云环境下外包数据的高效检索及安全审计技术研究

发布时间:2019-06-29 15:41
【摘要】:云计算实现了人们长期以来把计算作为一种资源的梦想,它给人们带来了诸多便利,比如按需自助服务,无处不在的网络访问,快速资源伸缩,计量付费及外包计算等。其中,云计算最显著的优势就是外包模式。也就是说,资源受限的用户可以将昂贵的计算任务外包给云服务器,并通过按需付费的方式享受云计算无尽的计算和存储服务。作为外包计算的一个重要分支,数据库外包允许数据拥有者委托其数据库管理权给云服务器并由云服务器来向数据库用户提供各种数据库服务,已经引起了学术界的持续关注。然而,外包数据库在为人们带来诸多益处的同时,也不可避免地面临着一些新的安全挑战。首先,由于云服务器是不完全可信的,数据外包之前需要进行加密操作,这就使得如何完成数据高效检索变得困难。其次,出于自身利益的驱动或者受软硬件运行故障等因素影响,云服务器可能会诚实地执行部分检索操作并返回给用户不正确/不完整的检索结果。因此,外包数据库的安全审计问题成为我们面临的又一挑战问题。在本文中,我们主要围绕安全数据外包中的关键问题展开研究。主要包括:(1)如何实现外包数据库的可验证检索;(2)如何实现高维加密数据的近似最近邻检索;(3)如何实现安全数据去重中的恶意用户身份追踪。具体来说,本文主要贡献可总结为以下几个方面:1.我们首次解决了外包数据库场景中云服务器返回空集时检索结果的验证问题。通过引入一个新的密码学原语-布隆过滤器树,我们提出了一种新的可验证外包数据库审计方案。即使在云服务器有意返回空集作为检索结果时,该方案仍然能够同时保证检索结果的正确性和完整性。和现有的工作相比,所提出的方案能够确保数据的机密性,适用于加密数据库场景。(第三章)2.我们进一步研究了外包数据库可验证检索问题。利用可翻转布隆过滤器(Invertible Bloom Filter),我们提出了一种灵活的可验证外包数据库检索方案。该方案能够同时达到检索结果可验证性和支持高效的数据更新操作。也就是说,当新的数据记录插入时,当前数据记录无需做任何改变操作。这一特性使得其适用于动态外包数据库场景中。此外,借助于多用户可搜索加密技术,我们将该方案扩展到了多用户场景。由于索引中分别为数据拥有者和其他授权用户存储不同的可搜索内容,该方案能够有效抵抗云服务器和恶意用户勾结攻击。(第四章)3.我们研究了外包数据库近似最近邻检索问题。通过利用局部敏感哈希和保序加密相结合的方法,我们提出了一种新的高维密文数据最近邻检索方案。该方案能够同时实现高效的近似最近邻检索和数据机密性。此外,我们提出的方案能够支持高效的密文范围查找。(第五章)4.我们研究了安全数据去重中的恶意用户身份追踪问题。我们首次将用户身份追踪性引入到安全数据去重中。当发生副本伪造攻击(Duplicate Faking Attack)时,该方法能够追踪恶意用户的身份。进一步地,我们构造了一个具体的支持恶意用户身份追踪的去重方案-TrDupo具体来说,每个用户上传文件时伴随着一种基于可追踪签名技术的匿名签名。一旦发生副本伪造攻击,追踪代理者(Tracing Agent)能够揭露恶意用户的身份信息同时不会泄露其他用户的身份信息或指向文件的链接信息。(第六章)
[Abstract]:Cloud computing has a long-term dream of computing as a resource, which brings many conveniences, such as on-demand self-service, ubiquitous network access, rapid resource expansion, metering, and outsourcing. Among them, the most significant advantage of cloud computing is the outsourcing model. That is, a resource-limited user can outsource expensive computing tasks to the cloud server and enjoy the endless computing and storage services of cloud computing in a pay-by-demand manner. As an important branch of the outsourcing calculation, the database outsourcing allows the data owner to delegate its database management authority to the cloud server and provide various database services to the database user by the cloud server, which has attracted the attention of the academic community. The outsourcing database, however, inevitably faces a number of new security challenges while creating a number of benefits for people. First, because the cloud server is not completely trusted, the encryption operation is required before the data is outsourced, which makes it difficult to complete the data efficient retrieval. Second, the cloud server may be able to perform some of the retrieval operations honestly and return to the user an incorrect/ incomplete search result for self-interest driven or affected by software and software running failures. Therefore, the issue of the security audit of the outsourcing database becomes another challenge to us. In this paper, we mainly study the key problems in the outsourcing of safety data. The method mainly includes: (1) how to realize the verifiable retrieval of the outsourcing database; (2) how to realize the approximate nearest neighbor search of the high-dimensional encrypted data; and (3) how to realize the malicious user identity tracking in the security data deduplication. In particular, the main contribution of this article can be summarized in the following aspects:1. For the first time, we have solved the verification problem of the retrieval result when the cloud server returned the empty set in the outsourcing database scene. By introducing a new cryptographic primitive-Bloom filter tree, we propose a new audit scheme of verifiable outsourcing database. Even when the cloud server intentionally returns an empty set as a search result, the scheme can still ensure the correctness and integrity of the search results. Compared with the existing work, the proposed scheme can ensure the confidentiality of the data and is suitable for encrypting the database scene. (chap. III)2. We further study the verification and retrieval problems of the outsourcing database. With the Invert Bloom Filter, we propose a flexible and verifiable database retrieval scheme. The scheme is capable of simultaneously achieving the data updating operation of the retrieval result and supporting the efficient data updating. That is, when a new data record is inserted, the current data record does not need to do any change operation. This feature makes it available in a dynamic outsourcing database scenario. In addition, by means of a multi-user searchable encryption technique, we extend the scheme to a multi-user scenario. Since different searchable content is stored separately for the data owner and other authorized users in the index, the scheme can effectively resist the collusion attack of the cloud server and the malicious user. (chap. IV)3. We have studied the near-nearest neighbor search problem of the outsourcing database. By using the combination of local sensitive hash and order-preserving encryption, we propose a new nearest neighbor search scheme for high-dimensional ciphertext data. The scheme can realize high-efficient near-nearest neighbor search and data confidentiality at the same time. In addition, our proposed solution is able to support efficient ciphertext-range finding. (chap. V)4. We have studied the problem of malicious user identity tracking in the de-duplication of security data. For the first time, user identity tracking is introduced into the security data de-duplication. The method can track the identity of a malicious user when a copy-forgery attack occurs. Further, we construct a specific de-duplication scheme that supports malicious user identity tracking. In particular, each user uploads a file with an anonymous signature based on a traceable signature technique. Once a copy-forgery attack occurs, the tracking agent can expose the identity information of the malicious user without revealing the identity information of the other user or the link information to the file. (Chapter VI)
【学位授予单位】:西安电子科技大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TP311.13;TP309

【相似文献】

相关期刊论文 前3条

1 李莉,侯钰;化工产品的“材料安全数据页”(MSDS)[J];河北化工;2001年02期

2 孟宇龙;印桂生;王慧强;;应用WEMLS的安全数据集成模型[J];计算机工程;2010年12期

3 ;[J];;年期

相关博士学位论文 前1条

1 王剑锋;云环境下外包数据的高效检索及安全审计技术研究[D];西安电子科技大学;2016年



本文编号:2507934

资料下载
论文发表

本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2507934.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户62e19***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com