مشخصات مقاله | |
ترجمه عنوان مقاله | امنیت و حفاظت از حریم خصوصی در رایانش ابری: بحث ها و چالش ها |
عنوان انگلیسی مقاله | Security and privacy protection in cloud computing: Discussions and challenges |
انتشار | مقاله سال 2020 |
تعداد صفحات مقاله انگلیسی | 34 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله مروری (Review Article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
7.092 در سال 2019 |
شاخص H_index | 77 در سال 2020 |
شاخص SJR | 0.903 در سال 2019 |
شناسه ISSN | 1084-8045 |
شاخص Quartile (چارک) | Q1 در سال 2019 |
مدل مفهومی | دارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | کامپیوتر |
گرایش های مرتبط | امنیت اطلاعات، رایانش ابری، مهندسی نرم افزار |
نوع ارائه مقاله |
ژورنال |
مجله | مجله کاربردهای رایانه و شبکه – Journal Of Network And Computer Applications |
دانشگاه | School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 800 Dongchuan RD, Minhang, Shanghai, China |
کلمات کلیدی | محاسبات ابری، امنیت حریم خصوصی، کنترل دسترسی، رمزگذاری مبتنی بر ویژگی ها، اعتماد |
کلمات کلیدی انگلیسی | Cloud computing، Privacy security، Access control، Attribute-based encryption، Trust |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.jnca.2020.102642 |
کد محصول | E14911 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
1- Introduction 2- Privacy security of cloud computing 3- Access control in cloud computing 4- ABE in cloud computing 5- Searchable encryption 6- Combination technologies in cloud privacy 7- Challenges and future directions 8- Summary References |
بخشی از متن مقاله: |
Abstract With the development of cloud computing, privacy security issues have become increasingly prominent, which is of concern to industry and academia. We review the research progress on privacy security issues from the perspective of several privacy security protection technologies in cloud computing. First, we introduce some privacy security risks of cloud computing and propose a comprehensive privacy security protection framework. Second, we show and discuss the research progress of several technologies, such as access control; ciphertext policy attribute-based encryption (CP-ABE); key policy attribute-based encryption (KP-ABE); the fine-grain, multi-authority, revocation mechanism; the trace mechanism; proxy re-encryption (PRE); hierarchical encryption; searchable encryption (SE); and multi-tenant, trust, and a combination of multiple technologies, and then compare and analyze the characteristics and application scope of typical schemes. Last, we discuss current challenges and highlight possible future research directions. Challenges Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1 All kinds of attacks are generally based on the defects of cloud infrastructure in a system management program. Different attack methods are adopted to enhance the operation authority or steal sensitive data. 2 To better defend cross-virtual machine side channel attacks, researchers should pay more attention to the forms of virtual machine attacks in the process of cloud migration, such as malicious theft of privacy information. 3 Design a security defense policy that can be independent of CSP to effectively limit the abuse of rights. In the process of security defense, researchers should also pay attention to the negative impact of defense schemes on the performance of public clouds. 4 The protection degree of sharing algorithms to a user’s identity privacy needs improvement. The unidirectional and transitive characteristics of the proxy re-encryption algorithm need to be further investigated, while the efficiency of an attribute encryption algorithm in dynamic permission management is usually poor. 5 Recyclability proves that prevention of the illegal deletion of file level or block level cloud data and improved audit efficiency in the case of data updates are urgent. 6 Privacy requirements and service level agreements (SLAs). Hidden dangers of unintentional or malicious disclosure of user privacy exist in an SLA. Therefore, privacy modeling and verification, consistency detection, privacy description, and implementation are the key issues to be solved. |