检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:庞家乐 张彦[1] PANG Jia-le;ZHANG Yan(Beijing Jiaotong University,Beijing 100044,China)
机构地区:[1]北京交通大学,北京100044
出 处:《计算机仿真》2022年第9期483-486,506,共5页Computer Simulation
摘 要:传统云存储数据加密技术忽略了对云数据的二次删重,导致云存储数据冗余问题严重,无法实现完全外包,抵抗多种攻击的能力较差。现提出支持完全外包的云存储数据加密技术。通过Fourier变换高阶累积量算法检测云存储数据中的重复数据,选取4阶累积量后置处理方法删除检测结果中的重复数据。通过引入4阶累积量切片后置聚集操作过程,将每个文件分为若干数据块,完成二次删重。采用支持完全外包的云存储数据属性基加密技术构建加密方案,并在方案中通过8个实体实现数据的加密、解密以及存储,获得加密后的数据明文消息,完成云存储数据加密。经仿真验证,上述技术能够在读取磁盘次数较少情况下实现数据重删,且加密耗时较低,能够抵抗多种攻击,安全性较好。Traditionally, some encryption technologies ignore the secondary deduplication for cloud data. In this way, it will cause a series of data redundancy problems in cloud storage. This paper proposed a cloud storage data encryption technology based on full outsourcing. The high-order cumulant algorithm based on Fourier transform was used to detect the duplicate data in cloud storage data, and then the post-processing method based on fourth-order cumulants was adopted to delete the duplicate data in detection results. After introducing the post-aggregation of fourth-order cumulant slices, each file was divided into several data blocks, thus completing the secondary deduplication. On this basis, the fully outsourced attribute-based encryption technology for cloud storage data was adopted to formulate an encryption scheme. In this scheme, data encryption, decryption, and storage were implemented through eight entities. Finally, the plaintext message of encrypted data was obtained. Thus, the cloud storage data encryption was completed. Simulation results prove that our technology can realize data deduplication with fewer disk reads, and the encryption time is low. In addition, this technology can resist various attacks with better security.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.147