检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李晖[1] 孙文海[1] 李凤华[2] 王博洋[1]
机构地区:[1]综合业务网络理论与关键技术国家重点实验室(西安电子科技大学),西安710071 [2]中国科学院信息工程研究所,北京100093
出 处:《计算机研究与发展》2014年第7期1397-1409,共13页Journal of Computer Research and Development
基 金:国家自然科学基金项目(61272457;61170251);国家"八六三"高技术研究发展计划基金项目(2012AA013102);中央高校基本科研业务费专项基金项目(K50511010001)
摘 要:随着云计算技术的日益普及,公共云存储服务已经得到普遍的应用,DropBox、Google Drive、金山快盘等公共云存储应用的用户飞速增长.然而,用户对他们保存在云端数据的隐私性、完整性以及可控分享的关切也日益增长.针对这一问题,近年来学术界对公共云存储服务中数据的细粒度访问控制、密文搜索、数据完整性审计以及云存储数据的安全销毁等问题展开了大量研究.对云存储数据安全和隐私保护技术方向的研究进展进行综述,并指出待解决的关键问题.Cloud computing has been gradually considered the most significant turning point in the development of information technology during past few years. People reap the benefits from cloud, such as ubiquitous and flexible access, considerable capital expenditure savings, pay-as-yo'u-go computing resources configuration, etc. Many companies, organizations, and individual users have adopted the public cloud storage service to facilitate their business operations, research, or everyday needs. However, in the outsourcing cloud computing model, users' physical control of the underlying infrastructure including the system hardware and lower levels of software stack, is shifted to third- party public cloud service providers, such as Dropbox, Google Drive, Microsoft SkyDrive and so on. In addition, the sensitive data of users are also outsourced to and stored in the cloud, e. g. , they may upload emails, photos, financial reports, and health records to the cloud. Thus, the potential private information leakage and integrity of the outsourced data is one of the primary concerns for the cloud users. To build users' confidence in such cloud storage service paradigm, tons of attentions have been drawn and a number of related problems have been studied extensively in the literature, such as fine- grained cloud data access control mechanism, secure search over encrypted cloud data, outsourced data integrity auditing, secure deletion for cloud data, etc. , which ensure that cloud users enjoy the convenience the cloud offers in a privacy-preserving way. Otherwise, the cloud will become merely a remote storage which provides limited values to all parties. This paper focuses on the enabling and critical cloud computing security protection techniques and surveys on the recent researches in these areas. In addition, we further point out some unsolved but important challenging issues and hopefully provides insight into their possible solutions.
关 键 词:云存储 属性基加密 密文搜索 数据完整性审计 安全数据销毁
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.148.229.54