用户名: 密码: 验证码:
Cloud Storage, Encryption and Retrieval
详细信息    查看官网全文
摘要
Cloud computing provides a variety of services and interfaces, then cloud service providers render various services to users through these services and interfaces deployed in their physical machines, and finally users can use these services and interfaces at a low cost without needing to spend much money buying and maintaining IT infrastructure. Even though the use of cloud storage services can help enterprises cut down expenses, and improve availability and reliability, enterprises still have doubt about the confidentiality and integrity of the data stored by them in the cloud. If lots of confidential information needs to be stored in the cloud, it must be first ensured that the third-party platform is creditable, data is transmitted safely and access right is under control. This paper aims to improve the safety of encryption and the efficiency of retrieval by encryption technologies and related methods.
Cloud computing provides a variety of services and interfaces, then cloud service providers render various services to users through these services and interfaces deployed in their physical machines, and finally users can use these services and interfaces at a low cost without needing to spend much money buying and maintaining IT infrastructure. Even though the use of cloud storage services can help enterprises cut down expenses, and improve availability and reliability, enterprises still have doubt about the confidentiality and integrity of the data stored by them in the cloud. If lots of confidential information needs to be stored in the cloud, it must be first ensured that the third-party platform is creditable, data is transmitted safely and access right is under control. This paper aims to improve the safety of encryption and the efficiency of retrieval by encryption technologies and related methods.
引文
[1]Dengguo Feng,Yu Qin,Wei Feng,Jianxiong Shao.The theory and practice in the evolution of trusted computing[J].Chinese Science Bulletin.2014(32)
    [2]Annie H.Toderici,Mark Stamp.Chi-squared distance and metamorphic virus detection[J].Journal of Computer Virology and Hacking Techniques.2013(1)
    [3]Lei Jiang,Xiao Zhang Zhang,Yu Jie Bai,Chang Liang Tang.The Design of High Available Single Sign-On Server of Nginx-Based[J].Applied Mechanics and Materials.2013(241)
    [4]Patrick Cousot,Radhia Cousot,Laurent Mauborgne.Theories,solvers and static analysis by abstract interpretation[J].Journal of the ACM(JACM).2013(6)
    [5]Wei Dong,Li Qian Chen.Recent advances on trusted computing in China[J].Chinese Science Bulletin.2012(35)
    [6]Anoirel Issa.Anti-virtual machines and emulations[J].Journal in Computer Virology.2012(4)
    [7]Jan Midtgaard.Control-flow analysis of functional programs[J].ACM Computing Surveys(CSUR).2012(3)
    [8]Ren,Kui,Wang,Cong,Wang,Qian.Security Challenges for the Public Cloud[J].IEEE Internet Computing.2012(1)
    [9]Blass W O,Pietro R D,Refik M,et al.PRISM-Privacy-preserving search in Map Reduce.Privacy Enhancing Technologies.2012
    [10]Hovav Shacham,Brent Waters.Compact Proofs of Retrievability[J].Journal of Cryptology.2013(3)
    [11]Klaus Julisch,Michael Hall.Security and Control in the Cloud.Information Security Journal:A Global Perspective.2010
    [12]Fei Chen,Alex X.Liu.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACM Transactions on Networking(TON).2012(6)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700