您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

J4 ›› 2011, Vol. 46 ›› Issue (9): 39-42.

• CTCIS 2011 会议 • 上一篇    下一篇

一个弹性分布式数据安全方案

王侃1,吴磊2,3,郝蓉4   

  1. 1.常州工程职业技术学院计算机技术系, 江苏 常州 213164;
    2.山东师范大学信息科学与工程学院, 山东 济南 250014;
    3.山东省分布式计算机软件新技术重点实验室, 山东 济南 250014;
    4.青岛大学信息工程学院, 山东 青岛 266071
  • 收稿日期:2011-05-19 出版日期:2011-09-20 发布日期:2011-09-08
  • 作者简介:王侃(1975- ),女,讲师,研究方向为计算机应用和信息安全. Email:wangkan-cz@163.com
  • 基金资助:

    山东省自然科学基金资助项目(ZR2009GQ008, ZR2009FQ019)

A resilient and distributed scheme of data security

WANG Kan1, WU Lei2,3, HAO Rong4   

  1. 1. Department of Computer Technology, Changzhou Institute of Engineering Technology, Changzhou 213164, Jiangsu, China;
    2. School of Information Science & Engineering,Shandong Normal University, Jinan 250014, Shandong, China;
    3. Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology, Jinan 25001, Shandong, China;
    4. College of Information Engineering, Qingdao University, Qingdao 266071, Shandong,  China
  • Received:2011-05-19 Online:2011-09-20 Published:2011-09-08

摘要:

如何保护机密数据的安全性是电子商务中一个十分重要的安全问题。本文引入加法共享和秘密共享的技术用于提高数据的安全性:将数据信息使用加法共享的方式分布式存储于全体服务器,同时采用秘密共享的方法,对每个信息份额在服务器集合中进行备份,如果敌手不能攻破多于法定数目的服务器就不能获得信息数据。此方案具有良好的弹性能力,服务器可以自由加入服务器组或从中退出,并且可以动态地更改门限值,这在攻击者能力可变的环境中特别有用。

关键词: 秘密共享;分布式系统;数据安全;安全性

Abstract:

How to guarantee the security of private data is a very important problem in electronic commerce. A resilient and distributed scheme of data security was proposed in this paper. The scheme introduced additive sharing and secret sharing technologies to improve the security of information content. The information data was stored among the total servers distributedly by additive sharing. At the same time, each information share was backed up among the servers set. Therefore, if an adversary could not corrupt more than quorum number of servers, he could not obtain the information data. The scheme has a nice resilient ability. It means servers can join or leave the servers group freely and the threshold value can be changed dynamically, which is especially useful in the circumstance where the ability of attacker is alterable.

Key words: secret sharing; distributed system; security of data; security

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!