计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 137-142.doi: 10.11896/j.issn.1002-137X.2014.05.030
孙辛未,张伟,徐涛
SUN Xin-wei,ZHANG Wei and XU Tao
摘要: 随着云计算和云存储技术的飞速发展,越来越多的企业和个人使用云存储来保存数据或备份数据。但用户将私有数据上传到云端的同时,也丧失了对数据的绝对控制权,用户数据的隐私保护问题成为云存储发展不得不解决的问题。为了解决这一问题,提出一种新的针对云存储的数据隐私保护方法BSBC(Bit Split Bit Combine),它在上传前,将数据按照比特位进行拆分,重新组装后形成多个数据文件,再分别上传到云存储服务器;下载时,先将所有数据文件下载,然后通过位合并再恢复成原始文件。实验证明这种方法可以保护用户数据的隐私,同时可比传统加解密获得17~35倍的性能提升。然后将核心的位拆分、位合并代码模块用汇编语言进行优化,对汇编语言进行指令调度优化,以减少数据冲突和流水线停顿。最终,采用BSBC方法比传统加解密可以获得25~35倍的性能提升。
[1] Cloud storage [EB/OL].http://en.wikipedia.org/wiki/Cloud_stroage,2012-5-10 [2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1) [3] Cloud computing [EB/OL].http://en.wikipedia.org/wiki/Cloud_computing,2012-5-10 [4] Twinstrara [EB/OL].http://twinstrara.com,2012-05-10 [5] 侯清铧,武永卫,郑纬民,等.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7) [6] Amazon simple storage service [EB/OL].http://aws.amazon.com/s3,2012-05-10 [7] Using Data Encryption[EB/OL].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html,2006-3-1 [8] Shraer A,Cachin C,Cidon A,et al.Venus:Verification for untrusted cloud storage [C]∥Proc of the 2010ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:19-30 [9] iCloud:iCloud安全性与隐私政策概览[EB/OL].http://support.apple.com/kb/HT4865?viewlocale=zh_CN&locale=zh_CN,2013-2-11 [10] Alani D M M.DES96-Improved DES Security[C]∥20107th International Multi-Conference on Systems Signals and Devices(SSD).Amman,2010:1-4 [11] Shao Jun-xiang,He Zhi-min.High-speed implementation of3DES encryption algorithm based on FPGA[C]∥ Modern electronic technology.2004 [12] Kelsey J,Schneier B,Wagner D.Key Schedule Cryptanalysis of IDEA,G-DES,Gost,Softer and Triple DES[M].Springer Verlag,1997 [13] NIST Advanced Encryption Standard (AES).Development Effort web site http://csrs.nist.gov/encryption/aes/aes-home.htm [14] Daemen J,Rijmen V.AES Proposal:Rijndael Version 2[EB/OL].http://www.east.kuleuven.ac.be/~rijmen/rijndael,1999-10-05 [15] Rivest R,Shamir A,Aldeman L.A Methoed for Obtaining DigitalSignatures and Public-key Cryptosystems[J].J.Communications of the ACM,1978,21(2):120-126 [16] Shimizu Y,Nuno F.Performance Evaluation of Novel DSAScheme that combines Polling Method with Random Access Method[C]∥PIMRC’ 06.Helsinki,Finland,Sept.2006 |
No related articles found! |
|