当前位置:主页 > 科技论文 > 计算机论文 >

对等云存储服务系统的安全控制机制研究

发布时间:2018-07-03 06:15

  本文选题:云计算 + 对等计算 ; 参考:《华中科技大学》2013年博士论文


【摘要】:云计算和对等(Peer-to-Peer,P2P)计算是两种主流的分布式计算技术,能够有效地支持互联网上大规模分布式应用。P2P云存储服务系统是一种全新的互联网应用模式,它组合了两种技术的优势,采用高度可扩展的P2P网络架构将系统中用户计算机的闲置存储资源整合起来,以提供成本低廉且容量巨大的存储空间,同时基于云计算的管理和运营机制来提供具有高性能、高可靠性和高服务质量的服务。它具有大规模性、分布性、开放性、动态性、异质性、隐私性等特点,使它面临着更具复杂性和挑战性的安全问题。因此,设计有效的安全控制机制从数据、应用和用户三个重要层面上来解决关键安全问题具有十分重要的意义。 在P2P云中,云服务器和用户都并非完全可信。如何保障系统中存储数据的机密性,并实现安全灵活的数据共享是一个关键安全问题。提出了一个基于属性基加密(Attribute-Based Encryption,ABE)的安全、高效和细粒度的数据访问控制机制(ABE-based Access control mechanism for P2P storage Cloud, AAPC)。在AAPC中,设计了一个新的密文策略ABE方案,对数据进行加密和细粒度访问控制。为了解决用户访问权限撤销问题,进一步设计了一个代理重加密方案。它结合P2P信誉系统,使数据拥有者能够将繁复的撤销工作代理给云服务器和可信节点,使得数据拥有者和云服务器的计算开销均大幅降低。安全性分析表明AAPC在标准安全模型下是可证安全的,能够有效抵抗串谋攻击并保护用户访问权限信息。性能评估显示相比其它同类ABE方案和相关的撤销方案,AAPC中所有系统操作的时间都非常短,产生的密钥和密文也很小,并且当用户规模越大和动态时,它能够取得更加显著的性能优势。 在P2P云的基于网络编码的内容分发应用中,针对网络编码的污染攻击十分严重。如何抵抗这种攻击以保证内容分发的安全是一个关键安全问题。提出了一个基于椭圆曲线密码(Elliptic Curve Cryptography,ECC)的同态签名机制(ECC-based Homomorphic Signature mechanism,EHS)。利用EHS,系统节点能够对编码块进行高效的即时检测以快速发现污染块。为了进一步提高检测效率同时保持高安全性,引入批检测方法和合作安全方法,使节点能对多个编码块一同进行批检测,同时使他们在发现污染块时能警告其他可能被污染的节点以合作抵抗污染攻击。相比其它网络编码的污染探测类机制,EHS具有很高的安全性,而且产生的计算开销和通信开销均比较小。 EHS属于污染探测类机制,相比这类机制,攻击者识别是更加有效的抵抗污染攻击的方法。在EHS的基础上,提出了一个基于身份的恶意节点识别机制(Identity-based Malicious peer Identification mechanism, IMI)。为了快速地识别恶意节点,引入基于向量零空间性质的轻量级块检测方法,同时引入轻量级块签名方法,使得每个节点都必须对其发出的编码块签名以对这些块负责。EHS结合IMI形成了一套完整的P2P云中网络编码污染防御机制,具有高安全性、低开销、不依赖于特定的网络拓扑等特性。仿真实验显示,在实际应用场景中,IMI能够保证网络中很低的污染率,并能快速地鉴定出所有恶意节点。 P2P云中可能有不少恶意用户,他们会破坏系统功能,并且还会发动Sybil攻击,即会以多个身份加入系统以加强对系统的攻击。如何决定用户是否能够加入系统以抵抗这种攻击也是一个关键安全问题。提出了一个基于身份基密码(Identity-Based Cryptography,IBC)的准入控制机制(IBC-Based Admission control mechanism for P2P storage Cloud, IAPC)。它包括四个协议,分别为不同实际场景中加入的用户安全高效地分配身份标识。在基本协议中,云服务器使用回叫的方式认证用户,再为合法用户基于其IP地址分配随机的身份标识并产生对应的公私钥对。扩展协议1使云服务器能够将工作代理给多个可信节点。另外两个协议针对使用NAT(Network Address Translation)的网络用户,分别对上述两个协议进行扩充,基于用户的IP地址和端口号来为其分配身份,并在为他们分发私钥时加入密码难题,使其在得到私钥时必须付出一定的计算代价以防止恶意用户连续使用多个端口号来获取大量身份。IAPC无需进行复杂的身份证书管理,有效解决了如密钥托管、用户撤销、IP地址转换等安全问题;协议维持合理的计算时间,限制了恶意用户获取身份的速率,系统具备良好的可扩展性。
[Abstract]:Peer - to - Peer ( P2P ) computing is two kinds of mainstream distributed computing technologies , which can effectively support large - scale distributed applications on the Internet . The P2P cloud storage service system is a brand - new model of Internet application . It combines the advantages of two technologies . It has the characteristics of high performance , high reliability and high quality of service based on cloud computing management and operation mechanism . It has the characteristics of large scale , distribution , openness , dynamics , heterogeneity , privacy and so on . Therefore , it is very important to design effective security control mechanism to solve key security problems from the three important aspects of data , application and user .

In P2P cloud , cloud server and user are not completely trusted . How to guarantee confidentiality of data stored in the system and secure flexible data sharing is a key security problem . A secure , efficient and granular data access control mechanism ( ABE - based Access control mechanism for P2P storage Cloud , AAPC ) based on Attribute - Based Encryption ( ABE ) is proposed . In AAPC , a new ciphertext strategy ABE scheme is designed to encrypt the data and fine - grained access control . In order to solve the problem of user ' s access authorization revocation , a proxy re - encryption scheme is designed . It combines P2P reputation system to make data owner and cloud server compute the cost of computing . Security analysis shows that AAPC is safe in standard security model , and can effectively resist collusion attack and protect user ' s access rights information . The performance evaluation shows that AAPC has a very short time for all system operations in standard security model , and the key and ciphertext generated are very small , and when the user ' s scale is larger and dynamic , it can achieve more remarkable performance advantage .

In the P2P cloud - based content distribution application based on network coding , the pollution attack against network coding is very serious . How to resist this attack to ensure the security of content distribution is a key security problem . A homomorphic signature mechanism ( ECC - based Homomorphic Signature mechanism , EHS ) based on elliptic curve cryptosystem ( ECC ) is proposed . In order to further improve the detection efficiency while maintaining high security , the batch detection method and the cooperative security method are introduced , so that the node can batch detection together with the plurality of coding blocks , and meanwhile , the nodes can warn other nodes which may be polluted when the pollution blocks are found to cooperate to resist the pollution attack . Compared with other network coding pollution detection mechanisms , EHS has high safety , and the calculation cost and communication cost are small .

In this paper , an identity - based malicious peer identification mechanism ( IMI ) is proposed on the basis of EHS . In order to quickly identify a malicious node , a lightweight block detection method based on vector null space property is introduced , meanwhile , a lightweight block signature method is introduced , so that each node must sign the encoding block issued by it to be responsible for the blocks .

There may be a lot of malicious users in the P2P cloud , they will destroy the system function and also launch the Sybil attack , that is , join the system with multiple identities to strengthen the attack on the system . How to decide whether the user can join the system to resist the attack is also a key security problem . An admission control mechanism based on identity - based cryptography ( IAPC ) is proposed . In the basic protocol , cloud server uses the callback method to authenticate the user , and assigns the random identity identifier to the legitimate user based on its IP address and generates corresponding public and private key pair .
the protocol maintains reasonable calculation time , limits the rate of obtaining identity by malicious users , and the system has good expansibility .
【学位授予单位】:华中科技大学
【学位级别】:博士
【学位授予年份】:2013
【分类号】:TP333;TP309

【参考文献】

相关期刊论文 前3条

1 吴吉义;傅建庆;平玲娣;谢琪;;一种对等结构的云存储系统研究[J];电子学报;2011年05期

2 陈国良;孙广中;徐云;龙柏;;并行计算的一体化研究现状与发展趋势[J];科学通报;2009年08期

3 罗军舟;金嘉晖;宋爱波;东方;;云计算:体系架构与关键技术[J];通信学报;2011年07期

相关博士学位论文 前1条

1 吴吉义;基于DHT的开放对等云存储服务系统研究[D];浙江大学;2011年



本文编号:2092705

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2092705.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户c29f4***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com