期刊文献+

基于第三方可信平台的混合云安全存储系统构建 被引量:4

Research on Security of Hybrid Cloud Based on Trusted Computing Technology
下载PDF
导出
摘要 文章首先分析了现实中混合云存在的安全问题:由于混合云的开放性,云服务器的管理者与外部攻击者能够直接或间接获取用户数据,特别是用户敏感数据,从而造成用户隐私数据泄漏与滥用。文章结合可信计算技术对各问题做出解决,并给出具体的操作步骤:身份认证中为用户划分信用组别,同时也对混合云上的各种应用和事项进行登记评估;存储中将数据分开处理,采用全同态加密算法加密数据后再对其进行操作,并对服务器数据的完整持有进行验证,保障数据正确持有;跨云身份认证中由第三方认证平台管理用户身份,用户跨云无需多次认证。然后对此方案的性能进行分析,说明此方案适用于用户变化不大的一般性企业。最后,对可行性、数据安全性、数据可用性、用户隐私安全、效率性等指标与现有研究方案进行比较,表明此混合云安全存储系统具有更好的优越性。 In this paper, author analyzes the security problems of the hybrid cloud. Because of the openness of the hybrid cloud, cloud server management and external attackers can directly or indirectly get the user data, especially the user sensitive data, which causes the user's privacy data leakage and abuse. This paper gives a concrete operation steps: the identification of various applications and issues of the hybrid cloud, and then uses the full encryption algorithm to verify the server data and ensure the correct data hold; the authentication platform management user identity, users across the cloud without multiple authentication. Then the performance of the scheme is analyzed, which shows that the scheme is suitable for the general enterprises with little change. Finally, author analyzes the feasibility, data security, data availability, user privacy and security, efficiency and other indicators of the existing research programs are compared, which shows that the hybrid cloud security storage system has better advantages.
出处 《信息网络安全》 2015年第12期28-33,共6页 Netinfo Security
基金 国家自然科学基金[2011BAH14B04] 中央财政支持地方发展高效基金[黔财教2012118] 贵阳市科技局振兴科技计划项目
关键词 可信计算技术 可信计算平台 混合云 混合云安全 trusted computing technology trusted computing platform hybrid cloud hybridcloud security
  • 相关文献

参考文献12

二级参考文献113

  • 1李晓勇,沈昌祥.一个动态可信应用传递模型的研究[J].华中科技大学学报(自然科学版),2005,33(z1):310-312. 被引量:14
  • 2D Gannon. Headintheeloud[J]. nature, 2007.
  • 3N Santos, K P Gummadi, R Rodrigues. Towards trusted cloud computing[ C]. In :Sahu S,ed, USENIX Association Prec. of the Workshop on Hot Topics in Cloud Computing 2009, San Diego http :// www. usenix, org,/events/hotcloud09techfull_papers/santos. pdf, 2009.
  • 4Trusted Computing Group. Trusted Platform Module Main Specification. Version 1. 2 [ DB]. http:/ / www. t rustedcomputinggroup, org/ groups/tpm/ , 2008.
  • 5Bessani AN, Correia MID, QuaresmaB, et al. DepSky: Dependa- ble and secure storage in a cloud-of-clouds [C] //Proceedings of the 6th Conference on Computer Systems, 2011 = 31-46.
  • 6Wilcox-O'Hearn Z, Warner B. Tahoe The ].east-authority filesystem [C] //4th ACM International Workshop on Storage Security and Survivability, 2008: 21-26.
  • 7Bowers KD, Juels A, Oprea A. HAIL: A high-availability and integrity layer for cloud storage [C] //16th ACM Confe- rence on Computer and Communications Security, 2009: 187-198.
  • 8Daniel Slamanig, Christian Hanser. On cloud storage and the cloud of clouds approach [C] //Tth International Conference for Internet Technology and Secured Transactions, 2012: 649-655.
  • 9Raykova M, Zhao H, Bellovin S. Privacy enhanced access control for outsourced data sharing [C] //Financial Cryptogra- phy and Data Security, 2012: 223-238.
  • 10Dai Jiazhu, Luo Shuangyan, Liu Hongxia. A privacy-preser- ving access control in outsourced storage services [C] //Com-puter Science and Automation Engineering, 2011: 247-251.

共引文献87

同被引文献30

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部