登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
一种适用于非结构化数据的改进细粒度加密方法
  • 摘要

    现有数据加密方法多为全文加密,且研究多集中在加密算法轻量化研究,而没有从被加密数据角度分析某条数据是否所有部分都需要加密.以保护数据中关键部分为研究目的,以此实现对整条数据的保护,这对感知层海量数据处理是有重要意义的.在原有针对结构化数据细粒度加密基础上,通过添加标签、改进树型结构、求解同余类节点的方法,实现了对非结构化数据的细粒度保护.实验表明,改进的方法具有处理时间少、内存消耗低等优势.

  • 作者

    王希忠  曲家兴  马春光  周长利  WANG Xi-zhong  QU Jia-xing  MA Chun-guang  ZHOU Chang-li 

  • 作者单位

    哈尔滨理工大学计算机科学与技术学院,哈尔滨150070;黑龙江省电子信息产品监督检验院,哈尔滨150090;哈尔滨工程大学计算机科学与技术学院,哈尔滨150001/黑龙江省电子信息产品监督检验院,哈尔滨150090;哈尔滨工程大学计算机科学与技术学院,哈尔滨150001/哈尔滨工程大学计算机科学与技术学院,哈尔滨,150001

  • 刊期

    2014年9期 ISTIC PKU

  • 关键词

    细粒度  加密  非结构化  物联网  fine-grained  encryption  unstructured data  IoT 

参考文献
  • [1] 陈铁明,葛亮,蔡家楣,马世龙. TinyTCSec:一种新的轻量级无线传感器网络链路加密协议. 传感技术学报, 2011,02
  • [2] 罗军舟,吴文甲,杨明. 移动互联网:终端、网络与服务. 计算机学报, 2011,11
  • [3] 毛剑,韦韬,邹维. 一种轻量级Web通信加密方案. 计算机应用研究, 2009,07
  • [4] 王晓喃,钱焕延. 下一代互联网中移动自组网的移动管理研究. 计算机应用研究, 2012,11
  • [5] WEISER M.The computer for the 21st century[J].Scientific American,1991,265 (3):94-104.. 1991
  • [6] ZHOU Yu-ping,WU Xing-hui.Research and realization of multi-level encryption method for database[C]//Proc of the 2nd International Conference on Advanced Computer Control.[S.l.]:IEEE Press,2010:1-4.. 2010
  • [7] LEE E,THEY Y,LIM H,et al.A lightweight secure ISCSI-based remote storage service for mobile devices:communications and networking in China[C]//Proc of the 2nd International Conference on Communications and Networking in China.[S.l.]:IEEE Press,2007:361-365.. 2007
  • [8] SUN Bo,LI C,WU Kui,et al.A lightweight secure protocol for wireless sensor networks[J].Computer Communications,2006,29(13):2556-2568.. 2006
  • [9] ITU-T.Requirements for support of ubiquitous sensor network (USN) applications and services in NGN environment,recommendation Y.2221[R].[S.l.]:Geneva,2010.. 2010
  • [10] WOLF W.Cyber-physical system[J].Computer,2009,42(3):88-89.. 2009
  • [11] FADLULLAH M,MOSTAFA M,NEI K.Towards intelligent machineto-machine communications in smart grid[J].IEEE Communication Magazine,2011,49(4):60-65.. 2011
  • [12] MA Chun-guang,ZHOU Chang-li.A research of fine-grained encrypdon method for IoT[J].Journal of Computational Information Systems,2012,24(8):10213-10222.. 2012
  • [13] ZHOU Xing,LIU Jun.A novel efficient database encryption scheme[C]//Proc of the 9th International Conference on Fuzzy Systems and Knowledge Discovery.[S.l.]:IEEE Press,2012:1610-1614.. 2012
  • [14] SALLAM I,El-RABAI E.Encryption-based multilevel model for DBMS[J].Computers and Security,2012,31 (4):437-446.. 2012
  • [15] KIVIHARJU M.Towards pervasive cryptographic access control models[C]//Proc of International Conference on Security and Cryptography.Rome:SciTe Press,2012:239-244.. 2012
  • [16] HARBACH M,FAHL S,BRENNER M,et al.Towards privacy-preser ving access control with hidden policies,hidden credentials and hidden decisions[C]//Proc of the 10th Annual International Conference on Privacy,Security and Trust.[S.l.]:IEEE Press,2012:17-24.. 2012
  • [17] ZHU Yan,GAIL-JOON A,HUANG Di-jiang,et al.Towards temporal access control in cloud computing[C]//Proc of IEEE INFOCOM.[S.l.]:IEEE Press,2012:2576-2580.. 2012
  • [18] PAPAKONSTAMFINOUS Y,GARCIA-MOLINA H,WIDOM J.Object exchange across heterogeneous information sources[C]//Proc of the 11th International Conference on Data Engineering.[S.l.]:IEEE Press,1996:251-260.. 1996
查看更多︾
相似文献 查看更多>>
18.204.227.250