物聯(lián)網(wǎng)環(huán)境分布式數(shù)據(jù)加密存儲(chǔ)和訪問(wèn)控制技術(shù)研究
發(fā)布時(shí)間:2017-04-29 11:16
本文關(guān)鍵詞:物聯(lián)網(wǎng)環(huán)境分布式數(shù)據(jù)加密存儲(chǔ)和訪問(wèn)控制技術(shù)研究,由筆耕文化傳播整理發(fā)布。
【摘要】:物聯(lián)網(wǎng)(Internet of Things, IOT),是通過(guò)無(wú)線射頻識(shí)別(RFID),紅外感應(yīng)器,全球定位系統(tǒng),激光掃描器等信息傳感設(shè)備,按約定的協(xié)議,把任何物品與互聯(lián)網(wǎng)連接起來(lái),進(jìn)行信息交換和通訊,以實(shí)現(xiàn)智能化識(shí)別,定位,跟蹤,監(jiān)控和管理的一種網(wǎng)絡(luò)。物聯(lián)網(wǎng)是物物相連的互聯(lián)網(wǎng),其核心和基礎(chǔ)仍然是互聯(lián)網(wǎng),是在互聯(lián)網(wǎng)基礎(chǔ)上延伸和擴(kuò)展的網(wǎng)絡(luò),且其用戶端擴(kuò)展到了任何物品與物品之間。隨著信息技術(shù)的快速發(fā)展,信息安全的內(nèi)涵也不斷延伸,要給信息安全下一個(gè)確切的定義是很困難的。在互連網(wǎng)與物聯(lián)網(wǎng)發(fā)展的大背景下,可以將信息安全理解為:在即定的安全秘級(jí)的條件下,信息系統(tǒng)抵御意外事件或惡意行為的能力,這些事件和行為將危及所存儲(chǔ)、處理或傳輸?shù)臄?shù)據(jù),以及經(jīng)由這些系統(tǒng)所提供的服務(wù)的可用性、機(jī)密性、完整性、不可否認(rèn)性與可控牲。 本文系統(tǒng)首先描述了物聯(lián)網(wǎng)(Internet of Things, IOT)的安全性需求及目前的研究現(xiàn)狀;其次,本文針對(duì)物聯(lián)網(wǎng)存在的數(shù)據(jù)加密和訪問(wèn)控制進(jìn)行了詳細(xì)的討論,引入了一種新的解決此類問(wèn)題的方法:基于屬性的加密方法;趯傩缘姆植际酱鎯(chǔ)系統(tǒng)安全訪問(wèn)方法是基于屬性的訪問(wèn)控制機(jī)制和認(rèn)證方法相結(jié)合。這種方法最大的優(yōu)點(diǎn)是不需要對(duì)數(shù)據(jù)解密就可進(jìn)行訪問(wèn)控制,從而節(jié)省了傳感器節(jié)點(diǎn)昂貴的用于數(shù)據(jù)解密的能量消耗;詳細(xì)分析了運(yùn)行這種體制的空間和能量代價(jià),及對(duì)物聯(lián)網(wǎng)節(jié)點(diǎn)的存儲(chǔ)空間,能量消耗乃至對(duì)整個(gè)物聯(lián)網(wǎng)壽命帶來(lái)的影響,并通過(guò)實(shí)驗(yàn)就其運(yùn)行狀況進(jìn)行了模擬。
【關(guān)鍵詞】:物聯(lián)網(wǎng) 安全 基于屬性的訪問(wèn)控制 加密存儲(chǔ) 分布式存儲(chǔ)系統(tǒng)
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2015
【分類號(hào)】:TN929.5;TP391.44;TN918.4
【目錄】:
- 摘要4-5
- ABSTARCT5-10
- Chapter 1 Preface10-17
- 1.1 Research background10-14
- 1.2 Security requirements for the mass storage system14-15
- 1.3 The main work for this paper15-16
- 1.4 Article Contents16-17
- Chapter 2 Security architecture of Internet of Things17-31
- 2.1 Network model17-19
- 2.2 Secu rity Threats for Internet of things19-21
- 2.3 IoT Security structure21-25
- 2.3.1 Sensor layer security architecture22-23
- 2.3.2 Network layer security architecture23-24
- 2.3.3 Co-processing layer security architecture24
- 2.3.4 Application layer security architecture24-25
- 2.3.5 Control systems security architecture25
- 2.4 Security requirements25-28
- 2.4.1 Terminal nodes security requirements27
- 2.4.2 Sensor layer security requirement27
- 2.4.3 Network layer security requirement27-28
- 2.4.4 Application layer security requirement28
- 2.4.5 Control management security requirement28
- 2.5 Research status28-31
- Chapter 3 Attribute-based encryption31-45
- 3.1 Overview of att ribute-based encryption31
- 3.2 Cipher text password policy mechanisms(Ciphertext-ABE)31-32
- 3.2.1 CP-ABE basic principles and functions32
- 3.3 Fundamental problems32-33
- 3.3.1 Attribute-based encryption system32-33
- 3.3.2 Bilinear Diffie-Hellman(BDH)33
- 3.3.3 Access Strudcture33
- 3.4 Implementation model33-34
- 3.4.1 Expressed access structure tree33-34
- 3.4.2 To meet the access tree structure34
- 3.5 Construction strategies based on the properties of the ciphertext encrypted system34-37
- 3.6 Attribute-based encryption mechanism's application on Internet of things37-38
- 3.7 Simulation methods of attr.bute encryption based on Internet of things38-45
- 3.7.1 The baslc principle of simulation41
- 3.7.2 Simulation parameter settings for internet of things network41-42
- 3.7.3 Analysis42-45
- Chapter 4 Internet of things Network distributed data storage and access control45-65
- 4.1 Data storage for Internet of Things45-46
- 4.2 Local storage strategies(LS)46-47
- 4.3 "Data-Centric" storage strategy47-50
- 4.3.1 Based on geographic Hash table(GHT)DCS storage47-48
- 4.3.2 DIFS(distributed index for features in sensor network)48
- 4.3.3 DIM(distributed index for multi-dimensional data)48
- 4.3.4 Comb and Double Ruling scheme stored query plan48-50
- 4.3.5 Scoop50
- 4.4 Distributed File system Access Control Analysis50-52
- 4.5 Distributed access control mechanism on the property52-61
- 4.5.1 Property description and management53-54
- 4.5.2 Attrbute-based access policy management54-58
- 4.5.3 Attrbute-based access control processes58-60
- 4.5.4 Sha ring and deleting users60-61
- 4.6 Encrypted storage and integrity check61-62
- 4.6.1 Encrypted Storage61
- 4.6.2 Delayed re-encryption technology61-62
- 4.6.3 Integrity check62
- 4.7 Security Analysis62-63
- 4.8 Summary63-65
- Chapter 5 Summary and Outlook65-68
- 5.1 Summary65-66
- 5.2 Work prospects66-68
- References68-71
- Acknowledgements71-72
- 詳細(xì)中文摘要72-78
【參考文獻(xiàn)】
中國(guó)期刊全文數(shù)據(jù)庫(kù) 前3條
1 王小明;付紅;張立臣;;基于屬性的訪問(wèn)控制研究進(jìn)展[J];電子學(xué)報(bào);2010年07期
2 朱巖;胡宏新;Gail-Joon Ahn;王懷習(xí);王善標(biāo);;Provably Secure Role-Based Encryption with Revocation Mechanism[J];Journal of Computer Science & Technology;2011年04期
3 李曉峰;馮登國(guó);陳朝武;房子河;;基于屬性的訪問(wèn)控制模型[J];通信學(xué)報(bào);2008年04期
本文關(guān)鍵詞:物聯(lián)網(wǎng)環(huán)境分布式數(shù)據(jù)加密存儲(chǔ)和訪問(wèn)控制技術(shù)研究,由筆耕文化傳播整理發(fā)布。
,本文編號(hào):334773
本文鏈接:http://sikaile.net/kejilunwen/wltx/334773.html
最近更新
教材專著