检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王永建 宋爱波[1] 叶亚伟 姜海波 WANG Yongjian SONG Aibo YE Yawei JIANG Haibo(School of Computer Science and Engineering, Southeast University, Nanjing 211189, China China International Telecommunication Construction Group Design Institute Co.,Ltd., Beijing 100079, China State Grid Henan Electric Power Company Maintenance Company, Zhengzhou 450052, China)
机构地区:[1]东南大学计算机科学与工程学院,江苏南京211189 [2]中国通信建设集团设计院有限公司,北京100079 [3]国网河南省电力公司检修公司,河南郑州450052
出 处:《电信科学》2017年第10期71-80,共10页Telecommunications Science
基 金:国家自然科学基金资助项目(No.61173138)~~
摘 要:"互联网+"催生了许多新的经济形态与商业模式,公有云面临着严峻的安全挑战。研究了公有云数据安全问题,并提出了研究思路。首先,分析了同态加密的概念、加法同态加密与乘法同态加密的特点以及当前的研究成果和需要解决的难题。然后,根据乘法同态加密算法、散列表和相似性理论,提出了一种数据安全保护方案,并阐述了具体实现流程,采用欧氏距离检验公有云中加密数据的相似性与完整性。最后,理论分析了该方案的正确性与安全性。仿真实验验证了该方案的可行性与有效性。"Intemet plus" has given birth to many new economic forms and business models, the public cloud faces a serious security challenges. The security of public cloud data was studied and the research ideas were put forward. Firstly, the concept of homomorphic encryption, the characteristics of additive homomorphic encryption and multip- licative homomorphic encryption, and the current research results and difficult problems to be solved were analyzed. Then, based on the multiplicative homomorphic encryption algorithm, hash table and similarity theory, a data security protection scheme was proposed, and the concrete realization process was described. The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance. Finally, the correctness and security of the scheme were analyzed by theory. The simulation results verify the feasibility and validity of the scheme.
分 类 号:TN919.8[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.143.203.21