计算机科学 ›› 2015, Vol. 42 ›› Issue (10): 138-146.

• 信息安全 • 上一篇    下一篇

一种基于移动Agent的云端(Cloud-P2P)数据复合销毁机制

徐小龙,龚培培,章 韵,毕朝国   

  1. 南京邮电大学计算机学院 南京210003;中国科学院软件研究所信息安全国家重点实验室 北京100190,南京邮电大学计算机学院 南京210003,南京邮电大学计算机学院 南京210003,南京财经大学江苏省现代服务业研究院 南京210003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金资助

Mobile-agent-based Composite Data Destruction Mechanism for Cloud-P2P

XU Xiao-long, GONG Pei-pei, ZHANG Yun and BI Chao-guo   

  • Online:2018-11-14 Published:2018-11-14

摘要: 云端融合计算(Cloud-P2P)融合了云计算与对等计算环境的所有节点资源,实现了最大范围的协作与资源共享。数据销毁机制是保障用户数据的安全性和可控性的重要措施之一,然而云端计算环境本身的特性也给数据的有效销毁带来了困难。针对云端数据存储系统对数据的主动销毁、定时销毁和自销毁等复合需求,提出一种基于移动Agent的数据复合销毁机制,该方法不依赖第三方,利用移动Agent技术实现对过期、废弃型数据及时、有效、灵活的销毁,并在恶意主体对数据实施攻击时主动实施防御性数据销毁,有效增强了用户数据的安全性。针对节点上数据的具体销毁,还提出一种新颖的“数据折叠”的数据覆写方法,它充分利用数据本身进行销毁,有效降低了系统的开销。

关键词: 云计算,对等计算,云端计算,数据销毁,移动Agent,数据折叠

Abstract: Cloud-P2P combines the resources of all nodes of cloud computing and peer-to-peer computing to achieve the largest collaboration and resource sharing.The data destruction mechanism is one of the important measures to protect users’ data security and controllability,which is difficult for Cloud-P2P systems.In order to meet the requirement of data destruction in Cloud-P2P storage systems,a composite data destruction mechanism based on mobile agent was put forward,which can make the expired,waste data destructed effectively,as well as defend those malicious attacks on data.In order to effectively destruct data on one node with low cost,a novel data destruction method was proposed,which realizes the data destruction by data folding.

Key words: Cloud computing,Peer-to-peer computing,Cloud-P2P computing,Data destruction,Mobile agent,Data folding

[1] 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348 Chen Kang,Zheng Wei-ming.Cloud computing:system instances and current research[J].Journal of Software,2009,20(5):1337-1348
[2] 金海,吴松,廖小飞,等.云计算的发展与挑战[M]∥2009中国计算机科学技术发展报告.北京:机械工业出版社,2010:21-51 Jin Hai,Wu Song,Liao Xiao-fei,et al.Cloud computing and challenges[M]∥China Computer Federation 2009 Computer Science and Technology Development Report.Beijing:Machi-nery Industry Press,2010:21-51
[3] 徐小龙,程春玲,熊婧夷.基于Multi-Agent的云端计算融合模型的研究[J].通信学报,2010,31(10):203-211 Xu Xiao-long,Cheng Chun-lin,Xiong Jing-yi.Conjunct model of cloud & client computing based on multi-agent[J].Journal on Communications,2010,31(10):203-211
[4] 邓谦.基于Hadoop的云计算安全机制研究[D].南京:南京邮电大学,2013 Deng Qian.Secure mechanism research based on the Hadoop in Cloud[D].Nanjing:Nanjing University of Posts and Telecommunications,2013
[5] Perlman R.File system design with assure delete[C]∥Procession of the 3rd IEEE International Security in Storage Workshop.IEEE,2007:83-88
[6] Tang Y,Lee P P C,Lui J C S,et al.FADE:Secure overlay cloud storage with file assured deletion[J].IEEE Transactions on Dependable and Secure Computing,2012,9(12):903-916
[7] Geambasu R,Kohno T,Levy A A,et al.Vanish:Increasing Data Privacy with Self-Destructing Data[C]∥USENIX Security Symposium.2009:299-316
[8] Wolchok S,Hofmann O S,Heninger N,et al.Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs[C]∥In Proceeding of NDSS.2010
[9] 王铁军,刘恒,孙明,等.资源定位服务的分布式生成树模型及算法研究[J].电子学报,2011,39(1):364-369 Wang Tie-jun,Liu Heng,Sun Ming,et al.Research on the model and algorithms based on distributed spanning tree for resource location service[J].Acta Electronica Sinca ,2011,39(1):364-369
[10] Zeng L F,Shi Zh,Xu Sh J,et al.SafeVanish:An Improved Data Self-Destruction for Protecting Data Privacy [C]∥IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom).2010:531-528
[11] 王丽娜,任正伟,余荣威,等.一种适于云存储的数据确定性删除方法[J].电子学报,2012(2):266-272 Wang Li-na,Ren Zheng-wei,Yu Rong-wei,et al.A certainty delete method suitable for cloud storage data[J].Acta Electronica Sinca,2012(2):266-272
[12] 岳风顺.云计算环境中数据自毁机制研究[D].长沙:中南大学,2011 Yue Feng-shun.Research on data self-destruct mechanism in Cloud[D].Changsha:Central South University,2011
[13] Agent Technology[EB/OL].2012-2-1[2013-3-22].http://baike.baidu.com/view/144699.htm
[14] Wang C,Wang Q,Ren K,et al.Privacy-preserving public audi-ting for data storage security in cloud computing[C]∥Proceeding of IEEE INFOCOM.2010:1-9
[15] The format of the digital certificate[EB/OL].2009-5-21 [2010-9-29].http://baike.baidu.com/view/356572.htm
[16] Woo J.Market Basket Analysis algorithms with MapReduce[J].Wiley Interdisciplinary Reviews:Data Mining and Know-ledge Discovery,2013,3(6):445-452
[17] Qin J,Zhang Y P,Zong P.Research on Data Destruction Mechanism with Security Level in HDFS[J].Advanced Materials Research,2014,834:1795-1798
[18] Shen H Y,Li Z,Li J.A DHT-Aided Chunk-Driven Overlay for Scalable and Efficient Peer-to-Peer Live Streaming[J].IEEE Transactions on Parallel and Distributed Systems,2013,11(11):2125-2137
[19] Zou G L,Ma J J.The Data Self-Destruction Technology Re-search Used in Marine Environmental Monitoring Buoy System[J].Applied Mechanics and Materials,2013,336:2195-2198
[20] Croft J,Signorile R.Secure distribution of confidential information via self-destructing data[C]∥Proceedings of the 8th World Scientific and Engineering Academy and Society (WSEAS) International Conference on on Data Networks,Communications,Computers Baltimore.USA,2009
[21] 郑光,苏锦海,孙万忠.闪存数据应急销毁算法的研究与设计[J].计算机应用与软件,2013,30(9):305-308 Zheng Guang,Su Jin-hai,Sun Wan-zhong.Research and design of flash memory data emergency disposal algorithm[J].Computing Applications and Software,2013,30(9):305-308

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!