计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 137-142.doi: 10.11896/j.issn.1002-137X.2014.05.030

• 信息安全 • 上一篇    下一篇

面向云存储的高性能数据隐私保护方法

孙辛未,张伟,徐涛   

  1. 北京信息科技大学计算机学院 北京100101;北京信息科技大学计算机学院 北京100101;清华大学信息技术研究院微处理器与片上系统技术研究中心 北京100084
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受北京市教育委员会科技计划面上项目(KM201110772014),北京市优秀人才培养资助

High-performance Data Privacy Protection for Cloud

SUN Xin-wei,ZHANG Wei and XU Tao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随着云计算和云存储技术的飞速发展,越来越多的企业和个人使用云存储来保存数据或备份数据。但用户将私有数据上传到云端的同时,也丧失了对数据的绝对控制权,用户数据的隐私保护问题成为云存储发展不得不解决的问题。为了解决这一问题,提出一种新的针对云存储的数据隐私保护方法BSBC(Bit Split Bit Combine),它在上传前,将数据按照比特位进行拆分,重新组装后形成多个数据文件,再分别上传到云存储服务器;下载时,先将所有数据文件下载,然后通过位合并再恢复成原始文件。实验证明这种方法可以保护用户数据的隐私,同时可比传统加解密获得17~35倍的性能提升。然后将核心的位拆分、位合并代码模块用汇编语言进行优化,对汇编语言进行指令调度优化,以减少数据冲突和流水线停顿。最终,采用BSBC方法比传统加解密可以获得25~35倍的性能提升。

关键词: 云存储,数据安全,隐私保护,指令调度优化

Abstract: With the rapid development of technology of cloud computing and cloud storage,more and more businesses and individuals use cloud storage to store data or backup data.When uploading private data to the cloud,the user will lose the absolute control of the data,them data privacy protection becomes a problem that cloud storage has to solve.In order to solve this problem,BSBC (Bit Split Bit Combine),a new data privacy protection method was presented.Before uploading the data,BSBC splits the data according to bit and re-assembled to form a number of data files,then uploads the data to cloud storage servers;when downloading the data,BSBC downloads all the data files,then through the bit combination,revert them to the original file.Experiments show that this method can protect the privacy of users’ data, obtain 17~35times performance improvement compared with traditional encryption.Then assembly language is used is used to optimize the core codes of bit split and bit combination,and instruction scheduling optimization of assembly language to reduce the data conflict and pipeline stalls.Eventually,compared with traditional encryption,BSBC can get 25~35times performance improvement.

Key words: Cloud storage,Data security,Privacy protection,Instruction scheduling optimization

[1] Cloud storage [EB/OL].http://en.wikipedia.org/wiki/Cloud_stroage,2012-5-10
[2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1)
[3] Cloud computing [EB/OL].http://en.wikipedia.org/wiki/Cloud_computing,2012-5-10
[4] Twinstrara [EB/OL].http://twinstrara.com,2012-05-10
[5] 侯清铧,武永卫,郑纬民,等.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7)
[6] Amazon simple storage service [EB/OL].http://aws.amazon.com/s3,2012-05-10
[7] Using Data Encryption[EB/OL].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html,2006-3-1
[8] Shraer A,Cachin C,Cidon A,et al.Venus:Verification for untrusted cloud storage [C]∥Proc of the 2010ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:19-30
[9] iCloud:iCloud安全性与隐私政策概览[EB/OL].http://support.apple.com/kb/HT4865?viewlocale=zh_CN&locale=zh_CN,2013-2-11
[10] Alani D M M.DES96-Improved DES Security[C]∥20107th International Multi-Conference on Systems Signals and Devices(SSD).Amman,2010:1-4
[11] Shao Jun-xiang,He Zhi-min.High-speed implementation of3DES encryption algorithm based on FPGA[C]∥ Modern electronic technology.2004
[12] Kelsey J,Schneier B,Wagner D.Key Schedule Cryptanalysis of IDEA,G-DES,Gost,Softer and Triple DES[M].Springer Verlag,1997
[13] NIST Advanced Encryption Standard (AES).Development Effort web site http://csrs.nist.gov/encryption/aes/aes-home.htm
[14] Daemen J,Rijmen V.AES Proposal:Rijndael Version 2[EB/OL].http://www.east.kuleuven.ac.be/~rijmen/rijndael,1999-10-05
[15] Rivest R,Shamir A,Aldeman L.A Methoed for Obtaining DigitalSignatures and Public-key Cryptosystems[J].J.Communications of the ACM,1978,21(2):120-126
[16] Shimizu Y,Nuno F.Performance Evaluation of Novel DSAScheme that combines Polling Method with Random Access Method[C]∥PIMRC’ 06.Helsinki,Finland,Sept.2006

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!