摘要
Cloud computing provides a variety of services and interfaces, then cloud service providers render various services to users through these services and interfaces deployed in their physical machines, and finally users can use these services and interfaces at a low cost without needing to spend much money buying and maintaining IT infrastructure. Even though the use of cloud storage services can help enterprises cut down expenses, and improve availability and reliability, enterprises still have doubt about the confidentiality and integrity of the data stored by them in the cloud. If lots of confidential information needs to be stored in the cloud, it must be first ensured that the third-party platform is creditable, data is transmitted safely and access right is under control. This paper aims to improve the safety of encryption and the efficiency of retrieval by encryption technologies and related methods.
Cloud computing provides a variety of services and interfaces, then cloud service providers render various services to users through these services and interfaces deployed in their physical machines, and finally users can use these services and interfaces at a low cost without needing to spend much money buying and maintaining IT infrastructure. Even though the use of cloud storage services can help enterprises cut down expenses, and improve availability and reliability, enterprises still have doubt about the confidentiality and integrity of the data stored by them in the cloud. If lots of confidential information needs to be stored in the cloud, it must be first ensured that the third-party platform is creditable, data is transmitted safely and access right is under control. This paper aims to improve the safety of encryption and the efficiency of retrieval by encryption technologies and related methods.
引文
[1]Dengguo Feng,Yu Qin,Wei Feng,Jianxiong Shao.The theory and practice in the evolution of trusted computing[J].Chinese Science Bulletin.2014(32)
[2]Annie H.Toderici,Mark Stamp.Chi-squared distance and metamorphic virus detection[J].Journal of Computer Virology and Hacking Techniques.2013(1)
[3]Lei Jiang,Xiao Zhang Zhang,Yu Jie Bai,Chang Liang Tang.The Design of High Available Single Sign-On Server of Nginx-Based[J].Applied Mechanics and Materials.2013(241)
[4]Patrick Cousot,Radhia Cousot,Laurent Mauborgne.Theories,solvers and static analysis by abstract interpretation[J].Journal of the ACM(JACM).2013(6)
[5]Wei Dong,Li Qian Chen.Recent advances on trusted computing in China[J].Chinese Science Bulletin.2012(35)
[6]Anoirel Issa.Anti-virtual machines and emulations[J].Journal in Computer Virology.2012(4)
[7]Jan Midtgaard.Control-flow analysis of functional programs[J].ACM Computing Surveys(CSUR).2012(3)
[8]Ren,Kui,Wang,Cong,Wang,Qian.Security Challenges for the Public Cloud[J].IEEE Internet Computing.2012(1)
[9]Blass W O,Pietro R D,Refik M,et al.PRISM-Privacy-preserving search in Map Reduce.Privacy Enhancing Technologies.2012
[10]Hovav Shacham,Brent Waters.Compact Proofs of Retrievability[J].Journal of Cryptology.2013(3)
[11]Klaus Julisch,Michael Hall.Security and Control in the Cloud.Information Security Journal:A Global Perspective.2010
[12]Fei Chen,Alex X.Liu.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACM Transactions on Networking(TON).2012(6)