天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 科技論文 > 計算機論文 >

云存儲中支持隱私保護的隱藏性隨機訪問機制研究

發(fā)布時間:2018-01-12 23:14

  本文關(guān)鍵詞:云存儲中支持隱私保護的隱藏性隨機訪問機制研究 出處:《電子科技大學(xué)》2013年碩士論文 論文類型:學(xué)位論文


  更多相關(guān)文章: 云存儲 概率加密 布谷鳥哈希 布隆過濾器 洗牌


【摘要】:隨著計算機和網(wǎng)絡(luò)信息的高速發(fā)展,數(shù)據(jù)也在不可避免的海量增長,導(dǎo)致越來越多的客戶傾向于把數(shù)據(jù)的存儲和維護工作外包給專業(yè)的服務(wù)提供商,從而從基礎(chǔ)存儲管理和維護的沉重壓力中逃離出來,更專注于自身核心業(yè)務(wù)的研究和壯大。正是在這種需求下,云存儲的研究嶄露頭角,并得以迅速發(fā)展。云存儲具有良好的便利性、可擴展性,顯著降低本地的存儲和維護開銷,少量的經(jīng)濟花費等優(yōu)勢。然而,由于云存儲系統(tǒng)中的數(shù)據(jù)對網(wǎng)絡(luò)和服務(wù)器的依賴性使得越來越多的用戶和研究者對其安全性產(chǎn)生了質(zhì)疑,并且安全性逐漸成為云存儲系統(tǒng)發(fā)展的一個至關(guān)重要的瓶頸。其中,隱私保護是云存儲安全中的極其重要的一個方面。用戶并不希望非授權(quán)用戶(包括云服務(wù)提供商)獲得有關(guān)存儲數(shù)據(jù)的任何信息。通常情況下,用戶首先在本地對數(shù)據(jù)進行加密,然后把加密后的數(shù)據(jù)上傳到云端。利用加密的方法可以有效的保護數(shù)據(jù)內(nèi)容的安全。但是,云服務(wù)提供商仍舊可以根據(jù)用戶的訪問方式,獲得存儲數(shù)據(jù)的有關(guān)信息,從而導(dǎo)致用戶的隱私遭受侵犯。比如某個特定用戶經(jīng)常訪問哪些數(shù)據(jù),或者在特定時間段,某個用戶訪問了多少次同一數(shù)據(jù)等。這類隱私保護被稱為訪問方式的隱私保護,即在訪問過程中用戶的訪問方式不能夠被泄漏。一旦獲取用戶的訪問方式,云服務(wù)提供商就能夠發(fā)動各種各樣的攻擊,例如通過跟蹤用戶訪問的特定數(shù)據(jù)元素來嘗試推斷用戶的行為模式,私人興趣以及重要的個人隱私信息。另外,云服務(wù)提供商也可以專注于那些訪問頻率非常高的用戶數(shù)據(jù),或者在用戶未察覺的的情況下暗自刪除那些從來不被訪問的數(shù)據(jù),以節(jié)省存儲和維護的成本。因此,如何在云存儲中保護用戶訪問方式的隱私,是現(xiàn)今的一個重要研究方向。 本論文就如何在云存儲的大環(huán)境下保障用戶訪問方式的隱私及如何構(gòu)造隱藏性隨機訪問方案來進行了研究,成功構(gòu)建了一個隱藏性隨機訪問方案。具體來說,主要工作有: (1)研究和分析了概率加密方法的原理和優(yōu)勢,并選擇了一個高效的概率加密方法作為本文方案的數(shù)據(jù)加密方法。 (2)研究和分析了兩個著名的數(shù)據(jù)結(jié)構(gòu):布谷鳥哈希和布隆過濾器,并采用改進的布谷鳥哈希和布隆過濾器相結(jié)合的多層結(jié)構(gòu)作為本文方案的數(shù)據(jù)結(jié)構(gòu)。在此結(jié)構(gòu)上成功實現(xiàn)隱藏性隨機訪問方案。 (3)在隱藏性隨機訪問方案的設(shè)計過程中,本文還研究了數(shù)據(jù)層重構(gòu)過程中的洗牌策略,即隨機化元素的存儲位置,并采用高效的洗牌策略,進一步提高了訪問效率。 (4)本文研究了分區(qū)的存儲結(jié)構(gòu)和MapReduce并行查詢策略的組合,提高了訪問效率,同時使訪問過程中用戶和服務(wù)器之間的交互次數(shù)降低到常數(shù)級。另外,分區(qū)的思想使每次訪問受影響的數(shù)據(jù)元素的幾率大大減少,這也是提高系統(tǒng)性能的一個關(guān)鍵。 (5)本文在構(gòu)造了支持隱私保護的隱藏性隨機訪問方案后,分析了此方案的性能和安全性,并和現(xiàn)存的典型模型進行了比較,成功證明了本文方案的可執(zhí)行性和優(yōu)勢。 (6)最后在Hadoop平臺下實現(xiàn)了本文提出的隱藏性隨機訪問方案,,完成了文件加密,隱藏性隨機訪問數(shù)據(jù)結(jié)構(gòu)構(gòu)建,訪問過程和數(shù)據(jù)層重構(gòu)過程模擬,并評估了訪問效率。
[Abstract]:With the rapid development of computer and network information, the data also inevitably lead to massive growth in, more and more customers tend to put the data storage and maintenance work is outsourced to professional service providers, in order to escape from the basic storage management and maintenance of the heavy pressure of study, and focus on their core business is growing. In this case, the research of cloud storage emerged and developed rapidly. Cloud storage has good convenience, scalability, reduce local storage and maintenance costs, a small amount of economic costs and other advantages. However, the dependence of cloud storage system in the data on the network and server make users and more and more studies have questioned its safety and security has become a crucial bottleneck in development of cloud storage system. Among them, privacy protection is One of the most important aspect of the cloud storage security. The user does not want unauthorized users (including cloud service provider) to obtain any information about the stored data. Typically, the user first locally to encrypt the data, then the encrypted data is uploaded to the cloud. The use of encryption method can protect the data content effective safety. However, cloud service providers still can be based on user access, get information about the storage of data, resulting in the user's privacy violations. For example, a specific user often access what data, or in a specific period of time, a number of users to access the same data. This kind of privacy the protection of privacy protection is called access mode, namely the user during the visit visit could not be leaked. Once get the user access, cloud service providers will be able to Enough to launch a variety of attacks, such as access behavior by tracking the user specific data to try to infer the user's personal interests and important personal privacy information. In addition, cloud service providers can also focus on those who visit the very high frequency of user data, or when the user is not aware of the case secretly delete those never accessed data to save storage and maintenance cost. Therefore, how to protect the privacy of user access in cloud storage, is an important research direction of the current.
This paper studies how to protect the privacy of user access and how to construct a hidden random access scheme in cloud storage environment. A hidden random access scheme is successfully constructed.
(1) the principle and advantages of probabilistic encryption are studied and analyzed, and a high efficient probability encryption method is selected as the data encryption method of this scheme.
(2) the research and analysis of the two famous data structure: Cuckoo hashing and bloom filter and multi-layer structure improved cuckoo hashing and bloom filter which is combined with the data structure of this scheme. The hidden random access scheme to achieve success in this structure.
(3) in the design of hidden random access scheme, we also studied the shuffling strategy in data layer refactoring process, namely, the location of randomized elements and the efficient shuffle strategy, which further improved the access efficiency.
(4) this paper studies the storage structure and MapReduce partition parallel query strategy combination, improve access efficiency, while the number of interaction between the user and the server access process is reduced to a constant level. In addition, the probability of the partition method so that each data element access affected greatly reduced, which is the key to improve the performance of the system.
(5) after constructing a hidden random access scheme that supports privacy protection, we analyze the performance and security of the scheme, and compare it with the existing typical models. The successful implementation proves the feasibility and advantages of the scheme.
(6) finally, under the Hadoop platform, we implemented the hidden random access scheme proposed in this paper. We completed file encryption, hiding random access data structure construction, access process and data layer reconfiguration process simulation, and evaluated the access efficiency.

【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2013
【分類號】:TP333;TP309

【相似文獻】

相關(guān)期刊論文 前10條

1 陳一梅;;數(shù)字化參考咨詢的隱私保護研究[J];農(nóng)業(yè)圖書情報學(xué)刊;2008年01期

2 劉智濤;霍成義;;電子商務(wù)中的隱私保護技術(shù)研究[J];現(xiàn)代計算機(專業(yè)版);2008年10期

3 龍琦;;基于k-匿名的隱私保護[J];科協(xié)論壇(下半月);2010年03期

4 畢菊;王莉;;基于快速隱私保護關(guān)聯(lián)規(guī)則的挖掘算法[J];遼寧科技大學(xué)學(xué)報;2010年05期

5 李超良;;物聯(lián)網(wǎng)隱私保護機制簡介[J];福建電腦;2011年04期

6 楊s

本文編號:1416422


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/1416422.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶58447***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
久热青青草视频在线观看| 日本乱论一区二区三区| 亚洲国产黄色精品在线观看| 日本精品啪啪一区二区三区| 国产精品免费自拍视频| 99久久精品久久免费| 国产中文字幕一区二区| 日本人妻免费一区二区三区| 国产视频福利一区二区| 欧美黑人在线一区二区| 国产亚洲欧美自拍中文自拍| 久久精品福利在线观看| 开心五月激情综合婷婷色| 中日韩美一级特黄大片| 不卡视频免费一区二区三区| 99久久免费中文字幕| 黑丝国产精品一区二区| 久久精品国产亚洲熟女| 日本久久精品在线观看| 日韩亚洲精品国产第二页| 国产高清一区二区不卡| 亚洲欧洲成人精品香蕉网| 91香蕉视频精品在线看| 香蕉久久夜色精品国产尤物 | 亚洲性生活一区二区三区| 夜色福利久久精品福利| 夫妻性生活一级黄色录像| 亚洲熟女少妇精品一区二区三区| 中文字幕无线码一区欧美| 国产成人综合亚洲欧美日韩| 国产日韩熟女中文字幕| 国产欧美日韩精品一区二| 亚洲女同一区二区另类| 久久夜色精品国产高清不卡| 日韩一区欧美二区国产| 亚洲另类欧美综合日韩精品| 久久精品国产亚洲熟女| 午夜亚洲精品理论片在线观看 | 国产亚洲精品俞拍视频福利区| 色婷婷国产精品视频一区二区保健| 草草视频精品在线观看|