( 您好!臺灣時間:2021/04/20 21:54
字體大小: 字級放大   字級縮小   預設字形  


研究生(外文):Tzu-Yen Zhang
論文名稱(外文):A Study of Multi-keyword Search over Encrypted Data
指導教授(外文):Prof. Kuo-Hsuan Huang
口試委員(外文):Prof. Kuo-Hsuan Huang
外文關鍵詞:data securityMulti-keyword searchcloud storage serviceGroups Search
  • 被引用被引用:0
  • 點閱點閱:132
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Cloud computing is currently very popular issues and opportunities nowadays, in which cloud storage service not only provides the public cloud storage services for users to cope with the digital data that grow with each passing day, but also helps enterprises to build their private clouds to provide the more flexible storage architecture. However, to build a cloud storage services must rely on the implementations of virtualization and security mechanisms. When the users access the cloud data via Internet, the security mechanism must be able to avoid unauthorized access, distinguish the required data from different users and applications, provide the encryption and search for the storage data, and such on. However, when the data is stored in the database with Ciphertext type, the Data Manager will not be able to search the data by keyword. Therefore, an efficient ciphertext search technique for cloud storage service is very important, the technique can ensure the data confidentiality by using ciphertext and allow the administrator can search the data by keyword. According to this, the research designs an encrypted search technology which utilizes the multi-keyword to search the encrypted data, and utilizes the technology to achieve data security for cloud storage.
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3 論文章節介紹 5
第二章 文獻探討與相關背景技術 7
2.1 相關文獻探討 7
2.2 相關背景技術 10
2.2.1 雙線性映射(Bilinear Mapping) 10
2.2.2 偽隨機函數產生器(Pseudo Random Function) 10
2.2.3 關鍵字搜尋的公開金鑰加密系統 11
2.2.4 支援關鍵字搜尋的身分辨識廣播加密方法 13
2.3 密碼學技術 18
2.3.1 對稱式加密系統(Symmetric Encryption System) 19
2.3.2 非對稱式加密系統(Asymmetric Encryption System) 20
2.3.3 單向雜湊函數(One way Hash Function) 22
第三章 所提方法 24
3.1 簡介 24
3.2 角色介紹 26
3.3 系統機制 28
3.4 加密檢索演算法 35
第四章 安全分析與系統功能比較 41
4.1 安全分析 41
4.2 系統功能比較 47
第五章 結論與未來展望 50
5.1 結論 50
5.2 未來展望 51
參考文獻 52
[1] Shvachko, K., Kuang, H., Radia, S., &; Chansler, R. (2010, May). The hadoop distributed file system. In Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on (pp. 1-10). IEEE.
[2] Hwang, M., &; Kwak, J. (2010). Improved user-centric ID management model for privacy protection in cloud computing. International Journal, 2(8), 45-49.
[3] Park, H. A., Park, J. H., &; Lee, D. H. (2011). PKIS: practical keyword index search on cloud datacenter. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1-16.
[4] Tang, Q. (2012). Search in Encrypted Data: Theoretical Models and Practical Applications. IACR Cryptology ePrint Archive, 2012, 648.
[5] Boneh, D., &; Hamburg, M. (2008). Generalized identity based and broadcast encryption schemes. In Advances in Cryptology-ASIACRYPT 2008 (pp. 455-470). Springer Berlin Heidelberg.
[6] Ananthi, S., Sendil, M. S., &; Karthik, S. (2011). Privacy preserving keyword search over encrypted cloud data. In Advances in Computing and Communications (pp. 480-487). Springer Berlin Heidelberg.
[7] Hsueh, S. C., Lin, J. Y., &; Lin, M. Y. (2011, June). Secure cloud storage for convenient data archive of smart phones. In Consumer Electronics (ISCE), 2011 IEEE 15th International Symposium on (pp. 156-161). IEEE.
[8] Li, M., Yu, S., Cao, N., &; Lou, W. (2011, June). Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on (pp. 383-392). IEEE.
[9] Wang, C., Wang, Q., &; Ren, K. (2011, June). Towards secure and effective utilization over encrypted cloud data. In Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on (pp. 282-286). IEEE.
[10] ChinnaSamy, R., &; Sujatha, S. (2012, April). An efficient semantic secure keyword based search scheme in cloud storage services. In Recent Trends In Information Technology (ICRTIT), 2012 International Conference on (pp. 488-491). IEEE.
[11] Mamachan, T., &; Thanka, R. M.(2012, November) Survey on Keyword Searching in Cloud Storages. In International Journal (ISSN), 2012 Volume 2, Issue 11 on (pp.271-275). IJETAE.
[12] Wang, C., Wang, Q., Ren, K., &; Lou, W. (2010, March). Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1-9). IEEE.
[13] Orencik, C., &; Savaş, E. (2012, March). Efficient and secure ranked multi-keyword search on encrypted cloud data. In Proceedings of the 2012 Joint EDBT/ICDT Workshops (pp. 186-195). ACM.
[14] Chang, Y. C., &; Mitzenmacher, M. (2005, January). Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security (pp. 442-455). Springer Berlin Heidelberg.
[15] Boneh, D., Di Crescenzo, G., Ostrovsky, R., &; Persiano, G. (2004, January). Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004 (pp. 506-522). Springer Berlin Heidelberg.
[16] Baek, J., Safavi-Naini, R., &; Susilo, W. (2006). On the integration of public key data encryption and public key encryption with keyword search. In Information Security (pp. 217-232). Springer Berlin Heidelberg.
[17] Golle, P., Staddon, J., &; Waters, B. (2004, January). Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security (pp. 31-45). Springer Berlin Heidelberg.
[18] 丁培毅, 溫玎蕙, &; 張書瑋. (2011, May). 支援關鍵字搜尋的身分識別廣播加密方法. In 全國資訊安全會議 (pp. 39-45). 中華民國資訊安全學會.
[19] Tseng, F. K., &; Chen, R. J. (2012). Enabling Searchable Dynamic Data Management for Group Collaboration in Cloud Storages. In Proc. 2012 Int'l Conf. on Security and Management (SAM'12).
[20] Zhong, W., Wang, X. A., Wang, Z., &; Ding, Y. (2011, December). Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on (pp. 969-973). IEEE.
[21] Fan, C. I., &; Huang, S. Y. (2013). Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems, 29(7), 1716-1724.
[22] Zhu, Y., Ma, D., &; Wang, S. (2012, June). Secure Data Retrieval of Outsourced Data with Complex Query Support. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on (pp. 481-490). IEEE.
[23] Yu, S., Wang, C., Ren, K., &; Lou, W. (2010, April). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (pp. 261-270). ACM.
[24] An Overview of Cryptography http://www.garykessler.netlibrarycrypto.html
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔