对现有安全技术对云计算数据外包保护的不足,提出一个可以应用于不可信商业云环境的数据外包计算和存储双云安全框架,用户通过一个可信任的云(可以是一个私有云或是通过多个安全硬件模块建立的云)来通信,可信的云加密并校验不可信云中存储的数据以及执行的操作。通过分离计算,把可信的云用来处理对时间不敏感的安全设置操作,同时用商业不可信云来处理大量的计算,从而实现安全的云计算数据外包。

关 键 词:安全云计算  密码协议  可验证外包  安全计算

An Architecture for Secure Cloud Computing
WANG Qiang,CHEN Jian-feng,WANG Jian-feng. An Architecture for Secure Cloud Computing[J]. China Information Security, 2012, 0(4): 99-101
Authors:WANG Qiang  CHEN Jian-feng  WANG Jian-feng
Affiliation:1Science and Technology on Communication Security Laboratory, Chengdu Sichuan 610041, China; 2Southwest Institute of Communications, Chengdu Sichuan 610041, China)
Abstract:A technical architecture for secure outsourcing of data and arbitrary computations in an entrusted commercial cloud environment is proposed. In this approach, the user could communicate with a trusted cloud(either a private cloud or a cloud based on multiple secure hardware modules) which encrypts and verifies the data stored and operations performed in the untrusted commercial cloud. By separating the computations the trusted cloud is principally used for security-critical operations in the less time-critical setup phase, while the entrusted commercial cloud employed for processing large quantity of computation, thus realizing the secure outsourcing of cloud-computing data.
Keywords:secure cloud computing  crypto protocol  verifiable outsourcing  secure computation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号