云環(huán)境下多模指數(shù)安全外包方案研究
本文選題:云計(jì)算 + 外包算法; 參考:《西安電子科技大學(xué)》2014年碩士論文
【摘要】:隨著虛擬化技術(shù)、分布式存儲(chǔ)技術(shù)、寬帶互聯(lián)網(wǎng)技術(shù)、處理器技術(shù)和自動(dòng)化管理技術(shù)的發(fā)展,云計(jì)算已經(jīng)越來越引人注目。云計(jì)算將實(shí)用性、便捷性和按需網(wǎng)絡(luò)訪問可配置計(jì)算資源集中池作為計(jì)算的長(zhǎng)期目標(biāo)。云計(jì)算最具吸引力的優(yōu)勢(shì)之一是外包模式,使資源受限的設(shè)備可以以按使用付費(fèi)的方式向云服務(wù)器外包其巨大的計(jì)算工作負(fù)載。通過服務(wù)器虛擬化的搭建和分布式的大規(guī)模集群,使“云”獲得了強(qiáng)大的計(jì)算能力。云計(jì)算講述的是移動(dòng)服務(wù),計(jì)算和數(shù)據(jù)——為了降低本地的成本和提高商業(yè)利益,達(dá)到位置透明、集中設(shè)施和承包的目的。通過使云中的數(shù)據(jù)可利用,用戶可以更加容易而且不受位置的限制訪問云服務(wù)器。通過一個(gè)共享的平臺(tái),在降低成本的同時(shí),也可以實(shí)現(xiàn)增強(qiáng)合作、集成和分析的目的。然而,云計(jì)算和Web服務(wù)同樣運(yùn)行在網(wǎng)絡(luò)結(jié)構(gòu)之上,所以它們暴露在網(wǎng)絡(luò)類型攻擊之下。為了實(shí)現(xiàn)保密性、完整性、可用性和可控性等信息安全的目標(biāo),安全外包算法被廣泛應(yīng)用于云計(jì)算當(dāng)中。作為當(dāng)前大多數(shù)密碼系統(tǒng)中的基本操作,模指數(shù)計(jì)算在構(gòu)建安全外包方案的同時(shí)也具有一些亟待解決的問題。本文對(duì)多模指數(shù)安全外包方案等進(jìn)行了系統(tǒng)的研究,主要工作包括以下幾個(gè)方面:1.對(duì)國內(nèi)外現(xiàn)有的基于模指數(shù)運(yùn)算的外包方案進(jìn)行研究。在基于一個(gè)不可信云服務(wù)器的模型中,分析研究了三種安全外包方案,可以使用戶將模指數(shù)運(yùn)算安全的外包給單云服務(wù)器,分別為固定的基于變量的指數(shù)冪運(yùn)算安全外包方案、可變的基于變量的指數(shù)冪安全外包方案和同步模指數(shù)的安全外包方案?偨Y(jié)了這些方案的局限性,并且做了相應(yīng)的改進(jìn)。2.基于兩個(gè)不可信程序的單敵手(the one-malicious version of two untrusted program model)版本模型(簡(jiǎn)稱為“單敵手模型”),提出了一種改進(jìn)的多模指數(shù)安全外包計(jì)算方案。通過對(duì)上述安全模指數(shù)外包方案的研究,本文所提出的方案對(duì)其進(jìn)行了改進(jìn),通過調(diào)用新的子程序?qū)υ桨高M(jìn)行了擴(kuò)展,不僅可以達(dá)到加/解密過程的高效性和保密性,也能實(shí)現(xiàn)外包方案的可檢驗(yàn)性和安全性。3.針對(duì)模指數(shù)運(yùn)算的相關(guān)安全性定義,本文通過嚴(yán)格的安全性分析,證明了多模指數(shù)安全外包方案在各種不同類型輸入的情況下是安全的。
[Abstract]:With the development of virtualization technology, distributed storage technology, broadband Internet technology, processor technology and automation management technology, cloud computing has become more and more attractive. Cloud computing uses availability, convenience and on-demand network access to configurable computing resource pooling as the long-term goals of computing. One of the most attractive advantages of cloud computing is the outsourcing model, which allows resource-constrained devices to outsource their huge computing workload to cloud servers on a pay-per-use basis. Through the establishment of server virtualization and distributed large-scale cluster, "cloud" has acquired powerful computing power. Cloud computing is about mobile services, computing and data-in order to reduce local costs and increase business benefits, location transparency, centralized facilities and contracting purposes. By making data available in the cloud, users can access the cloud server more easily and without restriction of location. Through a shared platform, the purpose of enhancing cooperation, integration and analysis can be achieved while reducing costs. However, cloud computing and Web services also run on the network structure, so they are exposed to network type attacks. In order to achieve the goal of information security such as confidentiality, integrity, availability and controllability, security outsourcing algorithms are widely used in cloud computing. As a basic operation in most cryptographic systems, modular exponent calculation has some problems to be solved while constructing security outsourcing scheme. In this paper, we systematically study the multi-mode exponential security outsourcing scheme. The main work includes the following aspects: 1. 1. The existing outsourcing schemes based on modular exponent operation at home and abroad are studied. In a model based on an untrusted cloud server, three security outsourcing schemes are analyzed and studied, which can enable users to outsource modular exponential operation security to a single cloud server, which is a fixed security outsourcing scheme based on variable exponential power operation. Variable exponential power security outsourcing scheme based on variable and synchronous mode exponential security outsourcing scheme. The limitations of these schemes are summarized and the corresponding improvements. 2. 2. Based on the one-malicious version of two untrusted program model) version model of two untrusted programs (referred to as "single adversary model" for short), an improved multi-mode exponential security outsourcing scheme is proposed. Based on the research of the security module exponent outsourcing scheme mentioned above, the scheme proposed in this paper is improved, and the original scheme is extended by calling a new subroutine, which can not only achieve the high efficiency and confidentiality of the encryption / decryption process. It can also realize the testability and security of the outsourcing scheme. 3. According to the definition of the security of modular exponential operation, this paper proves that the multi-mode exponential security outsourcing scheme is safe under different types of input through strict security analysis.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 ;Radware APSolute應(yīng)用安全解決方案[J];信息安全與通信保密;2006年02期
2 吳金龍;計(jì)算機(jī)網(wǎng)絡(luò)對(duì)等安全通信技術(shù)的研究[J];華僑大學(xué)學(xué)報(bào)(自然科學(xué)版);2000年04期
3 ;安全產(chǎn)品 電信行業(yè)技術(shù)領(lǐng)先獎(jiǎng)[J];每周電腦報(bào);2004年20期
4 王芬,趙梗明;嵌入式網(wǎng)絡(luò)接入的安全通信機(jī)制研究[J];單片機(jī)與嵌入式系統(tǒng)應(yīng)用;2005年09期
5 盧佐華;;正解網(wǎng)絡(luò)在安全體系架構(gòu)中的位置[J];計(jì)算機(jī)安全;2006年03期
6 成典勤;;集群分布式安全探討[J];現(xiàn)代計(jì)算機(jī);2006年03期
7 邱俊源;張躍;;異步消息驅(qū)動(dòng)安全通信模塊的設(shè)計(jì)與實(shí)現(xiàn)[J];計(jì)算機(jī)工程與設(shè)計(jì);2011年08期
8 向敏;劉福強(qiáng);;有關(guān)計(jì)算機(jī)網(wǎng)絡(luò)對(duì)等安全通信技術(shù)的研究[J];信息安全與技術(shù);2013年01期
9 莫琨;;智慧旅游的安全威脅與對(duì)策探討[J];旅游縱覽(下半月);2013年02期
10 林琪,盧昱;處方信息的安全通信[J];指揮技術(shù)學(xué)院學(xué)報(bào);2001年01期
相關(guān)會(huì)議論文 前10條
1 鄭重;李少華;劉亞斌;李敬東;;安全通信中的抗重播機(jī)制的研究與實(shí)現(xiàn)[A];第十八次全國計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集[C];2003年
2 于秀蘭;丁曉誠;李影;英春;劉東;周彬;魏冰;;電信行業(yè)數(shù)據(jù)業(yè)務(wù)中Web Service的安全[A];中國通信學(xué)會(huì)信息通信網(wǎng)絡(luò)技術(shù)委員會(huì)2003年年會(huì)論文集[C];2003年
3 朱紅儒;焦文娟;齊e,
本文編號(hào):1809406
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1809406.html