期刊文献+
共找到571篇文章
< 1 2 29 >
每页显示 20 50 100
CRESS: A Platform of Infrastructure Resource Sharing for Educational Cloud Computing 被引量:3
1
作者 田文洪 孙夏爽 +1 位作者 蒋亚秋 王浩严 《China Communications》 SCIE CSCD 2013年第9期43-52,共10页
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-... Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process. 展开更多
关键词 cloud computing PAAS virtual- ized environment resource sharing
在线阅读 下载PDF
The Application of Cloud Computing in Virtual Enterprise’s Information Resources Sharing 被引量:1
2
作者 Wei Wang Guan-Quan Liu Qiu Zhang 《Journal of Software Engineering and Applications》 2013年第3期48-50,共3页
With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterpris... With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation. 展开更多
关键词 cloud computing VIRTUAL ENTERPRISE INFORMATION sharing
在线阅读 下载PDF
Analysis on the Application of Cloud Computing to the Teaching Resources Sharing Construction in Colleges and Universities
3
作者 LIU Mi 《International Journal of Technology Management》 2015年第8期98-100,共3页
Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud co... Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed. 展开更多
关键词 cloud computing Teaching RESOURCES RESOURCE sharing
在线阅读 下载PDF
Secure Big Data Storage and Sharing Scheme for Cloud Tenants 被引量:10
4
作者 CHENG Hongbing RONG Chunming +2 位作者 HWANG Kai WANG Weihong LI Yanyan 《China Communications》 SCIE CSCD 2015年第6期106-115,共10页
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants. 展开更多
关键词 cloud computing big data stor-age and sharing security
在线阅读 下载PDF
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
5
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
Trust Assessment Model Based on a Zero Trust Strategy in a Community Cloud Environment 被引量:2
6
作者 Rodrigue N’goran Jean-Louis Tetchueng +2 位作者 Ghislain Pandry Yvon Kermarrec Olivier Asseu 《Engineering(科研)》 CAS 2022年第11期479-496,共18页
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate... The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing. 展开更多
关键词 Trust Management Resources sharing community cloud Zero Trust
在线阅读 下载PDF
SSEM: Secure, Scalable and Efficient Multi-Owner Data Sharing in Clouds
7
作者 Shungan Zhou Ruiying Du +3 位作者 Jing Chen Hua Deng Jian Shen Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第8期231-243,共13页
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented... Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented data sharing when multiple data owners want to share their private data for cooperative purposes. In this paper, we put forward a new paradigm, referred to as secure, scalable and efficient multi-owner(SSEM) data sharing in clouds. The SSEM integrates identity-based encryption and asymmetric group key agreement to enable group-oriented access control for data owners in a many-to-many sharing pattern. Moreover, with SSEM, users can join in or leave from the group conveniently with the privacy of both group data and user data.We proposed the key-ciphertext homomorphism technique to construct an SSEM scheme with short ciphertexts. The security analysis shows that our SSEM scheme achieves data security against unauthorized accesses and collusion attacks. Both theoretical and experimental results confirm that our proposed scheme takes users little costs to share and access outsourced data in a group manner. 展开更多
关键词 data sharing cloud computing asymmetric key agreement access control
在线阅读 下载PDF
Improved Verifiability Scheme for Data Storage in Cloud Computing
8
作者 YANG Xiaoyuan ZHU Shuaishuai PAN Xiaozhong 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期399-404,共6页
In Cloud computing, data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted. The new computing pattern may cause many potential security threats. Thi... In Cloud computing, data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted. The new computing pattern may cause many potential security threats. This paper explores how to ensure the integrity and correctness of data storage in cloud computing with user's key pair. In this paper, we aim mainly at constructing of a quick data chunk verifying scheme to maintain data in data center by implementing a balance strategy of cloud computing costs, removing the heavy computing load of clients, and applying an automatic data integrity maintenance method. In our scheme, third party auditor (TPA) is kept in the scheme, for the sake of the client, to periodically check the integrity of data blocks stored in data center. Our scheme supports quick public data integrity verification and chunk redundancy strategy. Compared with the existing scheme, it takes the advantage of ocean data support and high performance. 展开更多
关键词 cloud computing data verifiability data center data interity
原文传递
Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery
9
作者 Andrii Zhygmanovskyi Norihiko Yoshida 《Journal of Computer and Communications》 2014年第10期17-31,共15页
In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P... In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each overlay node. Various issues concerning using this approach in the cloud environment, such as load-balancing, queuing, dealing with skewed data and dynamic attributes, are addressed in the paper. The infrastructure proposed in the paper can serve as a base for creating robust, scalable and reliable cloud systems, able to fulfill client’s QoS requirements, and at the same time introduce more efficient utilization of resources to the cloud provider. 展开更多
关键词 PEER-TO-PEER cloud computing SERVICE PROVISIONING SERVICE DISCOVERY SERVICE sharing
在线阅读 下载PDF
基于Cloud-P2P网络平台的泛知识云模型 被引量:2
10
作者 徐小龙 李硕 +1 位作者 顾厉淼 王新珩 《计算机应用研究》 CSCD 北大核心 2014年第2期408-411,416,共5页
提出一种云计算与对等计算融合模型Cloud-P2P,并基于Cloud-P2P构建一种新颖的泛知识云系统,将网络中的各类文献、知识信息有序地组织在一起;充分考虑网络边缘节点上可以利用的资源,在保障用户使用体验的前提下,将用户提交的知识索取任... 提出一种云计算与对等计算融合模型Cloud-P2P,并基于Cloud-P2P构建一种新颖的泛知识云系统,将网络中的各类文献、知识信息有序地组织在一起;充分考虑网络边缘节点上可以利用的资源,在保障用户使用体验的前提下,将用户提交的知识索取任务从网络中心的服务器端迁移到网络边缘的客户端。为进一步改善用户的使用体验,提出一种动态的复合自适应QoS保障机制,通过综合区分用户与资源类型,并设定服务器负载阈值,解决传统知识系统中存在的高峰阶段服务器性能瓶颈的难题,从而达到提高系统中用户整体普遍满意度的目标。 展开更多
关键词 对等计算 云计算 知识共享 服务质量
在线阅读 下载PDF
Research on Building the Resource Library of Course Teaching based on the Cloud Computing
11
作者 Lei Cen 《International Journal of Technology Management》 2014年第7期9-11,共3页
This paper puts forward sharing teaching resources based on cloud computing solutions, through the use of architecture means virtualization technology based on KVM on the server side, the infrastructure layer manage t... This paper puts forward sharing teaching resources based on cloud computing solutions, through the use of architecture means virtualization technology based on KVM on the server side, the infrastructure layer manage the underlying physical hardware equipment. In the realization of the infrastructure layer using Libvirt virtualization management suite that provides a common API development Web, through the RDP protocol, and finally access to the remote virtual desktop browser by the graphical user interface (GUI) and traditional Web B/S architecture, to simulate and access to low-level resources and sharing of teaching resources, teaching resources can be achieved education informatization in the process of teaching. 展开更多
关键词 Teaching Resource cloud computing Virtualization Technology SHARE
在线阅读 下载PDF
基于SpringCloud框架的医疗信息共享平台设计与实现 被引量:13
12
作者 王蓉 李晗 +1 位作者 周国海 何沐 《中国医学装备》 2022年第5期133-137,共5页
目的:设计并实现一款基于SpringCloud框架的医疗信息共享平台,以提高医疗信息的共享和交换能力。方法:借助云平台提供的云计算开发及运维资源,采用SpringCloud微服务的思路,将医疗信息共享平台的微服务分为人事管理微服务(SMS)、患者管... 目的:设计并实现一款基于SpringCloud框架的医疗信息共享平台,以提高医疗信息的共享和交换能力。方法:借助云平台提供的云计算开发及运维资源,采用SpringCloud微服务的思路,将医疗信息共享平台的微服务分为人事管理微服务(SMS)、患者管理微服务(PMS)、诊断管理微服务(DMS)和财务管理微服务(FMS)4部分,分别提供不同的医疗信息共享功能。结果:平台支持病患在移动APP端和Web端进行挂号操作,不同微服务之间通过Eureka组件有机整合到一起,实现医疗信息共享,内置的RabbitMQ支持大量实时数据的存储与管理,使得医疗信息共享更加顺畅。结论:基于SpringCloud框架的医疗信息共享平台可实现医院信息系统中大量数据的共享与交换,能够打通各部门、各科室与不同使用角色之间的信息交互,解决大型医院信息共享交换难的弊端;借助云计算服务能力可增强医疗信息共享平台的稳定性和安全性。 展开更多
关键词 共享与交换 医疗信息共享平台 Springcloud框架 云计算
暂未订购
AI-Driven Resource and Communication-Aware Virtual Machine Placement Using Multi-Objective Swarm Optimization for Enhanced Efficiency in Cloud-Based Smart Manufacturing
13
作者 Praveena Nuthakki Pavan Kumar T. +3 位作者 Musaed Alhussein Muhammad Shahid Anwar Khursheed Aurangzeb Leenendra Chowdary Gunnam 《Computers, Materials & Continua》 SCIE EI 2024年第12期4743-4756,共14页
Cloud computing has emerged as a vital platform for processing resource-intensive workloads in smart manu-facturing environments,enabling scalable and flexible access to remote data centers over the internet.In these ... Cloud computing has emerged as a vital platform for processing resource-intensive workloads in smart manu-facturing environments,enabling scalable and flexible access to remote data centers over the internet.In these environments,Virtual Machines(VMs)are employed to manage workloads,with their optimal placement on Physical Machines(PMs)being crucial for maximizing resource utilization.However,achieving high resource utilization in cloud data centers remains a challenge due to multiple conflicting objectives,particularly in scenarios involving inter-VM communication dependencies,which are common in smart manufacturing applications.This manuscript presents an AI-driven approach utilizing a modified Multi-Objective Particle Swarm Optimization(MOPSO)algorithm,enhanced with improved mutation and crossover operators,to efficiently place VMs.This approach aims to minimize the impact on networking devices during inter-VM communication while enhancing resource utilization.The proposed algorithm is benchmarked against other multi-objective algorithms,such as Multi-Objective Evolutionary Algorithm with Decomposition(MOEA/D),demonstrating its superiority in optimizing resource allocation in cloud-based environments for smart manufacturing. 展开更多
关键词 Resource utilization smart manufacturing EFFICIENCY inter VM communication virtual machine placement cloud computing multi-objective optimization
在线阅读 下载PDF
Lightweight Dynamic Broadcast Proxy Re-Encryption for Data Sharing in Clouds
14
作者 HU Huidan CAO Zhenfu +2 位作者 DONG Xiaolei LIN Changlu LU Penghao 《Journal of Systems Science & Complexity》 2025年第3期1351-1369,共19页
Cloud computing has become prevalent in the sharing of outsourced data due to its strong computing power and storage capacity.Ensuring data security is vitally important when sharing data in the cloud.Recently,numerou... Cloud computing has become prevalent in the sharing of outsourced data due to its strong computing power and storage capacity.Ensuring data security is vitally important when sharing data in the cloud.Recently,numerous broadcast proxy re-encryption(BPRE)schemes have been designed to address the data security issues of such applications.However,there are no any BPRE schemes that have been designed to address the issue of updating the re-encryption key in a dynamic cloud environment.Therefore,the authors propose a lightweight dynamic broadcast proxy re-encryption scheme(LD-BPRE)to address this issue in dynamic settings where the data owner can dynamically change the set of data users and does not need to update the re-encryption key for the new set of data users.In other words,the proxy can reset a re-encryption ciphertext for the new set of data users using the original re-encryption key.This is significant in a dynamic cloud setting and provides convenience for cloud users.The proposed LD-BPRE is lightweight for users with low-power devices as most of the computing overhead is offloaded to the cloud.The authors formally define the LD-BPRE scheme and prove its security under a decision n-BDHE assumption in the standard model.Finally,extensive comparisons and experiments indicate that LD-BPRE is efficient and practical. 展开更多
关键词 Broadcast proxy re-encryption cloud computing data sharing dynamic function LIGHTWEIGHT
原文传递
Privacy-Preserving Data Sharing in Cloud Computing 被引量:9
15
作者 王慧 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期401-414,共14页
Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals... Storing and sharing databases in the cloud of computers raise serious concern of individual privacy. We consider two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (or not in) the database, and association leakage, by which the attackers can unambiguously associate individuals with sensitive information. However, the existing privacy-preserving data sharing techniques either fail to protect the presence privacy or incur considerable amounts of information loss. In this paper, we propose a novel technique, Ambiguity, to protect both presence privacy and association privacy with low information loss. We formally define the privacy model and quantify the privacy guarantee of Ambiguity against both presence leakage and association leakage. We prove both theoretically and empirically that the information loss of Ambiguity is always less than the classic generalization-based anonymization technique. We further propose an improved scheme, PriView, that can achieve better information loss than Ambiguity. We propose efficient algorithms to construct both Ambiguity and PriView schemes. Extensive experiments demonstrate the effectiveness and efficiency of both Ambiguity and PriView schemes. 展开更多
关键词 PRIVACY data sharing ANONYMITY UTILITY cloud computing
原文传递
支持分层访问控制的弱中心化敏感数据共享方案
16
作者 郑开发 孙炜 +4 位作者 周俊旭 吴云坤 徐振 刘志全 何强 《计算机科学》 北大核心 2026年第2期431-441,共11页
在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访... 在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访问控制的弱中心化敏感数据共享方案(HAC-SDS)。首先,通过云边端协同计算方式,将终端侧开销转移到云边侧,降低计算和存储开销。其次,通过构建加密的倒排索引,支持对云端文件进行快速、细粒度的检索,并结合属性撤销与动态更新机制,显著提升效率。最后,将区块链技术应用于密钥管理,通过其弱中心化的特性,从根本上消除传统中心化方案的单点瓶颈与信任风险。安全分析表明,密文的不可区分性有效保障了数据的机密性。实验结果表明,所提密文检索方案在实际应用中是高效可行的。 展开更多
关键词 分层访问控制 敏感数据共享 云边端协同计算 密文检索 弱中心化
在线阅读 下载PDF
A secure authentication and collaborative data-sharing model based on a blockchain network in the cloud
17
作者 B.Samuel K.Kasturi 《Journal of Control and Decision》 2024年第4期730-745,共16页
In cloud computing,various organisations store their confidential information in private or pub-lic cloud platforms.The data sharing through the various cloud platforms increases the risk of security.To attain data sh... In cloud computing,various organisations store their confidential information in private or pub-lic cloud platforms.The data sharing through the various cloud platforms increases the risk of security.To attain data sharing while sustaining data confidentiality,a secure sharing platform and collaboration model is needed.Hence,this paper introduces the novel secure authenti-cation and collaborative data sharing(SecAuth_CDS)scheme for sharing data on blockchain.The entities involved in the SecAuth_CDS are third parties,data owners,smart contracts and blockchain networks.The security of the authentication process can be boosted by applying various security operations,such as Exclusive OR(EXOR),hashing,encryption and so on.The proposed method assures that the sharing is secure and trustworthy by blockchain.The experi-mental result reveals that the SecAuth_CDS performed effectively in terms of revenue,memory usage and computation cost with the values of 27,62.20 MB and 0.003 sec. 展开更多
关键词 cloud computing AUTHENTICATION revenue distribution smart contract collaborative data sharing
原文传递
基于云区块的电力工程供应链数据共享技术研究 被引量:1
18
作者 宋秉虎 杨明祥 +2 位作者 李祥 南天 宁静 《电子设计工程》 2026年第1期106-110,共5页
针对电力供应链信息管理系统在多点传输、远程交互、数据共享等方面存在的数据篡改、信息泄露、网络攻击等安全问题,文中设计了一种融合云计算与轻量化分布式区块链技术的通信数据安全保护机制。根据电力供应链信息管理系统的数据特点,... 针对电力供应链信息管理系统在多点传输、远程交互、数据共享等方面存在的数据篡改、信息泄露、网络攻击等安全问题,文中设计了一种融合云计算与轻量化分布式区块链技术的通信数据安全保护机制。根据电力供应链信息管理系统的数据特点,搭建云计算数据传输平台,提供弹性存储和计算资源,实现了供应链各个节点之间高效、安全的远程交互与数据传输。利用区块链技术的去中心化特点,确保数据的安全存储和完整性,防止数据被篡改或未授权访问。与传统的数据安全保护方法相比,在云区块链安全保护机制下的系统数据篡改率仅为2.32%。 展开更多
关键词 云计算 轻量化区块链 数据安全 数据共享 安全保护机制
在线阅读 下载PDF
云计算技术在网络信息数据安全传输与共享中的应用
19
作者 王硕 《移动信息》 2026年第2期98-100,共3页
云计算技术促进了医疗数据跨机构共享,但隐私泄露与合规冲突成为制约行业发展的关键瓶颈。文中提出了一种融合隐私计算与区块链的协同安全框架,通过联邦学习实现分布式建模的梯度加密传输,结合安全多方计算保障端到端隐私保护;设计了改... 云计算技术促进了医疗数据跨机构共享,但隐私泄露与合规冲突成为制约行业发展的关键瓶颈。文中提出了一种融合隐私计算与区块链的协同安全框架,通过联邦学习实现分布式建模的梯度加密传输,结合安全多方计算保障端到端隐私保护;设计了改进型PBFT共识算法,以构建可追溯的区块链存证网络;引入了动态合规引擎,将GDPR,HIPAA等法规条款转化为自动化执行策略。实验表明,该方案将明文传输风险降低9O.7%,为跨境医疗协作提供了安全可靠的技术范式。 展开更多
关键词 云计算 医疗数据共享 隐私计算 动态合规引擎
在线阅读 下载PDF
基于云计算和AES加密算法的物联网数据安全共享方法
20
作者 傅学磊 《信息技术》 2026年第1期91-96,共6页
为了实现保护数据、令用户可以无障碍访问物联网数据,提出一种基于云计算和AES加密算法的物联网数据安全共享方法。通过云储存技术提取物联网数据中的关键字,识别数据行为;使用AES加密算法对访问数据进行加密,提高数据共享的安全性和用... 为了实现保护数据、令用户可以无障碍访问物联网数据,提出一种基于云计算和AES加密算法的物联网数据安全共享方法。通过云储存技术提取物联网数据中的关键字,识别数据行为;使用AES加密算法对访问数据进行加密,提高数据共享的安全性和用户保密性;构建基于云计算的物联网数据共享框架,经过数据传输加密协议,对数据收发两端双向加密传输,在确认数据传输安全的前提下,完成物联网数据的安全共享行为。通过实验可知,所提方法的计算开销和通信开销较低,随着数据量的增加,数据流量和吞吐量波动稳定,保证数据传输效率,有效避免了数据外泄,维护了安全的网络数据访问环境,为数据安全共享提供保障。 展开更多
关键词 云计算 物联网环境 AES加密算法 数据安全共享 隐私保护
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部