浏览全部资源
扫码关注微信
网络出版日期:2015-02,
纸质出版日期:2015-02-15
移动端阅览
张丽敏. 云环境下一种低成本的数据安全存储和处理框架[J]. 电信科学, 2015,31(2):46-51.
Limin Zhang. Low Cost Safety Data Storage and Processing Framework Under Cloud Environment[J]. Telecommunication science, 2015, 31(2): 46-51.
张丽敏. 云环境下一种低成本的数据安全存储和处理框架[J]. 电信科学, 2015,31(2):46-51. DOI: 10.11959/j.issn.1000-0801.2015049.
Limin Zhang. Low Cost Safety Data Storage and Processing Framework Under Cloud Environment[J]. Telecommunication science, 2015, 31(2): 46-51. DOI: 10.11959/j.issn.1000-0801.2015049.
提出了一种基于云计算的数据存储和处理框架,支持用户对大规模数据集进行低成本、安全的共享和处理。该框架研究了基于矩阵的数据挖掘算法,重点是安全的Top-k特征向量算法。该算法采用了一种迭代处理模型,授权用户可以与云端展开交互以获得预期结果,交互过程中源矩阵和中间结果均处于保密状态。另外,基于Paillier加密算法和高效的随机向量扰动策略,实现了新算法的安全性。实验结果表明,提出的方法对大型矩阵具有可拓展性,且客户端成本较低。
Cloud-based data storage and processing framework
which enables users can economically and securely share and handle big datasets with low cost
was proposed. The framework studied data mining algorithms based on the matrix
whose focus was the secure Top-k feature vector algorithm. The algorithm used an iterative processing model and the authorized user interacted with the cloud to achieve the expected result. In this process
the interaction of source matrix and intermediate results were kept confidential. In addition
the security of this algorithm was guaranteed by using Paillier encryption and a random perturbation technique. Experimental results show that the proposed method is scalable to big matrices while requiring low client-side costs.
邓维 , 刘方明 , 金海 等 . 云计算数据中心的新能源应用:研究现状与趋势 . 计算机学报 , 2013 , 36 ( 3 ): 582 ~ 596
Deng W , Liu F M , Jin H , et al . Leveraging renewable energy in cloud computing data centers: state of the art and future research . Chinese Journal of Computers , 2013 , 36 ( 3 ): 582 ~ 596
Gennaro R , Gentry C , Parno B . Non -interactive verifiable computing: outsourcing computation to untrusted workers . Proceedings of the 30th Annual Cryptology Conference, , Santa Barbara,CA,USA , 2010 : 465 ~ 482
Gentry C . Fully homomorphic encryption using ideal lattices . Proceedings of the 41st ACM Symposium on Theory of Computing(STOC) , Washington,DC,USA , 2009 ( 9 ): 169 ~ 178
Naehrig M , Lauter K , Vaikuntanathan V . Can homomorphic encryption be practical . Proceedings of the 3rd ACM on Cloud Computing Security Workshop , New York,USA , 2011 : 113 ~ 124
Atallah M J , Frikken K B . Securely outsourcing linear algebra computations . Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security , Beijing,China , 2010 : 48 ~ 59
Ma Z . Sparse principal component analysis and iterative thresholding . The Annals of Statistics , 2013 , 41 ( 2 ): 772 ~ 801
Bai Z , Li R C . Minimization principles for the linear response eigenvalue problem Ⅱ: computation . SIAM Journal on Matrix Analysis and Applications , 2013 , 34 ( 2 ): 392 ~ 416
Al-Vahed A , Sahhavi H . An overview of modern cryptography . World Applied Programming , 2011 , 1 ( 1 ): 3 ~ 8
Regev O . On lattices, learning with errors, random linear codes, and cryptography . Journal of the ACM(JACM) , 2009 , 56 ( 6 ): 34 ~ 43
Lenstra A K , Verheul E R . Selecting cryptographic key sizes . Journal of Cryptology , 2001 , 14 ( 4 ): 255 ~ 293
0
浏览量
463
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构