浏览全部资源
扫码关注微信
[ "周际援(1994- ),男,安徽蚌埠人,华侨大学硕士生,主要研究方向为雾计算、安全云存储。" ]
[ "罗皓(1994- ),男,广东惠州人,华侨大学硕士生,主要研究方向为无线传感网络、移动计算以及雾计算。" ]
[ "邱磊(1993- ),男,湖北十堰人,华侨大学硕士生,主要研究方向为无线传感网络、移动计算以及雾计算。" ]
[ "王田(1982- ),男,湖南汨罗人,博士,华侨大学教授、硕士生导师,主要研究方向为无线传感网络、移动计算以及雾计算。" ]
纸质出版日期:2019-03-30,
网络出版日期:2019-03,
移动端阅览
周际援, 罗皓, 邱磊, 等. 一种基于雾计算思想的私密性云存储方案[J]. 物联网学报, 2019,3(1):65-72.
JIYUAN ZHOU, HAO LUO, LEI QIU, et al. Privacy cloud storage scheme based on fog computing. [J]. Chinese journal on internet of things, 2019, 3(1): 65-72.
周际援, 罗皓, 邱磊, 等. 一种基于雾计算思想的私密性云存储方案[J]. 物联网学报, 2019,3(1):65-72. DOI: 10.11959/j.issn.2096-3750.2019.00087.
JIYUAN ZHOU, HAO LUO, LEI QIU, et al. Privacy cloud storage scheme based on fog computing. [J]. Chinese journal on internet of things, 2019, 3(1): 65-72. DOI: 10.11959/j.issn.2096-3750.2019.00087.
云存储作为云计算服务的核心应用之一,凭借其庞大的云服务器存储容量吸引了大量用户。然而,在这种存储模式下,用户将数据完全存储在云服务器上从而失去对数据的控制权,存在很大的隐私泄露风险。传统的隐私保护方案通常建立在加密基础上,但这类方法无法有效防范来自服务器内部的攻击,若密码被泄露则数据随之被泄露。提出一种基于雾计算模式的三级安全云存储方案,通过设计的 Hash-Solomon 编码算法,将少量数据存储在雾服务器及本地,既可以充分利用云服务强大的存储空间,又可以保护数据不被泄露。通过安全性理论分析和实验测试证明了所提方案的可行性,是对现有云存储方案的有力补充。
As one of the core applications in cloud computing field
cloud storage attracts a large number of users depending on its powerful storage capacity.However
in this storage schema
users’ data is stored completely in cloud server.In other word
users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology
but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised
users’ data will be stolen.In order to solve this problem
a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server
which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test
the feasibility of our scheme is proved
and it is really a powerful supplement to existing cloud storage scheme.
云存储雾计算隐私保护三级安全云存储
cloud storagefog computingprivacy protectionthree-level secure cloud storage
MELL P, GRANCE T . The NIST definition of cloud computing[J]. Communications of the ACM, 2011,53(6): 50.
WANG T, XING G, LI M ,et al. Efficient Wi-Fi deployment algorithms based on realistic mobility characteristics[C]// Mobile Ad hoc and Sensor Systems (MASS). IEEE, 2010: 422-431.
李晖, 孙文海, 李凤华 ,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014,51(7): 1397-1409.
LI H, SUN W H, LI F H ,et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014,51(7): 1397-1409.
肖亮, 李强达, 刘金亮 . 云存储安全技术研究进展综述[J]. 数据采集与处理, 2016,31(3): 464-472.
XIAO L, LI Q D, LIU J L . Survey on secure cloud storage[J]. Journal of Data Acquisition and Processing, 2016,31(3): 464-472.
MCELIECE R J, SARWATE D V . On sharing secrets and Reed-Solomon codes[J]. Communications of the ACM, 1981,24(9): 583-584.
PLANK J S, . T1:erasure codes for storage applications[C]// The 4th USENIX Conference on File and Storage Technologies. USENIX, 2005: 1-74.
黄汝维, 桂小林, 余思 ,等. 云环境中支持隐私保护的可计算加密方法[J]. 计算机学报, 2011,34(12): 2391-2402.
HUANG R W, GUI X L, YU S ,et al. Privacy-preserving computable encryption scheme of cloud computing[J]. Chinese Journal of Computers, 2011,34(12): 2391-2402.
BELLARE M, HOFHEINZ D, KILTZ E . Subtleties in the definition of IND-CCA:when and how should challenge decryption be disallowed[J]. Journal of Cryptology, 2015,28(1): 29-48.
成春香, 张伟, 徐涛 . 一种基于云存储的数据安全与隐私保护系统[J]. 北京信息科技大学学报(自然科学版), 2013(2): 87-90.
CHENG C X, ZHANG W, XU T . A data security and privacy protection system based on cloud storage[J]. Journal of Beijing Information Science and Technology University, 2013(2): 87-90.
侯清铧, 武永卫, 郑纬民 ,等. 一种保护云存储平台上用户数据私密性的方法[J]. 计算机研究与发展, 2011,48(7): 1146-1154.
HOU Q H, WU Y W, ZHENG W M ,et al. A method on protection of user data privacy in cloud storage platform[J]. Journal of Computer Research and Development, 2011,48(7): 1146-1154.
BARHAM P, DRAGOVIC B, FRASER K ,et al. Xen and the art of virtualization[C]// ACM SIGOPS Operating Systems Review. ACM, 2003,37(5): 164-177.
SHEN J, SHEN J, CHEN X F ,et al. An efficient public auditing protocol with novel dynamic structure for cloud data[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10): 2402-2415.
SHEN J, LIU D Z, SHEN J ,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities[J]. Pervasive Mobile Computing, 2017(41): 219-230.
傅颖勋, 罗圣美, 舒继武 . 安全云存储系统与关键技术综述[J]. 计算机研究与发展, 2013,50(1): 136-145.
FU Y X, LUO S M, SHU J W . Survey of secure cloud storage system and key technologies[J]. Journal of Computer Research and Development, 2013,50(1): 136-145.
BHUIYAN M Z A, WANG T, HAYAJNEH T ,et al. Maintaining the balance between privacy and data integrity in Internet of things[C]// The 2017 International Conference on Management Engineering,Software Engineering and Service Sciences. ACM, 2017: 177-182.
BONOMI F, MILITO R, ZHU J ,et al. Fog computing and its role in the Internet of things[C]// Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, 2012: 13-16.
STOJMENOVIC I, WEN S . The fog computing paradigm:scenarios and security issues[C]// Computer Science and Information Systems (FedCSIS). IEEE, 2014: 1-8.
曾建电, 王田, 贾维嘉 ,等. 传感云研究综述[J]. 计算机研究与发展, 2017,54(5): 925-939.
ZENG J D, WANG T, JIA W J ,et al. Survey of sensor-cloud[J]. Journal of Computer Research and Development, 2017,54(5): 925-939.
王田, 李洋, 贾维嘉 ,等. 传感云安全研究进展[J]. 通信学报, 2018,39(3): 35-52.
WANG T, LI Y, JIA W J ,et al. Research on security of sensor-cloud[J]. Journal of Communication, 2018,39(3): 35-52.
LAI Y X, XIE J S, LIN Z Y ,et al. Adaptive data gathering in mobile sensor networks using speedy mobile elements[J]. Sensors, 2015,15(9): 23218-23248.
WANG T, LI Y, WANG G J ,et al. Sustainable and efficient data collection from WSNs to cloud[J]. IEEE Transactions on Sustainable Computing, 2017: 1.
BERLEKAMP E R . Galois field computer:US4,162,480[P]. 1979.
BAKHTIARI S, SAFAVI-NAINI R, PIEPRZYK J . Cryptographic hash functions:a survey[J]. Centre for Computer Security Research, 1995(4): 95-109.
0
浏览量
598
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构