中国矿业大学信息安全专业外语翻译

上传人:第*** 文档编号:31382871 上传时间:2018-02-07 格式:DOC 页数:12 大小:163KB
返回 下载 相关 举报
中国矿业大学信息安全专业外语翻译_第1页
第1页 / 共12页
中国矿业大学信息安全专业外语翻译_第2页
第2页 / 共12页
中国矿业大学信息安全专业外语翻译_第3页
第3页 / 共12页
中国矿业大学信息安全专业外语翻译_第4页
第4页 / 共12页
中国矿业大学信息安全专业外语翻译_第5页
第5页 / 共12页
点击查看更多>>
资源描述

《中国矿业大学信息安全专业外语翻译》由会员分享,可在线阅读,更多相关《中国矿业大学信息安全专业外语翻译(12页珍藏版)》请在金锄头文库上搜索。

1、General Survey on Massive Data EncryptionMengmeng Wang!, Guiliang Zhu! Xiaoqiang Zhang2North China University of Water Resources and ElectricState Key Lab of Software Development EnvironmentPower Beihang UniversityZhengzhou,China Beijing,ChinaE-mail: E-mail: Abstract-With the rapid development of C

2、loud computing, Internet of Things and social network technologies, the network data are increasing dramatically. The security of massive data interaction has attracted more and more attention in recently years. This paper discusses the encryption principles, advantages and disadvantages of some mai

3、nstream massive data encryption technologies, i.e., the encryption technology based on modern cryptosystem, the encryption technology based on parallel and distributed computing, the encryption technology based on biological engineering, and Attribute-based massive data encryption technology. Finall

4、y, we outlook the need-to-be solved problems and development trend of the massive data encryption technology.Keywords-massive data encryption, modern cryptosystem, distributed computing, biological engineering, Attribute-based encryption1 INTRODUCTONWith the rapid development of cloud computing,Inte

5、rnet of Things and social network technologies, the network data are increasing dramatically and tend to be intensive and large-scale. Meanwhile, the ever-increasing amount of digital content that is the result of more powerful machine storage and networking is intensifying the demand for informatio

6、n and for making sense of activities, preferences, and trends. The security of massive data is such a daunting task that it can only be carried out on a network of machines.Recently, Amazon and Google have burst a variety of massive data security incidents under the cloud computing environments. For

7、 example, Amazon Simple Storage Service (Amazon S3) interrupted twice respectively in February and July of 2009, which led websites that relying on a single network storage services to paralysis. Meanwhile, pervasive networking has become available and has led to the distribution and sharing of data

8、 and, consequently, distributed communication, creation, consumption, and collaboration. More and more users are worried about the security of massive data interaction in the network environment. The third party usually damages these data by the operations of intercepting malicious tampering,unautho

9、rized copying or distribution. The main security requirements of massive data are usually as follows:(1) Confidentiality: Prohibit the third party from illegally obtaining the plain text information;(2) Integrity: Protect massive data from being destructed, lost or tampered during the processes of s

10、toring and 随着云计算的发展,物联网技术和社交网络,网络数据急剧增长。数据交换的安全在最近今年越来越受人们关注。这篇论文论述加密原理,一些主流大量数据加密的优缺点,加密技术依赖于现代的加密系统,加密技术基于并行和分布式计算,加密技术基于生物工程, 和基于属性的大规模数据加密技术。最后,我们需要解决的前景问题和发展趋势,大规模数据加密技术。关键词大量数据加密, 现代加密机制,分布式计算、生物工程、基于属性的加密。1 介绍随着云计算的发展,物联网技术和社交网络,网络数据急剧增长,往往是密集和大规模的,与此同时,数字内容的不断增加,需要更强大的机器存储和要求网络弄清它的活动范围,偏向,动态

11、。大量的数据安全是一个让人气馁的工作因为只能依靠网络装置。最近亚马逊和谷歌爆发了大量在云计算下的数据安全事件,例如,亚马逊存储服务器分别在2009年二月六月中断,这导致网站,依靠单一服务器的网络瘫痪,同时无处不在的网络已经成为可用,还导致了分配和共享数,因此有了分布式的交流,创造,消费,合作。越来越多的用户担心大量的数据交互的安全的网络环境,第三方通常损害这些数据通过拦截恶意篡改、非法复制或分发的操作。主要的数据安全通常需要如下1机密性:阻止第三方通过非法获得明文信息2。完整性:保护大量的数据被破坏、丢失或干扰过程中存储和转移信息transferring information; (3) Co

12、pyright protection: To identify the authenticity of data with effective methods, and provide effective legal evidence; (4) Encryption efficiency: Encryption measures must be suitable for the processing of massive data 1-3. There are usually two main technologies for massive data encryption. One way

13、is encryption technology integrated into hardware equipments, for example, the common encryption card, private networks, and dedicated encryption machines. However, this way is usually used in the universal demand environment, the security measures are the same for different business logic and distr

14、ibution in different geographical regions. For example, the uniform security measures include IP Sec VPN, SSL VPN cryptographic equipment and the full disk encryption equipment. The other way is just to provide cryptographic services. This way can complete the relatively personalized data encryption

15、 and decryption functions for specific applications, such as file encryption and confidential source encryption 4. In addition to the confidential measures, the security of massive data should also consider the self-recovery capability, computing speed and some other factors of a single communicatio

16、ns and computing behavior in the damaged case. The simple communication model of massive data encryption system IS shown in Figure I.Massive data encryption system can be expressed as a five-topple: .( I) P denotes the plain text set;(2) C denotes the cipher text set; (3) K denotes the key set; (4) E denotes the encryption function: Using E and key (k E K ) to encrypt a plain text p (p E P) we can obtain the cipher text c ( c E

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 其它办公文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号