Computer Science ›› 2014, Vol. 41 ›› Issue (5): 137-142.doi: 10.11896/j.issn.1002-137X.2014.05.030

Previous Articles     Next Articles

High-performance Data Privacy Protection for Cloud

SUN Xin-wei,ZHANG Wei and XU Tao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: With the rapid development of technology of cloud computing and cloud storage,more and more businesses and individuals use cloud storage to store data or backup data.When uploading private data to the cloud,the user will lose the absolute control of the data,them data privacy protection becomes a problem that cloud storage has to solve.In order to solve this problem,BSBC (Bit Split Bit Combine),a new data privacy protection method was presented.Before uploading the data,BSBC splits the data according to bit and re-assembled to form a number of data files,then uploads the data to cloud storage servers;when downloading the data,BSBC downloads all the data files,then through the bit combination,revert them to the original file.Experiments show that this method can protect the privacy of users’ data, obtain 17~35times performance improvement compared with traditional encryption.Then assembly language is used is used to optimize the core codes of bit split and bit combination,and instruction scheduling optimization of assembly language to reduce the data conflict and pipeline stalls.Eventually,compared with traditional encryption,BSBC can get 25~35times performance improvement.

Key words: Cloud storage,Data security,Privacy protection,Instruction scheduling optimization

[1] Cloud storage [EB/OL].http://en.wikipedia.org/wiki/Cloud_stroage,2012-5-10
[2] 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1)
[3] Cloud computing [EB/OL].http://en.wikipedia.org/wiki/Cloud_computing,2012-5-10
[4] Twinstrara [EB/OL].http://twinstrara.com,2012-05-10
[5] 侯清铧,武永卫,郑纬民,等.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7)
[6] Amazon simple storage service [EB/OL].http://aws.amazon.com/s3,2012-05-10
[7] Using Data Encryption[EB/OL].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingEncryption.html,2006-3-1
[8] Shraer A,Cachin C,Cidon A,et al.Venus:Verification for untrusted cloud storage [C]∥Proc of the 2010ACM Workshop on Cloud Computing Security Workshop.New York:ACM,2010:19-30
[9] iCloud:iCloud安全性与隐私政策概览[EB/OL].http://support.apple.com/kb/HT4865?viewlocale=zh_CN&locale=zh_CN,2013-2-11
[10] Alani D M M.DES96-Improved DES Security[C]∥20107th International Multi-Conference on Systems Signals and Devices(SSD).Amman,2010:1-4
[11] Shao Jun-xiang,He Zhi-min.High-speed implementation of3DES encryption algorithm based on FPGA[C]∥ Modern electronic technology.2004
[12] Kelsey J,Schneier B,Wagner D.Key Schedule Cryptanalysis of IDEA,G-DES,Gost,Softer and Triple DES[M].Springer Verlag,1997
[13] NIST Advanced Encryption Standard (AES).Development Effort web site http://csrs.nist.gov/encryption/aes/aes-home.htm
[14] Daemen J,Rijmen V.AES Proposal:Rijndael Version 2[EB/OL].http://www.east.kuleuven.ac.be/~rijmen/rijndael,1999-10-05
[15] Rivest R,Shamir A,Aldeman L.A Methoed for Obtaining DigitalSignatures and Public-key Cryptosystems[J].J.Communications of the ACM,1978,21(2):120-126
[16] Shimizu Y,Nuno F.Performance Evaluation of Novel DSAScheme that combines Polling Method with Random Access Method[C]∥PIMRC’ 06.Helsinki,Finland,Sept.2006

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!