摘要: 云存储技术是云计算领域的重要研究方向,由于存在隐私泄漏和安全问题 ,公共云存储服务在持有核心数据的组织(如创新型企业、军队)中往往难以得到广泛应用。提出一种基于虚拟隔离机制的安全私有云存储系统VI-PCS:系统将物理存储介质和公共云存储服务虚拟化为虚拟存储能力,通过集中生命周期管理使其为系统提供服务;系统将文件存储过程划分为元数据管理、文件虚拟存储和文件物理存储3个层面,通过文件重命名、IO透明加解密等方式实现数据安全可靠存储;系统提供基于隔离沙箱技术的安全网盘访问方法,通过虚拟化隔离环境来保证数据安全、可控、可用;系统提出基于有序哈希树的文件双向同步方法来实现数据的高效同步,其离线模式也提高了系统的可用性和适应性。结果表明,系统在可靠性、安全性、可伸缩性和适应性方面具有一定的优势。
[1] Zhan Ying,Sun Yong.Cloud storage management technology[C]∥2009Second International Conference on Information and Computing Seience.2009 [2] Storage networking Industry Association.Cloud storage forcloud computing[EB/OL].http://www.snia.org [3] Larry D.Cloud computing hasn’t gone fortune 500yet,but it’s coming[EB/OL].http://blogs.zdnet.corn/BTL/?p=8199 [4] Atenises G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores[C]∥CCS’07:Proceedings f the 14th ACM Conference on Computer and Communications Security.New York:ACM Press,2007:598-609 [5] Atenises G,Kamara S,Katz J.Proofs of storage from homomorphic identification protocols[C]∥ASIACRYPT’09:Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Berlin:Springer-Verlag,2009:319-333 [6] Shah M A,Baker M,Mogul J C,et al.Auditing to keep online storage services honest[C]∥HOTOS’07:Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems.Berkeley,CA:USENIX Association,2007:1-6 [7] 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12 [8] 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97 [9] Sahai A,Wates B.Fuzzy identify-based encryption[C]∥Ad-vances in Cryptology-EUROCRYPT.Berlin:Springer-Verlag,2005:457-473 [10] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryptio[C]∥Proc of IEEE Sympoisum on Security and privacy.Washington DC:IEEE Computer Society,2007:321-334 [11] 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456 [12] 刘鹏等.云计算[M].北京:电子工业出版社,2010 [13] Goldberg I,Wagner D,Thomas R,et al.A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker)[C]∥Proceedings of the Sixth USENIX UNIX Security Symposium.1996 [14] Pierce B C,Vouillon J.What is in Unison[R].MS-CIS-03-06.Philadelphia,Pennsylvania:Department of Computer and Information Science,University of Pennsylvania,2004 |
No related articles found! |
|