JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 83-89.doi: 10.6040/j.issn.1671-9352.2.2014.262
Previous Articles Next Articles
CAI Hong-yun, TIAN Jun-feng
CLC Number:
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011, 22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83. [2] ALMULLA S A,CHAN Y Y.Cloud computing security management[C]//Proceedings of the 2nd International Conference on Engineering System Management and Applications (ICESMA 2010). Piscataway: IEEE, 2010:1-7. [3] HUANG Ruwei, GUI Xiaolin, YU Si, et al. Study of privacy-preserving framework for cloud storage[J]. Computer Science and Information Systems, 2011, 8(3): 801-819. [4] 中国公共云发展现状[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687e21af45a9b7.html. The development status of Chinese public cloud[EB/OL].[2013-12-01].http://wenku.baidu.com/view/21e97f4c33687-e21af45a9b7.html. [5] RISTENPART T,TROMER E,SHACHAM H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: Springer Press, 2009:199-212. [6] VIKTOR M S, KENNETH C. Big data:a revolution that will transform how we live,work and think[M]. Boston: Houghton Mifflin Harcourt, 2013. [7] HASSAN T, JAMES B D, GAIL J A. Security and privacy challenges in cloud computing environments[J].IEEE Security & Privacy, 2010, 8(6):24-31. [8] PEARSON S.Taking account of privacy when designing cloud computing services[C]. Proceedings of the Workshop on Software Engineering Challenges of Cloud Computing. Washington: IEEE Computer Society, 2009:44-52. [9] KAMARA S, LAUTER K.Cryptographic cloud storage [J]. Lecture Notes in Computer Science, 2010, 6054:136-149. [10] LI Min, ZANG Wanyu, BAI Kun, et al.MyCloud-supporting user-configured privacy protection in cloud computing[C]//Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC 2013).[S.l.]:[s.n.], 2013:59-68. [11] RAY C, GANGULY U. An approach for data privacy in hybrid cloud environment[C]//Proceedings of the 2nd International Conference on Computer and Communication Technology (ICCCT 2011). Piscataway: IEEE, 2011:316-320. [12] CHUANG I H,LI S H,HUANG K C, et al. An effective privacy protection scheme for cloud computing[C]//Proceedings of the 13th International Conference on Advanced Communication Technology (ICACT 2011). Piscataway: IEEE, 2011:260-265. [13] ITANI W, KAYSSI A, CHEHAB A. Privacy as a service: privacy-aware data storage and processing in cloud computing architectures[C]//Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09). Los Alamitos: IEEE Computer Society, 2009:711-716. [14] 徐小龙,周静岚,杨庚.一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013, 40(2):98-102. XU Xiaolong, ZHOU Jinglan, YANG Geng. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013, 40(2):98-102. [15] LIN Dan, SQUICCIARINI A. Data protection models for service provisioning in the cloud[C]//Proceedings of the 15th ACM Symposium on Access Control Models and Technologies(SACMAT 2010). New York: ACM Press, 2010:183-192. [16] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of 2009 ACM Symposium on Theory of Computing (STOC'09). New York: ACM Press, 2009:169-178. [17] SADEGHI A R, SCHNEIDER T, WINANDY M.Token-based cloud computing secure outsourcing of data and arbitrary computations with lower latency [J]. Lecture Notes in Computer Science, 2010, 6101:417-429. [18] WANG Cong, WANG Qian, REN Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9. [19] NAEHRIG M,LAUTER K,VAIKUNTANATHAN V.Can homomorphic encryption be practical?[C]//Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. New York: ACM Press, 2011:113-124. [20] 光焱,祝跃飞,顾纯祥,等.一种针对全同态加密体制的密钥恢复攻击[J].电子与信息学报,2013, 35(12):2999-3004. GUANG Yan, ZHU Yuefei, GU Chunxiang, et al. A key recovery attack on fully homomorphism encryption scheme[J]. Journal of Electronics & Information Technology, 2013, 35(12):2999-3004. [21] PEARSON S,SHEN Y,MOWBRAY M.A privacy manager for cloud computing [J]. Cloud Computing, 2009, 5931:90-106. [22] MOWBRAY M, PEARSON S. A client-based privacy manager for cloud computing[C]//Proceedings of the 4th International ICST Conference on Communication System Software and Middle-ware. [S.l.]:[s.n.], 2009: 1-8. [23] LI Jin, WANG Qian, WANG Cong, et al. Fuzzy keyword search over encrypted data in cloud computing[C]//Proceedings IEEE INFOCOM. New York: IEEE, 2010: 1-5. [24] CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233. [25] 黄汝维,桂小林,余思,等.支持隐私保护的云存储框架设计[J].西安交通大学学报,2011, 45(10):1-6, 12. HUANG Ruwei, GUI Xiaolin, YU Si, et al. Design of cloud storage framework with privacy-preserving[J]. Journal of Xi'an Jiaotong University, 2011, 45(10):1-6, 12. [26] 程芳权,彭智勇,宋伟,等.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报,2012, 35(11):2215-2227. CHENG Fangquan, PENG Zhiyong, SONG Wei, et al. An efficient privacy-preserving rank query over encrypted data in cloud computing[J]. Chinese Journal of Computers, 2012, 35(11):2215-2227. [27] CHEN Chih-Yung, TU Jih-Fu. A novel cloud computing algorithm of security and privacy [J]. Mathematical Problems in Engineering, 2013: 871430.1-871430.6. [28] YU Shucheng, WANG Cong, REN Kui, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//Proceedings of 2010 IEEE INFOCOM. New York: IEEE, 2010:1-9. [29] 孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011, 32(7):146-152. SUN Guozi, DONG Yu, LI Yun. CP-ABE based data access control for cloud storage [J]. Journal on Communications, 2011, 32(7): 146-152. [30] 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011, 32(7):125-132. HONG Cheng, ZHANG Min, FENG Dengguo. Achieving efficient dynamic cryptographic access control in cloud storage[J]. Journal on Communications, 2011, 32(7):125-132. [31] 杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011, 32(7):169-175. YANG Liu, TANG Zhuo, LI Renfa, et al. Roles query algorithm in cloud computing environment based on user require[J]. Journal on Communications, 2011, 32(7):169-175. [32] 黄勤龙,马兆丰,傅镜艺,等.云计算环境中支持隐私保护的数字版权保护方案[J].通信学报,2014, 35(2):95-103. HUANG Qinlong, MA Zhaofeng, FU Jingyi, et al. Privacy-preserving digital rights management scheme in cloud computing [J]. Journal on Communications, 2014, 35(2):95-103. [33] 陈海波.云计算平台可信性增强技术的研究 [D]. 上海:复旦大学,2008. CHEN Haibo. Improving the dependability of cloud computing systems [D].Shanghai: Fudan University, 2008. [34] 张逢喆,陈进,陈海波,等.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011, 48(7):1155-1167. ZHANG Fengzhe, CHEN Jin, CHEN Haibo, et al. Lifetime privacy and self-Destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011, 48(7):1155-1167. [35] PATEL A, DANSENA P. TPM as a middleware for enterprise data security [J]. International Journal of Computer Science and Mobile Computing, 2013, 2(7):327-332. [36] 张坤.面向多租户应用的云数据隐私保护机制研究[D].济南:山东大学,2012. ZHANG Kun. Research on cloud data privacy preservation mechanism for multi-tenancy applications[D]. Jinan: Shandong University, 2012. [37] BERTINO E, PACI F, FERRINI R, et al. Privacy-preserving digital identity management for cloud computing[C].IEEE Computer Society Data Engineering Bulletin,2009, 32(1):1-4. [38] HWANG M, KWAK J. Improved user-centric ID management model for privacy protection in cloud computing [J]. International Journal of Computer and Network Security, 2010, 2(8):45-49. [39] JUNG Taeho, LI Xiangyang, WAN Zhiguo, et al. Privacy preserving cloud data access with multi-authorities[C]//Proceedings of 2013 IEEE INFOCOM. New York: IEEE, 2013: 2625-2633. [40] LI X H, HE J S, ZHANG T. A service-oriented identity authentication privacy protection method in cloud computing[J]. International Journal of Grid and Distributed Computing, 2013, 6(1):77-86. [41] TALAL H N, QUAN Z S, ABDULLAH A. Identifying fake feedback for effective trust management in cloud environments[J]. Lecture Notes in Computer Science, 2013, 7759:47-58. [42] WAYNE J, TIMOTHY G. Guidelines on security and privacy in public cloud computing[EB/OL].[2014-07-10]. http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf. [43] PATEL P, AJITH R, AMIT S. Service level agreement in cloud computing [EB/OL].[2014-07-10]. http://knoesis.wright.edu/library/download/OOPSLA-cloud-wsla-v3.pdf. [44] Rabia Latif, Haider Abbasside Assar. Cloud computing risk assessment: a systematic literature review[J].Lecture Notes in Electrical Engineering,2014,276:285-295. [45] THEOHARIDOU M, PAPANIKOLAOU N, PEARSON S, et al. Privacy risk, security, accountability in the cloud[C]// Proceedings of the 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013). Los Alamitos: IEEE Computer Society, 2013: 177-184. [46] MARIANTHI T, NIKOLAOS T, DIMITRIS G. In cloud we trust: risk-assessment-as-a-service[J].Trust Management VII IFIP Advances in Information and Communication Technology, 2013, 401:100-110. [47] 赵波,严飞,张立强,等.可信云计算环境的构建[J].中国计算机学会通讯,2012,8(7):28-34. ZHAO Bo, YAN Fei, ZHANG Liqiang, et al. Construction of trusted cloud computing environment [J]. Communications of the CCF, 2012, 8(7):28-34. |
[1] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[2] | WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37. |
[3] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
[4] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[5] | BI Xiao-di, LIANG Ying, SHI Hong-zhou, TIAN Hui. Aparameterized location privacy protection method based on two-level Anonymity [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 75-84. |
[6] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[7] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[8] | . A system of monitoring and protecting Android privacy leakage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 59-67. |
[9] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[10] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[11] | CAI Hong-yun, MA Xiao-xue. Access control based on relationship strength for online social network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 90-97. |
[12] | LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117. |
[13] | ZHAO Ze-mao1, LI Lin1, ZHANG Fan1,2, ZHANG Pin1, ZHOU Jian-qin1, WANG Jia-bo1. The location privacy protection method with dispersed sub cloaking region [J]. J4, 2013, 48(7): 56-61. |
[14] | LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35. |
[15] | . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14. |
|