天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 軟件論文 >

外包模型中可驗(yàn)證計(jì)算的研究

發(fā)布時(shí)間:2018-03-24 15:01

  本文選題:可驗(yàn)證計(jì)算 切入點(diǎn):可驗(yàn)證數(shù)據(jù)庫(kù) 出處:《華東師范大學(xué)》2017年碩士論文


【摘要】:隨著大數(shù)據(jù)的發(fā)展進(jìn)步,人們更頻繁地接觸到越來越多的數(shù)據(jù)。這些數(shù)據(jù)也展現(xiàn)出跟以往數(shù)據(jù)不同的特點(diǎn):海量、異構(gòu)以及劣質(zhì)。資源受限的客戶端無法在本地進(jìn)行復(fù)雜函數(shù)計(jì)算或者存儲(chǔ)大量數(shù)據(jù)。云計(jì)算技術(shù)的不斷發(fā)展,其作為一個(gè)可滿足外包計(jì)算需求且使用簡(jiǎn)單、經(jīng)濟(jì)的技術(shù)手段為外包計(jì)算的興起提供了堅(jiān)實(shí)的基礎(chǔ)和動(dòng)力。所謂外包計(jì)算,是指客戶端將復(fù)雜的計(jì)算任務(wù)或者是較大的數(shù)據(jù)庫(kù)(或數(shù)據(jù)集)外包,每次計(jì)算或問詢采用付費(fèi)的方式獲取服務(wù)器端返回的結(jié)果。由于服務(wù)器端軟硬件錯(cuò)誤或者節(jié)約資源等,云服務(wù)器端可能會(huì)攻擊外包計(jì)算,故必須保證服務(wù)器端返回結(jié)果的可驗(yàn)證性?沈(yàn)證計(jì)算協(xié)議不僅能夠保證服務(wù)器端返回結(jié)果的可驗(yàn)證性,并且具有以下基本性質(zhì):正確性、安全性和高效性。本文分別對(duì)計(jì)算和數(shù)據(jù)庫(kù)的外包方案進(jìn)行研究,主要貢獻(xiàn)如下:(1)構(gòu)造具有公開可驗(yàn)證性的批量可驗(yàn)證計(jì)算方案。本文改進(jìn)現(xiàn)有的批量可驗(yàn)證計(jì)算方案,使用具有閉式效率的偽隨機(jī)函數(shù),設(shè)計(jì)出三個(gè)分別應(yīng)用于外包每個(gè)單項(xiàng)式次數(shù)有界的多項(xiàng)式、每個(gè)變量次數(shù)有界的多項(xiàng)式和矩陣的批量可驗(yàn)證計(jì)算方案,這些方案均具有公開可驗(yàn)證性。另外,能夠證明這些方案在判定線性(DLIN)假設(shè)下是安全的。此外,當(dāng)函數(shù)達(dá)到京字節(jié)級(jí)別時(shí),我們將方案進(jìn)行優(yōu)化,在保證效率的同時(shí),能夠減少客戶端及服務(wù)器端的存儲(chǔ)資源。(2)首次提出門限可驗(yàn)證數(shù)據(jù)庫(kù)的概念?蛻舳丝梢詫⑵渖矸菁八借秘密分享給其他多個(gè)客戶端,而這些客戶端可以采用門限的方式操作外包出去的數(shù)據(jù)庫(kù),F(xiàn)有的可驗(yàn)證計(jì)算方案大部分僅支持對(duì)數(shù)據(jù)庫(kù)記錄的修改操作,而本文提出的門限可驗(yàn)證數(shù)據(jù)庫(kù)方案可以采用門限的方式對(duì)數(shù)據(jù)庫(kù)記錄執(zhí)行增加、刪除和修改操作。此外,我們能夠證明所構(gòu)造的門限可驗(yàn)證數(shù)據(jù)庫(kù)方案在squ-CDH假設(shè)下是安全的。
[Abstract]:With big data's development and progress, more and more people are exposed to more and more data. These data also show a different feature from the previous data: massive. Heterogeneous and poor quality clients with limited resources are unable to perform complex function calculations or store large amounts of data locally. With the development of cloud computing technology, it can meet the needs of outsourced computing and is easy to use. Economic technical means provide a solid foundation and power for the rise of outsourcing computing. The so-called outsourcing computing means that clients outsource complex computing tasks or larger databases (or data sets). For each calculation or inquiry, the result returned by the server is obtained on a paid basis. Due to errors in software and hardware on the server side or resource saving, the cloud server may attack outsourced computing. Therefore, we must ensure the verifiability of the returned results on the server side. The verifiable computing protocol can not only guarantee the verifiability of the returned results on the server side, but also have the following basic properties: correctness, Security and efficiency. This paper studies the outsourced schemes of computing and database separately, and the main contributions are as follows: (1) construct a publicly verifiable batch verifiable computing scheme. In this paper, we improve the existing batch verifiable computing schemes. By using the pseudorandom function with closed efficiency, we design three computations of bounded polynomials, bounded degrees of each variable, and batch verifiability of matrices, which are respectively used to outsource the bounded degree of each monomial form. These schemes are publicly verifiable. In addition, it can be proved that these schemes are safe under the assumption of linear DLIN.Furthermore, when the function reaches the Beijing byte level, we optimize the scheme to ensure efficiency. The concept of threshold verifiable database is proposed for the first time. The client can share its identity and private key secretly with other clients. These clients can operate the outsourced database in a threshold manner. Most of the existing verifiable computing schemes only support the modification of database records. The threshold verifiable database scheme proposed in this paper can use threshold to add delete and modify database records. In addition we can prove that the proposed threshold verifiable database scheme is safe under the assumption of squ-CDH.
【學(xué)位授予單位】:華東師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP309;TP311.13

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 石賢芝;林昌露;張勝元;唐飛;;標(biāo)準(zhǔn)模型下高效的門限簽名方案[J];計(jì)算機(jī)應(yīng)用;2013年01期

相關(guān)博士學(xué)位論文 前1條

1 陸琦瑋;安全外包計(jì)算中若干關(guān)鍵問題研究[D];中國(guó)科學(xué)技術(shù)大學(xué);2015年

相關(guān)碩士學(xué)位論文 前1條

1 張?jiān)?可驗(yàn)證計(jì)算協(xié)議的改進(jìn)與應(yīng)用研究[D];北京郵電大學(xué);2015年

,

本文編號(hào):1658809

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/1658809.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶c09e8***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com