通信学报 ›› 2013, Vol. 34 ›› Issue (12): 158-166.doi: 10.3969/j.issn.1000-436X.2013.12.018

• 综述 • 上一篇    下一篇

移动云服务的数据安全与隐私保护综述

李瑞轩,董新华,辜希武,周湾湾,王聪   

  1. 华中科技大学 计算机科学与技术学院,湖北 武汉430074
  • 出版日期:2013-12-25 发布日期:2017-07-05
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家高技术研究发展计划(“863 计划”)基金资助项目;华中科技大学自主创新研究基金资助项目;华中科技大学自主创新研究基金资助项目;华中科技大学自主创新研究基金资助项目;华中科技大学自主创新研究基金资助项目

Overview of the data security and privacy-preserving of mobile cloud services

Rui-xuan LI,Xin-hua DONG,Xi-wu GU,Wan-wan ZHOU,Cong WANG   

  1. School of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan 430074,China
  • Online:2013-12-25 Published:2017-07-05
  • Supported by:
    The National Natural Science Foundaiton of China;The National Natural Science Foundaiton of China;The National Natural Science Foundaiton of China;The Natiional High Technology Research and Development Program of China (863 Program);Independent Innovation Fund of Huazhong University of Science and Technology;Independent Innovation Fund of Huazhong University of Science and Technology;Independent Innovation Fund of Huazhong University of Science and Technology;Independent Innovation Fund of Huazhong University of Science and Technology

摘要:

移动云服务相比传统云具有移动互联、灵活终端应用和便捷数据存取等特点。然而,丰富的移动云服务应用也带来了更多的安全与隐私泄露问题。在阐述移动云服务的基本概念、应用与安全问题的基础上,给出了其安全与隐私保护体系结构,主要围绕安全协议与认证、访问控制、完整性验证、移动可信计算和基于加密、匿名、混淆的隐私保护等关键技术,分析其研究现状,论述已有技术的优势和不足,并探讨了未来的研究方向。

关键词: 移动互联网, 云计算, 移动终端, 数据安全, 隐私保护

Abstract:

Compared with the traditional cloud services,the mobi cloud services have the characteristics of the mobile interconnected,flexible end-user applications and convenient data access.However,the rich applications of mobile cloud services bring more security and privacy-leaking problems.The basic concepts,applications and security issues of mobile cloud services were shaded light on,and then describes the architecture of security and privacy-preserving was described,some key technologies were studied in this domain,mainly focusing on the research progress of the security protocols and authentication,access control,integrity verification,mobile trusted computing and the privacy-preserving based on encryption,anonymous and confusion,and the advantages and disadvantages were pointed out respectively.Finally,some future research direction were given at the end.

Key words: mobile internet, cloud computing, mobile devices, data security, privacy preserving

No Suggested Reading articles found!