删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

面向云端融合计算的防御性数据销毁机制

本站小编 Free考研考试/2021-12-21

本文二维码信息
二维码(扫一下试试看!)
面向云端融合计算的防御性数据销毁机制
Defensive Data Destruction Mechanism for Cloud-P2P Computing
投稿时间:2015-02-13
DOI:10.15918/j.tbit1001-0645.2017.03.011
中文关键词:云端计算移动Agent数据销毁
English Keywords:cloud-P2P computingmobile Agentdata destruction
基金项目:国家自然科学基金资助项目(61202004,61472192);国家教育部科技发展中心网络时代的科技论文快速共享专项研究资助课题(2013116);江苏省高校自然科学研究计划资助项目(14KJB520014)
作者单位
徐小龙南京邮电大学 计算机学院, 江苏, 南京 210003
中国科学院信息工程研究所, 信息安全国家重点实验室, 北京 100093
龚培培南京邮电大学 计算机学院, 江苏, 南京 210003
摘要点击次数:771
全文下载次数:1068
中文摘要:
云端融合计算将云计算和对等计算有机地融合,充分挖掘网络中心集群服务器端和网络边缘终端所蕴含的各种可利用的资源。引入了动态性比较强的网络边缘节点之后,云端融合计算环境下的数据安全保护和远程数据销毁更加困难,特别是恶意的异地主体可能对被托管的数据实施非法篡改等攻击行为。为此,本文提出了基于移动Agent的防御性数据销毁机制,利用移动Agent对云端数据进行检测,将待上传密文数据的HASH值拼接在密文后面,并定时对数据进行双重检测,有效区分云端数据的正常修改和非法篡改。通过预测相关数据受攻击的可能性,对已被非法篡改或有被非法篡改可能性的数据进行有效处理。设计并构建了基于移动Agent的云端数据防御性数据销毁原型系统。实验结果表明,基于移动Agent的防御性数据销毁机制在检测准确性、安全性、时间开销等方面具有良好的性能表现。
English Summary:
In order to fully tap various resources from network center cluster servers and edge nodes in cloud-P2P computing, that integrates cloud computing and peer-to-peer computing organically; to implement the data security and the remote data destruction in the cloud-P2P computing environment, after introducing the dynamic network edge nodes; furthermore, to prevent some malicious subjects with illegal tamper behaviors from uploading data, a defensive data destruction mechanism was proposed based on mobile agent for cloud-P2P systems. With the mechanism, the mobile agent can be used to detect data, the HASH values of the encrypted data can be put at the end of the ciphertext, and the data can be detected doubly at regular time, the normal data modification can be distinguished effectively from illegal tampering. The prediction of the attack possibility can be realized for related data, and the data, which have been or will be illegally tampered, can be deal with in time. A prototype system was designed and constructed based on the defensive data destruction mechanism. The experimental results show that the defensive data destruction mechanism based on mobile agent has the ideal performance in detection accuracy, safety and time cost.
查看全文查看/发表评论下载PDF阅读器
相关话题/数据 计算 江苏 计算机 南京邮电大学