浏览全部资源
扫码关注微信
福建师范大学 软件学院,福建 福州 350108
[ "熊金波[通信作者](1981-),男,湖南益阳人,福建师范大学讲师,主要研究方向为云数据安全与隐私保护技术。E-mail:jinbo810@163.com。" ]
[ "沈薇薇(1991-),女,福建诏安人,福建师范大学硕士生,主要研究方向为云数据安全与隐私保护技术。" ]
[ "黄阳群(1991-),女,福建永泰人,福建师范大学硕士生,主要研究方向为信息安全。" ]
[ "姚志强(1967-),男,福建莆田人,福建师范大学教授,主要研究方向为信息安全。" ]
网络出版日期:2015-11,
纸质出版日期:2015-11-25
移动端阅览
熊金波, 沈薇薇, 黄阳群, 等. 云环境下的数据多副本安全共享与关联删除方案[J]. 通信学报, 2015,36(Z1):136-140.
Jin-bo XIONG, Wei-wei SHEN, Yang-qun HUANG, et al. Security sharing and associated deleting scheme for multi-replica in cloud[J]. Journal on communications, 2015, 36(Z1): 136-140.
熊金波, 沈薇薇, 黄阳群, 等. 云环境下的数据多副本安全共享与关联删除方案[J]. 通信学报, 2015,36(Z1):136-140. DOI: 10.11959/j.issn.1000-436x.2015292.
Jin-bo XIONG, Wei-wei SHEN, Yang-qun HUANG, et al. Security sharing and associated deleting scheme for multi-replica in cloud[J]. Journal on communications, 2015, 36(Z1): 136-140. DOI: 10.11959/j.issn.1000-436x.2015292.
针对共享在公共云环境的用户数据因所有权与管理权分离而导致的用户隐私泄露问题,结合对称加密算法、属性加密算法和副本定位技术,提出一种云环境下的数据多副本安全共享与关联删除方案,对用户数据进行加密等处理封装成副本关联对象(RAO
replication associated object),随后将RAO共享到云服务商,建立副本关联模型对 RAO 所产生副本进行管理并实现关联删除。分析表明方案是安全与有效的,能够对用户共享的数据及其副本进行安全共享与关联删除,有效保障了数据多副本的隐私安全。
In order to protect the privacy of data stored in public cloud environment
a security sharing and associated deleting scheme for multi-replica was proposed
which was based on symmetric encryption algorithm
attribute encryption algorithm and replica location technology.In this security scheme
the user’s data was first encrypted and encapsulated into the replication associated objects (RAO)
then the RAO was shared in cloud service provider and managed by the replica correlation model.The comprehensive analyses show that the scheme is security and effective
and is able to support the data security sharing and associated deleting for multi-replica to protect the data privacy.
WANG G J , YUE F S , LIU Q . A secure self-destructing scheme for electronic data [J ] . Journal of Computer and System Sciences , 2013 , 79 ( 2 ): 279 - 290 .
熊金波 , 姚志强 , 马建峰 , 等 . 面向网络内容隐私的基于身份加密的安全自毁方案 [J ] . 计算机学报 , 2014 , 37 ( 1 ): 139 - 150 .
XIONG J B , YAO Z Q , MA J F , et al . A secure self-destruction scheme with IBE for the internet content privacy [J ] . Chinese Journal of Computers , 2014 , 37 ( 1 ): 139 - 150 .
田荣阳 . 数据网格中的副本定位及选择服务 [D ] . 重庆:重庆大学 , 2006 .
TIAN R Y . Replica Location in the Grid Location and Selection Service [D ] . Chongqing:Chongqing University , 2006 .
MERKLE R C . One way hash functions and DES [J ] . Lecture Notes in Computer Science , 1990 , 435 : 428 - 446 .
XIONG J B , LI F H , MA J F , et al . A full lifecycle privacy protection scheme for sensitive data in cloud computing [J ] . Peer-to-Peer Networking and Applications , 2015 , 8 ( 6 ): 1025 - 1037 .
TANG Y , LEE P P C , LUI J C S , et al . FADE:secure overlay cloud storage with file assured deletion [A ] . Security and Privacy in Communication Networks [C ] . 2010 . 380 - 397 .
PERLMAN R . File system design with assured delete [A ] . IEEE International Security in Storage Workshop [C ] . 2005 .88.
TANG Y , LEE P P C , LUI J C S , et al . Secure overlay cloud storage with access control and assured deletion [J ] . IEEE Transactions on,Dependable and Secure Computing , 2012 , 9 ( 6 ): 903 - 916 .
GEAMBASU R , KOHNO T , LEVY A A , et al . Vanish:increasing data privacy with self-destructing data [A ] . USENIX Security Symposium [C ] . 2009 . 299 - 316 .
熊金波 , 姚志强 , 马建峰 , 等 . 基于属性加密的组合文档安全自毁方案 [J ] . 电子学报 , 2013 , 42 ( 2 ): 366 - 376 .
XIONG J B , YAO Z Q , MA J F , et al . A secure self-destruction scheme for composite documents with attribute based encryption [J ] . Acta Electronica Sinica , 2013 , 42 ( 2 ): 366 - 376 .
姚志强 , 熊金波 , 马建峰 , 等 . 云计算中一种安全的电子文档自毁方案 [J ] . 计算机研究与发展 , 2014 , 51 ( 7 ): 1417 - 1423 .
XIONG J B , YAO Z Q , MA J F , et al . A secure electronic document self-destructing scheme in cloud computing [J ] . Journal of Computer Research and Development , 2014 , 51 ( 7 ): 1417 - 1423 .
XIONG J B , YAO Z Q , MA J F , et al . A secure document self-destruction scheme with identity based encryption [A ] . Proc of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems [C ] . 2013 . 239 - 243 .
王丽娜 , 任正伟 , 余荣威 , 等 . 一种适于云存储的数据确定性删除方法 [J ] . 电子学报 , 2012 , 40 ( 2 ): 266 - 272 .
WANG L N , REN Z W , YU R Z , et al . A data assured deletion approach adapted for cloud storage [J ] . Acta Electronica Sinica . 2012 , 40 ( 2 ): 266 - 272 .
XIONG J B , LIU X M , YAO Z Q , et al . A secure data self-destructing scheme in cloud computing [J ] . IEEE Transactions on Cloud Computing , 2014 , 2 ( 4 ): 448 - 458 .
李东升 , 李春江 , 肖依 , 等 . 数据网格环境下一种动态自适应的副本定位方法 [J ] . 计算机研究与发展 , 2003 , 40 ( 12 ): 1775 - 1780 .
LI D S , LI C J , XIAO N , et al . Dynamic self-adaptive replica location method in data grids [J ] . Journal of Computer Research and Development , 2003 , 40 ( 12 ): 1775 - 1780 .
刘田甜 , 李超 , 胡庆成 , 等 . 云环境下多副本管理综述 [J ] . 计算机研究与发展 , 2011 , S3 : 254 - 260 .
LIU T T , LI C , HU Q C , et al . Multiple-replicas management in the cloud environment [J ] . Journal of Computer Research and Development , 2011 , S3 : 254 - 260 .
苏金树 , 曹丹 , 王小峰 , 等 . 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
WHITE T . Hadoop:the definitive guide [J ] . O’reilly Media Inc Gravenstein Highway North , 2010 , 215 ( 11 ): 1 - 4 .
0
浏览量
799
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构