云计算环境下外包数据安全验证技术研究
发布时间:2024-01-08 19:50
云计算是一种按需弹性分配资源的新型计算模式,使得用户可以通过网络快捷地获取定制化的计算、存储、网络等虚拟资源,有效提高了物理资源的利用率、可用性和可靠性,降低了用户的资源使用与管理成本。然而,相比于传统计算模式,在云计算中,数据的存储和处理被转移到非完全可信的云端,导致数据所有权与管理权分离,使得云外包数据面临泄漏、篡改、丢失等安全威胁。数据安全验证技术基于消息验证码、数字签名、认证的数据结构等密码原语或安全协议,实现了认证确权、责任判定、溯源追踪等安全服务,满足了外包数据正确性、完整性、可用性等安全需求,因此,近年来,得到了学术、产业、政府等各界的广泛关注和重视。然而,随着数据及其应用规模与类型的不断增加,现有外包数据安全验证方案面临着以下几个方面的问题与挑战。其一,当前位置验证方案的结果误差较大且不能阻止延长距离攻击,数据访问位置难以被用于安全管控。因此,如何提高数据用户位置安全验证的精准度,并将其作为外包数据访问控制的因素,是本文关注的重要内容。其二,现有可验证数据库方案的初始化时间和空间复杂度高,导致大规模应用时高昂的建设、使用和维护成本。因此,如何降低大规模可验证数据库的复杂...
【文章页数】:105 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Motivations
1.2 Related Work
1.3 Our Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 All-or-Nothing Transformation
2.3 Vector Commitment
2.4 Counting Bloom Filter
2.5 Dynamic Accumulator
2.6 Distance Bounding Protocol
2.7 Verifiable Database with Updates
2.8 Verifiable Data Streaming
2.9 Summary
Chapter 3 Secure Data Sharing with Verifiability of User Location
3.1 Overview
3.2 Ears Protocol
3.2.1 System Model
3.2.2 Construction of Basic Ears Version
3.2.3 Construction of Standard Ears Version
3.2.4 Construction of Extended Ears Version
3.2.5 Analysis of the Ears Protocol
3.3 Secure Location-Sensitive Data Sharing (SLDS)
3.3.1 Design Model and Requirements
3.3.2 Definition and Construction
3.3.3 Security Analysis of SLDS Scheme
3.3.4 Efficiency Analysis of and Comparison
3.4 Performance Evaluation
3.4.1 Performance Evaluation of Ears Protocol
3.4.2 Performance Evaluation of SLDS Scheme
3.5 Summary
Chapter 4 Hierarchical Verifiable Database with Scalable Updates
4.1 Overview
4.2 Vector Commitment Tree (VCT)
4.2.1 Definition of VCT
4.2.2 Construction of VCT
4.3 Hierarchical Verifiable Database with Scalable Updates (HVDB)
4.3.1 Definition of HVDB
4.3.2 Construction of HVDB
4.3.3 Security Analysis of HVDB Scheme
4.3.4 Efficiency Analysis and Comparison
4.4 Performance Evaluation
4.5 Summary
Chapter 5 Constant Verifiable Data Streaming with Accountability
5.1 Overview
5.2 Dimension Increasing Vector Commitment (DIVC)
5.2.1 Definition of DIVC
5.2.2 Construction of DIVC
5.3 Constant Verifiable Data Streaming with Accountability (CVDS)
5.3.1 Definition of CVDS
5.3.2 Probabilistic Construction of CVDS
5.3.3 Security Analysis of P-CVDS Scheme
5.3.4 Deterministic Construction of CVDS
5.3.5 Security Analysis of D-CVDS Scheme
5.3.6 Efficiency Analysis and Comparison
5.4 Performance Evaluation
5.5 Summary
Chapter 6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Bibliography
Acknowledgement
作者简介
本文编号:3877562
【文章页数】:105 页
【学位级别】:博士
【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1 Introduction
1.1 Motivations
1.2 Related Work
1.3 Our Contributions
1.4 Organization
Chapter 2 Preliminaries
2.1 Bilinear Pairings
2.2 All-or-Nothing Transformation
2.3 Vector Commitment
2.4 Counting Bloom Filter
2.5 Dynamic Accumulator
2.6 Distance Bounding Protocol
2.7 Verifiable Database with Updates
2.8 Verifiable Data Streaming
2.9 Summary
Chapter 3 Secure Data Sharing with Verifiability of User Location
3.1 Overview
3.2 Ears Protocol
3.2.1 System Model
3.2.2 Construction of Basic Ears Version
3.2.3 Construction of Standard Ears Version
3.2.4 Construction of Extended Ears Version
3.2.5 Analysis of the Ears Protocol
3.3 Secure Location-Sensitive Data Sharing (SLDS)
3.3.1 Design Model and Requirements
3.3.2 Definition and Construction
3.3.3 Security Analysis of SLDS Scheme
3.3.4 Efficiency Analysis of and Comparison
3.4 Performance Evaluation
3.4.1 Performance Evaluation of Ears Protocol
3.4.2 Performance Evaluation of SLDS Scheme
3.5 Summary
Chapter 4 Hierarchical Verifiable Database with Scalable Updates
4.1 Overview
4.2 Vector Commitment Tree (VCT)
4.2.1 Definition of VCT
4.2.2 Construction of VCT
4.3 Hierarchical Verifiable Database with Scalable Updates (HVDB)
4.3.1 Definition of HVDB
4.3.2 Construction of HVDB
4.3.3 Security Analysis of HVDB Scheme
4.3.4 Efficiency Analysis and Comparison
4.4 Performance Evaluation
4.5 Summary
Chapter 5 Constant Verifiable Data Streaming with Accountability
5.1 Overview
5.2 Dimension Increasing Vector Commitment (DIVC)
5.2.1 Definition of DIVC
5.2.2 Construction of DIVC
5.3 Constant Verifiable Data Streaming with Accountability (CVDS)
5.3.1 Definition of CVDS
5.3.2 Probabilistic Construction of CVDS
5.3.3 Security Analysis of P-CVDS Scheme
5.3.4 Deterministic Construction of CVDS
5.3.5 Security Analysis of D-CVDS Scheme
5.3.6 Efficiency Analysis and Comparison
5.4 Performance Evaluation
5.5 Summary
Chapter 6 Conclusion and Future Work
6.1 Conclusion
6.2 Future Work
Bibliography
Acknowledgement
作者简介
本文编号:3877562
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/3877562.html