期刊文献+

基于改进密钥的云计算数据安全存储策略设计 被引量:6

Design of cloud computing data security storage strategy based on improved secret key
在线阅读 下载PDF
导出
摘要 由于云计算环境下的数据量较大,存在的数据特征具有动态变化特性。传统的安全存储方法通过低维映射得到的密钥空间相对较小、安全性不高、很容易被破解,导致存储的安全性能差。提出基于改进密钥的云计算数据安全存储策略,给出帐篷映射和猫映射的一般描述,将其由实数域转换成整数域进行整数运算。引入帐篷映射和猫映射获取改进密钥参数,得到经初始迭代后的密钥,对得到的结果进行取余运算和异或运算,得到密文字节并验证是否均加密完成,判断是否结束迭代,实现对云计算数据的安全存储。实验结果表明,所提策略不仅安全存储性能较高,而且所需时间少,不增加云计算系统的负担。 As the data size is large in cloud computing environment and the existing data has the dynamic change character- istics, the cloud computing data security storage strategy based on the improved secret key is proposed because the traditional se- cure storage method obtains the relatively small key space by low dimensional mapping, which may cause low security, is easy to crack, and makes the storage security worse. The general description of tent mapping and cat mapping is given in this paper. It converts the real number domain to the integer domain to make integer arithmetic. The tent mapping and cat mapping are im- ported to improve the secret key parameters, and get the primarily-iterated secret key. The complementation operation and xor operation for the obtained results are conducted to acquire even encryption cipher byte and verify whether the even encryption is completed, and judge whether the iteration should be finished. In this way, the security storage of cloud computing data is achieved. The experimental resuhs show that the proposed strategy has not only higher safe storage performance, but also needs less time, and does not increase the burden of cloud computing system.
作者 熊俊
出处 《现代电子技术》 北大核心 2016年第20期31-34,共4页 Modern Electronics Technique
基金 国家自然科学基金(60475022)
关键词 改进密钥 云计算数据 安全存储 帐篷映射 猫映射 improved secret key cloud computing data safe storage tent mapping cat mapping
  • 相关文献

参考文献9

二级参考文献80

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 3付雄,程文青,郎为民,谭运猛,熊志强.安全电子支付系统研究[J].计算机科学,2005,32(1):108-110. 被引量:16
  • 4罗碧强,李斌.一种改进的图像重组算法及其硬件实现[J].中国集成电路,2007,16(7):71-74. 被引量:2
  • 5杨洋.存储层:动态数据、静态数据分而制之.中国计算机报.2008.09-22.
  • 6Wang G J, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud computing. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2010.
  • 7De Capitani di Vimercati S, Foresti S, Jajodia S, et al. Encryption- based policy enforcement for cloud storage. Proceedings of IEEE the 30th International Conference on Distributed Computing Systems Workshops, Genova, Italy, 2010:42-51.
  • 8密钥管理:云计算系统保护数据的核心机制.http://wwwciotimes.eom/eloud/eaq/52436.html,2011.
  • 9王天予.同态加密用于云端数据泄露或成往事.http://wwwenet.conrcn/article/201I/0809/A20l10809895739.shtml,2011.
  • 10Amazon simple storage service (Amazon S3).http://aws.amazon. corn/s3/.

共引文献99

同被引文献25

引证文献6

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部