期刊文献+

基于递归秘密共享的可靠云存储方案

A Reliable Cloud Storage Scheme Based on Recursive Secret Sharing
下载PDF
导出
摘要 现有云存储方案无法兼顾冗余存储、数据机密性和存储开销等多方面因素,给诸多用户带来困扰。为克服现有方案的不足,提出一个高效可靠的云存储方案,该方案既能实现数据冗余存储又能保证数据机密性,且不会带来存储空间的剧增。文章给出方案的框架且对方案进行具体的描述,然后从机密性、冗余性和存储开销等方面对方案进行分析,得出本方案可靠性和高效性的优势。 The existing cloud storage schemes can't balance redundant storage, data confidentiality and storage costs which troubled many users. In order to overcome the deficiencies of the existing cloud storage scheme, we proposed a reliable cloud storage scheme which suitable for the characteristics of digital library resources. The scheme can realize data redundant storage and can guarantee data confidentiality. In addition, the scheme will not bring a surge in storage space. This paper not only gives a framework of the scheme but also gives a detailed description of the specific scheme. Then, we make an analysis from the confidentiality, redundancy and storage cost etc. of the scheme to improve its reliability and high efficiency.
作者 王家玲
机构地区 铜陵学院
出处 《铜陵学院学报》 2015年第6期110-113,共4页 Journal of Tongling University
关键词 云存储 秘密共享 冗余存储 cloud storage secret sharing redundant storage
  • 相关文献

参考文献12

  • 1Hayes B.Cloud Computing[J].Communications of the ACM,2008,51(7):9-11.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 3侯孟书,王晓斌,卢显良,任立勇.一种新的动态副本管理机制[J].计算机科学,2006,33(9):50-51. 被引量:13
  • 4Weatherspoon H,Kubiatowicz J.Erasure coding vs replication:quantitative comparison[M].In:Proc of the 1st Int'l Workshop Peer-to-Peer Systems,2002.
  • 5Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 6Blakley G.Safeguarding Cryptographic Keys[C].Proceedings of the National Computer Conference,Montvale:NCC,1979:242-268.
  • 7Asmuth C.,Bloom J..A Modular Approach to Key Safeguarding[J].IEEE Transactionson Information Theory,1983,29(2):208-2I0.
  • 8Karnin E.D.,Green J.W.,Hellman M.E..On Sharing Secret Systems[C].IEEE Transactions on Information Theory,1983,29(1):35-41.
  • 9Feldman P.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].Proceeding of 28th IEEE symposium on Foundations of computer science,Canada:IEEE,1987.427-437.
  • 10Parakh A,Kak S.Space efficient secret sharing for implicit data security[J].Information Sciences,2011,181(2):335-341.

二级参考文献33

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1083

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部