(3.238.174.50) 您好!臺灣時間:2021/04/20 21:54
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:張子晏
研究生(外文):Tzu-Yen Zhang
論文名稱:適用於加密資料的多關鍵字搜尋之研究
論文名稱(外文):A Study of Multi-keyword Search over Encrypted Data
指導教授:黃國軒黃國軒引用關係
指導教授(外文):Prof. Kuo-Hsuan Huang
口試委員:黃國軒
口試委員(外文):Prof. Kuo-Hsuan Huang
口試日期:2013-07-25
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:56
中文關鍵詞:資料安全多關鍵字搜尋雲端儲存服務群組搜尋
外文關鍵詞:data securityMulti-keyword searchcloud storage serviceGroups Search
相關次數:
  • 被引用被引用:0
  • 點閱點閱:132
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
雲端計算是目前非常熱門的議題與商機,其中雲端儲存服務可提供使用者「公有雲」的儲存服務,以滿足與日俱增的數位資料量;亦可協助企業打造「私有雲」,以提供更具彈性的儲存架構。而要建構雲端儲存服務,則必須倚賴虛擬化以及安全機制的實施。在使用者透過網際網路存取雲端資料時,安全機制必須能夠避免非授權的存取,隔離不同使用者及應用程式所需的儲存資料,並對儲存資料提供加密及搜尋等功能。然而當資料是以密文儲存在資料庫中時,資料管理者將無法根據關鍵字明文來搜尋。因此,既要以密文來確保資料的機密性,又要讓管理者可以搜尋,那麼有效率的密文搜尋技術對雲端儲存服務就非常重要了。有鑑於此,本研究設計出一個加密搜尋技術,其利用多關鍵字的方式去搜尋已加密過的檔案資料,並且利用這項技術來達到雲端儲存資料的安全性。
Cloud computing is currently very popular issues and opportunities nowadays, in which cloud storage service not only provides the public cloud storage services for users to cope with the digital data that grow with each passing day, but also helps enterprises to build their private clouds to provide the more flexible storage architecture. However, to build a cloud storage services must rely on the implementations of virtualization and security mechanisms. When the users access the cloud data via Internet, the security mechanism must be able to avoid unauthorized access, distinguish the required data from different users and applications, provide the encryption and search for the storage data, and such on. However, when the data is stored in the database with Ciphertext type, the Data Manager will not be able to search the data by keyword. Therefore, an efficient ciphertext search technique for cloud storage service is very important, the technique can ensure the data confidentiality by using ciphertext and allow the administrator can search the data by keyword. According to this, the research designs an encrypted search technology which utilizes the multi-keyword to search the encrypted data, and utilizes the technology to achieve data security for cloud storage.
目錄
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3 論文章節介紹 5
第二章 文獻探討與相關背景技術 7
2.1 相關文獻探討 7
2.2 相關背景技術 10
2.2.1 雙線性映射(Bilinear Mapping) 10
2.2.2 偽隨機函數產生器(Pseudo Random Function) 10
2.2.3 關鍵字搜尋的公開金鑰加密系統 11
2.2.4 支援關鍵字搜尋的身分辨識廣播加密方法 13
2.3 密碼學技術 18
2.3.1 對稱式加密系統(Symmetric Encryption System) 19
2.3.2 非對稱式加密系統(Asymmetric Encryption System) 20
2.3.3 單向雜湊函數(One way Hash Function) 22
第三章 所提方法 24
3.1 簡介 24
3.2 角色介紹 26
3.3 系統機制 28
3.4 加密檢索演算法 35
第四章 安全分析與系統功能比較 41
4.1 安全分析 41
4.2 系統功能比較 47
第五章 結論與未來展望 50
5.1 結論 50
5.2 未來展望 51
參考文獻 52
參考文獻
[1] Shvachko, K., Kuang, H., Radia, S., &; Chansler, R. (2010, May). The hadoop distributed file system. In Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on (pp. 1-10). IEEE.
[2] Hwang, M., &; Kwak, J. (2010). Improved user-centric ID management model for privacy protection in cloud computing. International Journal, 2(8), 45-49.
[3] Park, H. A., Park, J. H., &; Lee, D. H. (2011). PKIS: practical keyword index search on cloud datacenter. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1-16.
[4] Tang, Q. (2012). Search in Encrypted Data: Theoretical Models and Practical Applications. IACR Cryptology ePrint Archive, 2012, 648.
[5] Boneh, D., &; Hamburg, M. (2008). Generalized identity based and broadcast encryption schemes. In Advances in Cryptology-ASIACRYPT 2008 (pp. 455-470). Springer Berlin Heidelberg.
[6] Ananthi, S., Sendil, M. S., &; Karthik, S. (2011). Privacy preserving keyword search over encrypted cloud data. In Advances in Computing and Communications (pp. 480-487). Springer Berlin Heidelberg.
[7] Hsueh, S. C., Lin, J. Y., &; Lin, M. Y. (2011, June). Secure cloud storage for convenient data archive of smart phones. In Consumer Electronics (ISCE), 2011 IEEE 15th International Symposium on (pp. 156-161). IEEE.
[8] Li, M., Yu, S., Cao, N., &; Lou, W. (2011, June). Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on (pp. 383-392). IEEE.
[9] Wang, C., Wang, Q., &; Ren, K. (2011, June). Towards secure and effective utilization over encrypted cloud data. In Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on (pp. 282-286). IEEE.
[10] ChinnaSamy, R., &; Sujatha, S. (2012, April). An efficient semantic secure keyword based search scheme in cloud storage services. In Recent Trends In Information Technology (ICRTIT), 2012 International Conference on (pp. 488-491). IEEE.
[11] Mamachan, T., &; Thanka, R. M.(2012, November) Survey on Keyword Searching in Cloud Storages. In International Journal (ISSN), 2012 Volume 2, Issue 11 on (pp.271-275). IJETAE.
[12] Wang, C., Wang, Q., Ren, K., &; Lou, W. (2010, March). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1-9). IEEE.
[13] Orencik, C., &; Savaş, E. (2012, March). Efficient and secure ranked multi-keyword search on encrypted cloud data. In Proceedings of the 2012 Joint EDBT/ICDT Workshops (pp. 186-195). ACM.
[14] Chang, Y. C., &; Mitzenmacher, M. (2005, January). Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security (pp. 442-455). Springer Berlin Heidelberg.
[15] Boneh, D., Di Crescenzo, G., Ostrovsky, R., &; Persiano, G. (2004, January). Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004 (pp. 506-522). Springer Berlin Heidelberg.
[16] Baek, J., Safavi-Naini, R., &; Susilo, W. (2006). On the integration of public key data encryption and public key encryption with keyword search. In Information Security (pp. 217-232). Springer Berlin Heidelberg.
[17] Golle, P., Staddon, J., &; Waters, B. (2004, January). Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security (pp. 31-45). Springer Berlin Heidelberg.
[18] 丁培毅, 溫玎蕙, &; 張書瑋. (2011, May). 支援關鍵字搜尋的身分識別廣播加密方法. In 全國資訊安全會議 (pp. 39-45). 中華民國資訊安全學會.
[19] Tseng, F. K., &; Chen, R. J. (2012). Enabling Searchable Dynamic Data Management for Group Collaboration in Cloud Storages. In Proc. 2012 Int'l Conf. on Security and Management (SAM'12).
[20] Zhong, W., Wang, X. A., Wang, Z., &; Ding, Y. (2011, December). Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on (pp. 969-973). IEEE.
[21] Fan, C. I., &; Huang, S. Y. (2013). Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems, 29(7), 1716-1724.
[22] Zhu, Y., Ma, D., &; Wang, S. (2012, June). Secure Data Retrieval of Outsourced Data with Complex Query Support. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on (pp. 481-490). IEEE.
[23] Yu, S., Wang, C., Ren, K., &; Lou, W. (2010, April). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (pp. 261-270). ACM.
[24] An Overview of Cryptography http://www.garykessler.netlibrarycrypto.html
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔