云計算中用戶數(shù)據(jù)隱私保護技術(shù)研究
[Abstract]:Cloud computing is a new data computing and sharing model which is developed from traditional models such as parallel computing grid computing and distributed computing. It is characterized by high computing efficiency high cost performance and convenient use. Because of these advantages of cloud computing, more and more users upload their local host data to the cloud to enjoy the rapid sharing of resources and efficient computing. However, cloud computing brings users efficient and convenient services, but also brings data security issues to users. How to ensure data security has become the bottleneck of cloud computing development. Privacy protection technology is one of the core technologies to ensure data security. The security of data is ensured by encrypting the uploaded data, deleting the cloud expired data determinedly, and retrieving the data in the encrypted state. There are various problems in traditional privacy protection technology. For example, the condition protection is not perfect in the conditional agent reencryption scheme, the retrieval accuracy is low and the fault tolerance is not high in the cloud data ciphertext retrieval scheme. In the scheme of deterministic deletion of expired data, there is a lack of evaluating the trust value of the node that stores the key. Aiming at the above problems existing in the traditional privacy protection technology, this paper makes a thorough study on the conditional agent encryption scheme, the ciphertext retrieval scheme and the deterministic deletion scheme of expired data, and puts forward corresponding innovative schemes. The main contents are summarized as follows. 1. In cloud computing, the traditional conditional agent reencryption scheme has insufficient protection of the set conditions, so it is easy for an attacker to obtain the content of the condition and guess the identity of the data owner. Then guess the key of the specific information caused by the problem of privacy data disclosure. Based on the identity-based proxy reencryption scheme, this paper uses DNA encoding to encrypt the condition and conceal the information of the condition, which makes the attacker unable to know the identity information of the data owner through the condition. In this paper, it is proved that the proposed scheme is secure under the DBDH complexity problem by using the indistinguishable plaintext attack random oracle model. 2. Traditional ciphertext retrieval schemes in cloud computing have some problems, such as low retrieval efficiency and low fault tolerance. In this paper, a ciphertext retrieval scheme based on double trapdoor is proposed. Firstly, a double-index structure is constructed to support the parallel operations of multi-keyword retrieval and fuzzy retrieval, then Huffman coding tree and DFSC improved index structure are introduced. Finally, TF-IDF rules are used to hide keyword frequency. This paper analyzes the security of the proposed scheme from three aspects: index, trapdoor and retrieval process, and proves that the proposed scheme is secure. The experiments show that the proposed scheme can effectively improve the fault-tolerant rate of retrieval and reduce the storage space of the index. In the traditional deterministic deletion scheme of expired data in cloud computing, there is a lack of trust evaluation for distributed hash (Distributed Hash Table,DHT) nodes, if the key components are stored on dishonest or untrusted DHT nodes. It is easy to cause the key component to be stolen, which leads to the malicious recovery of the key and the disclosure of privacy data. In this paper, a data deterministic deletion scheme based on the evaluation of trust value is proposed. By evaluating the fine grained trust value of the DHT node used to store the key component, the user can select the node with higher trust value to store the key component. Experiments show that this scheme can effectively improve the success rate of obtaining key components.
【學(xué)位授予單位】:山東師范大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309
【參考文獻】
相關(guān)期刊論文 前10條
1 王棟;熊金波;張曉穎;;面向云數(shù)據(jù)安全自毀的分布式哈希表網(wǎng)絡(luò)節(jié)點信任評估機制[J];計算機應(yīng)用;2016年10期
2 熊金波;李鳳華;王彥超;馬建峰;姚志強;;基于密碼學(xué)的云數(shù)據(jù)確定性刪除研究進展[J];通信學(xué)報;2016年08期
3 張坤;楊超;馬建峰;張俊偉;;基于密文采樣分片的云端數(shù)據(jù)確定性刪除方法[J];通信學(xué)報;2015年11期
4 李晉國;田秀霞;周傲英;;面向DaaS保護隱私的模糊關(guān)鍵字查詢[J];計算機學(xué)報;2016年02期
5 譚鎮(zhèn)林;張薇;;適用于多方云計算的同態(tài)代理重加密方案[J];小型微型計算機系統(tǒng);2015年08期
6 譚霜;賈焰;韓偉紅;;云存儲中的數(shù)據(jù)完整性證明研究及進展[J];計算機學(xué)報;2015年01期
7 馮貴蘭;譚良;;基于信任值的云存儲數(shù)據(jù)確定性刪除方案[J];計算機科學(xué);2014年06期
8 潘峰;葛運龍;張倩;申軍偉;;基于身份的條件型廣播代理重加密方案[J];計算機應(yīng)用;2014年04期
9 翟學(xué)偉;;信任的本質(zhì)及其文化[J];社會;2014年01期
10 熊金波;姚志強;馬建峰;李鳳華;劉西蒙;;面向網(wǎng)絡(luò)內(nèi)容隱私的基于身份加密的安全自毀方案[J];計算機學(xué)報;2014年01期
相關(guān)博士學(xué)位論文 前1條
1 周德華;代理重加密體制的研究[D];上海交通大學(xué);2013年
相關(guān)碩士學(xué)位論文 前1條
1 蘇弘逸;云計算數(shù)據(jù)隱私保護方法的研究[D];南京郵電大學(xué);2012年
,本文編號:2398802
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2398802.html