Data Integrity Checking Protocol in the Privacy Protection Environment of Outsourcing Data
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    With the large-scale cloud computing data center server globally deployed, its advantages such as low cost,strong expansibility etc. provide convenience for those companies or business units with large amount of data,and save the cost of capital on the construction of the IT environment. But in this data outsourcing environment, this will involve information security and privacy protection. On the premise of guaranteeing the safety and accuracy, this paper presents an outsourcing data storage model based on the protection of privacy .Combined with data privacy protection of mining algorithm, it puts forward the data integrity detection protocol based on data communication. The protocol uses data security technology, starting from the angles of safety, including the security of data transmission, data mining safety, integrity, security etc, making the third party server trustful.

    Reference
    Related
    Cited by
Get Citation

廖勇,方睿,方欣,周敏,吴强.外包数据隐私保护环境中数据完整性检测协议.计算机系统应用,2017,26(8):257-260

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:December 01,2016
  • Revised:
  • Adopted:
  • Online: October 31,2017
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063