山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 83-89.doi: 10.6040/j.issn.1671-9352.2.2014.262
蔡红云, 田俊峰
CAI Hong-yun, TIAN Jun-feng
摘要: 云计算是当前IT领域正在发生的深刻变革,它在提高使用效率和降低使用成本的同时,带来了极大的安全挑战,其中隐私保护问题首当其冲。分析了云计算中隐私风险产生原因,指出了云计算中隐私保护应解决的关键问题,回顾并总结了当前国内、外在云隐私保护领域的主流技术及研究现状,探讨了云隐私保护领域仍然存在的问题并对未来研究方向进行了展望。
中图分类号:
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011, 22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83. [2] ALMULLA S A,CHAN Y Y.Cloud computing security management[C]//Proceedings of the 2nd International Conference on Engineering System Management and Applications (ICESMA 2010). Piscataway: IEEE, 2010:1-7. [3] HUANG Ruwei, GUI Xiaolin, YU Si, et al. Study of privacy-preserving framework for cloud storage[J]. Computer Science and Information Systems, 2011, 8(3): 801-819. [4] 中国公共云发展现状[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687e21af45a9b7.html. The development status of Chinese public cloud[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687-e21af45a9b7.html. [5] RISTENPART T,TROMER E,SHACHAM H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: Springer Press, 2009:199-212. [6] VIKTOR M S, KENNETH C. Big data:a revolution that will transform how we live,work and think[M]. Boston: Houghton Mifflin Harcourt, 2013. [7] HASSAN T, JAMES B D, GAIL J A. Security and privacy challenges in cloud computing environments[J].IEEE Security & Privacy, 2010, 8(6):24-31. [8] PEARSON S.Taking account of privacy when designing cloud computing services[C]. Proceedings of the Workshop on Software Engineering Challenges of Cloud Computing. Washington: IEEE Computer Society, 2009:44-52. [9] KAMARA S, LAUTER K.Cryptographic cloud storage [J]. Lecture Notes in Computer Science, 2010, 6054:136-149. [10] LI Min, ZANG Wanyu, BAI Kun, et al.MyCloud-supporting user-configured privacy protection in cloud computing[C]//Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC 2013).[S.l.]:[s.n.], 2013:59-68. [11] RAY C, GANGULY U. An approach for data privacy in hybrid cloud environment[C]//Proceedings of the 2nd International Conference on Computer and Communication Technology (ICCCT 2011). Piscataway: IEEE, 2011:316-320. [12] CHUANG I H,LI S H,HUANG K C, et al. An effective privacy protection scheme for cloud computing[C]//Proceedings of the 13th International Conference on Advanced Communication Technology (ICACT 2011). Piscataway: IEEE, 2011:260-265. [13] ITANI W, KAYSSI A, CHEHAB A. Privacy as a service: privacy-aware data storage and processing in cloud computing architectures[C]//Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09). Los Alamitos: IEEE Computer Society, 2009:711-716. [14] 徐小龙,周静岚,杨庚.一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013, 40(2):98-102. XU Xiaolong, ZHOU Jinglan, YANG Geng. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013, 40(2):98-102. [15] LIN Dan, SQUICCIARINI A. Data protection models for service provisioning in the cloud[C]//Proceedings of the 15th ACM Symposium on Access Control Models and Technologies(SACMAT 2010). New York: ACM Press, 2010:183-192. [16] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of 2009 ACM Symposium on Theory of Computing (STOC'09). New York: ACM Press, 2009:169-178. [17] SADEGHI A R, SCHNEIDER T, WINANDY M.Token-based cloud computing secure outsourcing of data and arbitrary computations with lower latency [J]. Lecture Notes in Computer Science, 2010, 6101:417-429. [18] WANG Cong, WANG Qian, REN Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9. [19] NAEHRIG M,LAUTER K,VAIKUNTANATHAN V.Can homomorphic encryption be practical?[C]//Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. New York: ACM Press, 2011:113-124. [20] 光焱,祝跃飞,顾纯祥,等.一种针对全同态加密体制的密钥恢复攻击[J].电子与信息学报,2013, 35(12):2999-3004. GUANG Yan, ZHU Yuefei, GU Chunxiang, et al. A key recovery attack on fully homomorphism encryption scheme[J]. Journal of Electronics & Information Technology, 2013, 35(12):2999-3004. [21] PEARSON S,SHEN Y,MOWBRAY M.A privacy manager for cloud computing [J]. Cloud Computing, 2009, 5931:90-106. [22] MOWBRAY M, PEARSON S. A client-based privacy manager for cloud computing[C]//Proceedings of the 4th International ICST Conference on Communication System Software and Middle-ware. [S.l.]:[s.n.], 2009: 1-8. [23] LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]//Proceedings IEEE INFOCOM. New York: IEEE, 2010: 1-5. [24] CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233. [25] 黄汝维,桂小林,余思,等.支持隐私保护的云存储框架设计[J].西安交通大学学报,2011, 45(10):1-6, 12. HUANG Ruwei, GUI Xiaolin, YU Si, et al. Design of cloud storage framework with privacy-preserving[J]. Journal of Xi'an Jiaotong University, 2011, 45(10):1-6, 12. [26] 程芳权,彭智勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012, 35(11):2215-2227. CHENG Fangquan, PENG Zhiyong, SONG Wei, et al. An efficient privacy-preserving rank query over encrypted data in cloud computing[J]. Chinese Journal of Computers, 2012, 35(11):2215-2227. [27] CHEN Chih-Yung, TU Jih-Fu. A novel cloud computing algorithm of security and privacy [J]. Mathematical Problems in Engineering, 2013: 871430.1-871430.6. [28] YU Shucheng, WANG Cong, REN Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9. [29] 孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011, 32(7):146-152. SUN Guozi, DONG Yu, LI Yun. CP-ABE based data access control for cloud storage [J]. Journal on Communications, 2011, 32(7): 146-152. [30] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011, 32(7):125-132. HONG Cheng, ZHANG Min, FENG Dengguo. Achieving efficient dynamic cryptographic access control in cloud storage[J]. Journal on Communications, 2011, 32(7):125-132. [31] 杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011, 32(7):169-175. YANG Liu, TANG Zhuo, LI Renfa, et al. Roles query algorithm in cloud computing environment based on user require[J]. Journal on Communications, 2011, 32(7):169-175. [32] 黄勤龙,马兆丰,傅镜艺,等.云计算环境中支持隐私保护的数字版权保护方案[J].通信学报,2014, 35(2):95-103. HUANG Qinlong, MA Zhaofeng, FU Jingyi, et al. Privacy-preserving digital rights management scheme in cloud computing [J]. Journal on Communications, 2014, 35(2):95-103. [33] 陈海波.云计算平台可信性增强技术的研究 [D]. 上海:复旦大学,2008. CHEN Haibo. Improving the dependability of cloud computing systems [D].Shanghai: Fudan University, 2008. [34] 张逢喆,陈进,陈海波,等.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011, 48(7):1155-1167. ZHANG Fengzhe, CHEN Jin, CHEN Haibo, et al. Lifetime privacy and self-Destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011, 48(7):1155-1167. [35] PATEL A, DANSENA P. TPM as a middleware for enterprise data security [J]. International Journal of Computer Science and Mobile Computing, 2013, 2(7):327-332. [36] 张坤.面向多租户应用的云数据隐私保护机制研究[D].济南:山东大学,2012. ZHANG Kun. Research on cloud data privacy preservation mechanism for multi-tenancy applications[D]. Jinan: Shandong University, 2012. [37] BERTINO E, PACI F, FERRINI R, et al. Privacy-preserving digital identity management for cloud computing[C].IEEE Computer Society Data Engineering Bulletin,2009, 32(1):1-4. [38] HWANG M, KWAK J. Improved user-centric ID management model for privacy protection in cloud computing [J]. International Journal of Computer and Network Security, 2010, 2(8):45-49. [39] JUNG Taeho, LI Xiangyang, WAN Zhiguo, et al. Privacy preserving cloud data access with multi-authorities[C]//Proceedings of 2013 IEEE INFOCOM. New York: IEEE, 2013: 2625-2633. [40] LI X H, HE J S, ZHANG T. A service-oriented identity authentication privacy protection method in cloud computing[J]. International Journal of Grid and Distributed Computing, 2013, 6(1):77-86. [41] TALAL H N, QUAN Z S, ABDULLAH A. Identifying fake feedback for effective trust management in cloud environments[J]. Lecture Notes in Computer Science, 2013, 7759:47-58. [42] WAYNE J, TIMOTHY G. Guidelines on security and privacy in public cloud computing[EB/OL].[2014-07-10]. http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf. [43] PATEL P, AJITH R, AMIT S. Service level agreement in cloud computing [EB/OL].[2014-07-10]. http://knoesis.wright.edu/library/download/OOPSLA-cloud-wsla-v3.pdf. [44] Rabia Latif, Haider Abbasside Assar. Cloud computing risk assessment: a systematic literature review[J].Lecture Notes in Electrical Engineering,2014,276:285-295. [45] THEOHARIDOU M, PAPANIKOLAOU N, PEARSON S, et al. Privacy risk, security, accountability in the cloud[C]// Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013). Los Alamitos: IEEE Computer Society, 2013: 177-184. [46] MARIANTHI T, NIKOLAOS T, DIMITRIS G. In cloud we trust: risk-assessment-as-a-service[J].Trust Management VII IFIP Advances in Information and Communication Technology, 2013, 401:100-110. [47] 赵波,严飞,张立强,等.可信云计算环境的构建[J].中国计算机学会通讯,2012,8(7):28-34. ZHAO Bo, YAN Fei, ZHANG Liqiang, et al. Construction of trusted cloud computing environment [J]. Communications of the CCF, 2012, 8(7):28-34. |
[1] | 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84. |
[2] | 康海燕,黄渝轩,陈楚翘. 基于视频分析的地理信息隐私保护方法[J]. 山东大学学报(理学版), 2018, 53(1): 19-29. |
[3] | 王小艳,陈兴蜀,王毅桐,葛龙. 基于OpenStack的云计算网络性能测量与分析[J]. 山东大学学报(理学版), 2018, 53(1): 30-37. |
[4] | 韩盼盼,秦静. 云计算中可验证的外包数据库加密搜索方案[J]. 山东大学学报(理学版), 2017, 52(9): 41-53. |
[5] | 黄宇晴,赵波,肖钰,陶威. 一种基于KVM的vTPM虚拟机动态迁移方案[J]. 山东大学学报(理学版), 2017, 52(6): 69-75. |
[6] | 毕晓迪,梁英,史红周,田辉. 一种基于隐私偏好的二次匿名位置隐私保护方法[J]. 山东大学学报(理学版), 2017, 52(5): 75-84. |
[7] | 康海燕,马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3): 16-23. |
[8] | 陈广瑞,陈兴蜀,王毅桐,葛龙. 一种IaaS多租户环境下虚拟机软件更新服务机制[J]. 山东大学学报(理学版), 2017, 52(3): 60-67. |
[9] | 姚克,朱斌瑞,秦静. 基于生物信息的可验证公钥可搜索加密协议[J]. 山东大学学报(理学版), 2017, 52(11): 11-22. |
[10] | 柳欣,徐秋亮,张波. 满足可控关联性的合作群签名方案[J]. 山东大学学报(理学版), 2016, 51(9): 18-35. |
[11] | 岳猛,吴志军,姜军. 云计算中基于可用带宽欧氏距离的LDoS攻击检测方法[J]. 山东大学学报(理学版), 2016, 51(9): 92-100. |
[12] | 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91. |
[13] | 查明明,王伟. FlowMonitor: Android隐私数据流向监控防护系统[J]. 山东大学学报(理学版), 2016, 51(9): 59-67. |
[14] | 蔡红云,马晓雪. 在线社会网络中基于关系强度的访问控制机制[J]. 山东大学学报(理学版), 2016, 51(7): 90-97. |
[15] | 杨松涛, 马春光, 周长利, 张宗利. 一种地理围栏服务中的LBS隐私保护方法[J]. 山东大学学报(理学版), 2014, 49(09): 69-73. |
|