首页 | 本学科首页   官方微博 | 高级检索  
     

基于云计算数据查询的安全索引构建方法
引用本文:邢文凯.基于云计算数据查询的安全索引构建方法[J].沈阳工业大学学报,2018,40(2):198-202.
作者姓名:邢文凯
作者单位:1. 郑州大学 西亚斯国际学院, 河南 新郑 451150; 2. 商丘职业技术学院 计算机系, 河南 商丘 476100
基金项目:河南省科技计划资助项目(132300410445,172102210109)
摘    要:为了加强云计算数据查询的安全性,防止用户数据查询过程中过度访问和检索过程的数据泄露,提出一种云计算服务端的数据安全索引构建方法.对图状部署的云计算数据采用相似子图和哈希函数进行构造,通过特征子结构将被查询对象与索引图状数据进行对比,找出被查询对象.该方法可防止非查询对象的图状数据泄露,同时将哈希函数对节点进行了散列,提高了节点安全性.仿真结果表明,该方法数据查询效率高,耗费存储资源少,安全性好.

关 键 词:云计算  安全索引  图状数据  相似子图  特征子结构  图像向量  哈希函数  可达节点  

A construction method for security index based on data query in cloud computing
XING Wen-kai.A construction method for security index based on data query in cloud computing[J].Journal of Shenyang University of Technology,2018,40(2):198-202.
Authors:XING Wen-kai
Affiliation:1. Sias International University, Zhengzhou University, Xinzheng 451150, China; 2. Computer Science Department, Shangqiu Vocational College, Shangqiu 476100, China
Abstract:In order to enhance the security of data query in cloud computing and avoid the excessive access and data leakage in the process of user data query, a construction method for data security index at the cloud computing service side was proposed.The cloud computing data with graph deployment were constructed with the similar subgraph and Hash function, and the query objects and graph data were compared through the characteristic substructure to find the query objects.This method can prevent the graph data leakage of non query objects, and hash the Hash function to the nodes to improve the security of nodes.The results show that the method had high data query efficiency, low storage resource consumption and good security.
Keywords:cloud computing  security index  graph data  similar subgraph  characteristic substructure  image vector  Hash function  reachable node  
本文献已被 CNKI 等数据库收录!
点击此处可从《沈阳工业大学学报》浏览原始摘要信息
点击此处可从《沈阳工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号