發(fā)布訂閱系統(tǒng)安全關(guān)鍵技術(shù)研究
[Abstract]:Growing demand for content-centric applications has prompted researchers to rethink and redesign information storage and delivery on the Internet. More and more network loads contain multiple recipients. However, the host-centric architecture in the Internet is designed for point-to-point communications between two fixed ends. As a result, the current Internet architecture does not match the current data and applications centered on content, regardless of the source of the information, and the data required by the user is unknown in many cases. content-based networks have been proposed to address such requirements because content-based networks have the advantages of high efficiency, low network load, low latency, and high energy efficiency. Publishing a subscription communication paradigm is the most complex and mature example of such a network. This paper focuses on the research of key technology in publishing subscription system, realizes efficient and secure information distribution and management, and ensures the integrity, confidentiality and availability of information. The main achievements of this thesis are as follows: (1) In order to ensure the information security of the publishing and subscribing system in the non-completely trusted network environment, this paper proposes a publishing subscription system encryption based on redundant attributes, aiming at the multi-domain publishing subscription system model. The algorithm uses the redundant attributes of the event to form a vector space model and applies the redundant attributes to the event encryption process. When an event is in the sending process, the redundant attributes of the event appear in different combinations in different combinations according to the pre-established rules once the discovery information is revealed to an unauthorized user, the system can confirm the presence of a link to the line sniffing by combining the redundancy attribute in the leaked information and revoke the associated authorization certificate. This way does not increase the cost of the matching process and the subscription process overhead. Therefore, when the line sniffing is not ignored, the scheme in this paper helps to improve the security of the publishing subscription system Through simulation, the proposed scheme can effectively improve the security of the system without the support of the fully trusted agent connection. Performance. (2) In order to achieve three objectives of access control in a publishing subscription system: confidentiality control, integrity control, and availability control, for most studies, only the event content and subscription conditions are encrypted, and access control policies will be accessed In this paper, a publishing subscription system based on advertisement information encryption is proposed in this paper. Ask the control mechanism. This scheme not only can control the security delivery of information, but also retains the advantages of publishing subscription communication, such as the decoupling and system of clients. Scalability. In a network, subscription information meets advertisement information while setting up a publishing event The event propagation tree. On this basis, the access policy containing sensitive information is added to the advertisement information, The interest rate is encrypted. The security of the access control policy is in the matching process of subscription information and advertisement information in this way, the content-based route can still be completed while the information encryption is achieved, The simulation results show that the proposed scheme realizes the fine-grained access control, improves the security performance of the access control strategy of the publishing subscription system, and only adds a small amount of system. Information overhead. (3) In a content-based publishing subscription system, there are typically thousands of subscribers using a centralized mechanism to process an installation Full demand is not feasible. Since the number of subscribers interested in a service/ entity may change, a static security is established In view of this problem, this paper proposes a key management mechanism of mixed mode to manage the encryption key of the event, which uses the decentralized mechanism to efficiently group the agent, and provides the method including registration, key generation and dynamic member management. Finally, it proves that the key management mechanism of hybrid mode can effectively reduce the key updating of the system compared with other key management methods.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前8條
1 張繼德;屈爾慶;賀志芳;;基于發(fā)布/訂閱系統(tǒng)的安全管理平臺(tái)設(shè)計(jì)[J];計(jì)算機(jī)科學(xué);2008年04期
2 苑洪亮;張捷;郭長(zhǎng)國(guó);史殿習(xí);;內(nèi)容發(fā)布訂閱系統(tǒng)中事件可靠傳遞的研究[J];計(jì)算機(jī)工程與科學(xué);2007年09期
3 董飚;陳金輝;孫亞民;;大規(guī)模發(fā)布/訂閱系統(tǒng)中的可靠性模型[J];計(jì)算機(jī)科學(xué);2008年09期
4 馬建剛;黃濤;汪錦嶺;徐罡;葉丹;;面向大規(guī)模分布式計(jì)算發(fā)布訂閱系統(tǒng)核心技術(shù)[J];軟件學(xué)報(bào);2006年01期
5 鄒吉昌;段斌;李晶;;基于內(nèi)容的發(fā)布/訂閱系統(tǒng)安全框架設(shè)計(jì)[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年19期
6 王曦;肖曉麗;;基于移動(dòng)代理和密鑰共享的發(fā)布/訂閱系統(tǒng)的研究與設(shè)計(jì)[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年18期
7 姚剛;鄧江沙;;基于JMS的消息過(guò)濾改進(jìn)算法[J];計(jì)算機(jī)技術(shù)與發(fā)展;2006年07期
8 薛濤;馮博琴;李波;董劍;;基于內(nèi)容的發(fā)布訂閱系統(tǒng)中快速匹配算法的研究[J];小型微型計(jì)算機(jī)系統(tǒng);2006年03期
相關(guān)博士學(xué)位論文 前1條
1 王青龍;廣播加密中的叛逆者追蹤研究[D];北京交通大學(xué);2009年
,本文編號(hào):2301395
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2301395.html