云存储中加密数据查询完整性研究
发布时间:2018-11-23 19:59
【摘要】:互联网时代大规模的数据存储和计算任务催生了云计算的出现,而云计算的安全问题也日益受到重视。在外包服务场景,尤其是云存储中,数据安全问题显得更加重要。外包数据有自己的许多特点,如安全性要求、分布式存储、查询检索和查询保证。本文就查询保证的性质进行分析,分别解决保证各个性质所需要的方法。研究的性质分为五个方面,分别是机密性、新鲜性、正确性、完成性和查询完整性。这里的查询完整性是一个新的概念,指的是云服务器能否诚实的执行用户所进行的查询。本文主要内容如下: (1)阐述查询保证系统的的结构。云查询保证的结构分为用户和云服务提供商,其中用户又分为客户和数据拥有者。对比了概率型查询保证和验证型查询保证,并采用验证型查询保证作为后续工作的机制。这一部分也对机密性、新鲜性、正确性、完成性和查询完整性的方法进行分析对比,得出最可行的方法。最后通过分析查询保证的步骤,从而得出高效的性质验证步骤。 (2)分别对单点查询完整性、范围查询完整性和多属性查询完整性进行研究。单点查询完整性研究了机密性、新鲜性、正确性和查询完整性。范围查询根据查询的方法不同,导致叶子节点架构的差别,从而进一步导致各个性质查询的区别。多属性查询则来自多个属性树和多个范围查询。有所不同的是,,多属性查询针对每个哈希树的五个属性分别处理,尤其是在保证正确性和完成性方面。最后提出了我们工作的总结和对来我们需要完成工作的方向。
[Abstract]:The large-scale data storage and computing tasks in the Internet era have spawned the emergence of cloud computing, and the security of cloud computing has been paid more and more attention. In outsourced service scenarios, especially in cloud storage, data security becomes more important. Outsourcing data has its own characteristics, such as security requirements, distributed storage, query retrieval and query assurance. In this paper, we analyze the nature of query guarantee, and solve the methods needed to guarantee each property separately. The nature of the study is classified into five aspects: confidentiality, freshness, correctness, completeness and query integrity. Query integrity here is a new concept, which refers to whether the cloud server can honestly execute the query made by the user. The main contents of this paper are as follows: (1) the structure of query guarantee system is expounded. The structure of cloud query guarantee is divided into user and cloud service provider, where user is divided into customer and data owner. The probabilistic query guarantee and the verification query guarantee are compared, and the verification query guarantee is adopted as the follow-up mechanism. In this part, the methods of confidentiality, freshness, correctness, completeness and query integrity are analyzed and compared, and the most feasible method is obtained. Finally, by analyzing the steps of query guarantee, the efficient property verification steps are obtained. (2) the integrity of single point query, range query and multi attribute query are studied respectively. Single-point query integrity studies confidentiality, freshness, correctness and query integrity. According to the different query methods, the range query leads to the difference of the leaf node structure, which further leads to the difference of each nature of the query. Multiple attribute queries come from multiple attribute trees and multiple range queries. The difference is that multiple attribute queries are processed separately for five attributes of each hash tree, especially in terms of accuracy and completeness. Finally, we put forward the summary of our work and the direction we need to complete the work.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP333;TP309.7
本文编号:2352549
[Abstract]:The large-scale data storage and computing tasks in the Internet era have spawned the emergence of cloud computing, and the security of cloud computing has been paid more and more attention. In outsourced service scenarios, especially in cloud storage, data security becomes more important. Outsourcing data has its own characteristics, such as security requirements, distributed storage, query retrieval and query assurance. In this paper, we analyze the nature of query guarantee, and solve the methods needed to guarantee each property separately. The nature of the study is classified into five aspects: confidentiality, freshness, correctness, completeness and query integrity. Query integrity here is a new concept, which refers to whether the cloud server can honestly execute the query made by the user. The main contents of this paper are as follows: (1) the structure of query guarantee system is expounded. The structure of cloud query guarantee is divided into user and cloud service provider, where user is divided into customer and data owner. The probabilistic query guarantee and the verification query guarantee are compared, and the verification query guarantee is adopted as the follow-up mechanism. In this part, the methods of confidentiality, freshness, correctness, completeness and query integrity are analyzed and compared, and the most feasible method is obtained. Finally, by analyzing the steps of query guarantee, the efficient property verification steps are obtained. (2) the integrity of single point query, range query and multi attribute query are studied respectively. Single-point query integrity studies confidentiality, freshness, correctness and query integrity. According to the different query methods, the range query leads to the difference of the leaf node structure, which further leads to the difference of each nature of the query. Multiple attribute queries come from multiple attribute trees and multiple range queries. The difference is that multiple attribute queries are processed separately for five attributes of each hash tree, especially in terms of accuracy and completeness. Finally, we put forward the summary of our work and the direction we need to complete the work.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP333;TP309.7
【共引文献】
相关硕士学位论文 前6条
1 麻浩;外包数据库安全访问机制研究[D];暨南大学;2011年
2 袁多宝;外包数据库查询验证技术的研究[D];暨南大学;2010年
3 张艳辉;外包XML数据库查询验证技术研究[D];暨南大学;2012年
4 汤成勋;基于UML的住房公积金业务管理系统的研究与实现[D];南京理工大学;2012年
5 洪济海;外包空间数据库中反向k近邻查询验证方法研究[D];燕山大学;2013年
6 何尤锐;外包空间数据库中范围和移动k近邻skyline的查询验证[D];燕山大学;2013年
本文编号:2352549
本文链接:https://www.wllwen.com/kejilunwen/jisuanjikexuelunwen/2352549.html