云計(jì)算環(huán)境下外包數(shù)據(jù)安全驗(yàn)證技術(shù)研究
發(fā)布時(shí)間:2024-01-08 19:50
云計(jì)算是一種按需彈性分配資源的新型計(jì)算模式,使得用戶(hù)可以通過(guò)網(wǎng)絡(luò)快捷地獲取定制化的計(jì)算、存儲(chǔ)、網(wǎng)絡(luò)等虛擬資源,有效提高了物理資源的利用率、可用性和可靠性,降低了用戶(hù)的資源使用與管理成本。然而,相比于傳統(tǒng)計(jì)算模式,在云計(jì)算中,數(shù)據(jù)的存儲(chǔ)和處理被轉(zhuǎn)移到非完全可信的云端,導(dǎo)致數(shù)據(jù)所有權(quán)與管理權(quán)分離,使得云外包數(shù)據(jù)面臨泄漏、篡改、丟失等安全威脅。數(shù)據(jù)安全驗(yàn)證技術(shù)基于消息驗(yàn)證碼、數(shù)字簽名、認(rèn)證的數(shù)據(jù)結(jié)構(gòu)等密碼原語(yǔ)或安全協(xié)議,實(shí)現(xiàn)了認(rèn)證確權(quán)、責(zé)任判定、溯源追蹤等安全服務(wù),滿(mǎn)足了外包數(shù)據(jù)正確性、完整性、可用性等安全需求,因此,近年來(lái),得到了學(xué)術(shù)、產(chǎn)業(yè)、政府等各界的廣泛關(guān)注和重視。然而,隨著數(shù)據(jù)及其應(yīng)用規(guī)模與類(lèi)型的不斷增加,現(xiàn)有外包數(shù)據(jù)安全驗(yàn)證方案面臨著以下幾個(gè)方面的問(wèn)題與挑戰(zhàn)。其一,當(dāng)前位置驗(yàn)證方案的結(jié)果誤差較大且不能阻止延長(zhǎng)距離攻擊,數(shù)據(jù)訪(fǎng)問(wèn)位置難以被用于安全管控。因此,如何提高數(shù)據(jù)用戶(hù)位置安全驗(yàn)證的精準(zhǔn)度,并將其作為外包數(shù)據(jù)訪(fǎng)問(wèn)控制的因素,是本文關(guān)注的重要內(nèi)容。其二,現(xiàn)有可驗(yàn)證數(shù)據(jù)庫(kù)方案的初始化時(shí)間和空間復(fù)雜度高,導(dǎo)致大規(guī)模應(yīng)用時(shí)高昂的建設(shè)、使用和維護(hù)成本。因此,如何降低大規(guī)?沈(yàn)證數(shù)據(jù)庫(kù)的復(fù)雜...
【文章頁(yè)數(shù)】:105 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Motivations
1.2 Related Work
1.3 Our Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 All-or-Nothing Transformation
2.3 Vector Commitment
2.4 Counting Bloom Filter
2.5 Dynamic Accumulator
2.6 Distance Bounding Protocol
2.7 Verifiable Database with Updates
2.8 Verifiable Data Streaming
2.9 Summary
Chapter 3 Secure Data Sharing with Verifiability of User Location
3.1 Overview
3.2 Ears Protocol
3.2.1 System Model
3.2.2 Construction of Basic Ears Version
3.2.3 Construction of Standard Ears Version
3.2.4 Construction of Extended Ears Version
3.2.5 Analysis of the Ears Protocol
3.3 Secure Location-Sensitive Data Sharing (SLDS)
3.3.1 Design Model and Requirements
3.3.2 Definition and Construction
3.3.3 Security Analysis of SLDS Scheme
3.3.4 Efficiency Analysis of and Comparison
3.4 Performance Evaluation
3.4.1 Performance Evaluation of Ears Protocol
3.4.2 Performance Evaluation of SLDS Scheme
3.5 Summary
Chapter 4 Hierarchical Verifiable Database with Scalable Updates
4.1 Overview
4.2 Vector Commitment Tree (VCT)
4.2.1 Definition of VCT
4.2.2 Construction of VCT
4.3 Hierarchical Verifiable Database with Scalable Updates (HVDB)
4.3.1 Definition of HVDB
4.3.2 Construction of HVDB
4.3.3 Security Analysis of HVDB Scheme
4.3.4 Efficiency Analysis and Comparison
4.4 Performance Evaluation
4.5 Summary
Chapter 5 Constant Verifiable Data Streaming with Accountability
5.1 Overview
5.2 Dimension Increasing Vector Commitment (DIVC)
5.2.1 Definition of DIVC
5.2.2 Construction of DIVC
5.3 Constant Verifiable Data Streaming with Accountability (CVDS)
5.3.1 Definition of CVDS
5.3.2 Probabilistic Construction of CVDS
5.3.3 Security Analysis of P-CVDS Scheme
5.3.4 Deterministic Construction of CVDS
5.3.5 Security Analysis of D-CVDS Scheme
5.3.6 Efficiency Analysis and Comparison
5.4 Performance Evaluation
5.5 Summary
Chapter 6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Bibliography
Acknowledgement
作者簡(jiǎn)介
本文編號(hào):3877562
【文章頁(yè)數(shù)】:105 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Motivations
1.2 Related Work
1.3 Our Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 All-or-Nothing Transformation
2.3 Vector Commitment
2.4 Counting Bloom Filter
2.5 Dynamic Accumulator
2.6 Distance Bounding Protocol
2.7 Verifiable Database with Updates
2.8 Verifiable Data Streaming
2.9 Summary
Chapter 3 Secure Data Sharing with Verifiability of User Location
3.1 Overview
3.2 Ears Protocol
3.2.1 System Model
3.2.2 Construction of Basic Ears Version
3.2.3 Construction of Standard Ears Version
3.2.4 Construction of Extended Ears Version
3.2.5 Analysis of the Ears Protocol
3.3 Secure Location-Sensitive Data Sharing (SLDS)
3.3.1 Design Model and Requirements
3.3.2 Definition and Construction
3.3.3 Security Analysis of SLDS Scheme
3.3.4 Efficiency Analysis of and Comparison
3.4 Performance Evaluation
3.4.1 Performance Evaluation of Ears Protocol
3.4.2 Performance Evaluation of SLDS Scheme
3.5 Summary
Chapter 4 Hierarchical Verifiable Database with Scalable Updates
4.1 Overview
4.2 Vector Commitment Tree (VCT)
4.2.1 Definition of VCT
4.2.2 Construction of VCT
4.3 Hierarchical Verifiable Database with Scalable Updates (HVDB)
4.3.1 Definition of HVDB
4.3.2 Construction of HVDB
4.3.3 Security Analysis of HVDB Scheme
4.3.4 Efficiency Analysis and Comparison
4.4 Performance Evaluation
4.5 Summary
Chapter 5 Constant Verifiable Data Streaming with Accountability
5.1 Overview
5.2 Dimension Increasing Vector Commitment (DIVC)
5.2.1 Definition of DIVC
5.2.2 Construction of DIVC
5.3 Constant Verifiable Data Streaming with Accountability (CVDS)
5.3.1 Definition of CVDS
5.3.2 Probabilistic Construction of CVDS
5.3.3 Security Analysis of P-CVDS Scheme
5.3.4 Deterministic Construction of CVDS
5.3.5 Security Analysis of D-CVDS Scheme
5.3.6 Efficiency Analysis and Comparison
5.4 Performance Evaluation
5.5 Summary
Chapter 6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Bibliography
Acknowledgement
作者簡(jiǎn)介
本文編號(hào):3877562
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/3877562.html
最近更新
教材專(zhuān)著