資料載入處理中...
圖書館首頁
|
網站地圖
|
首頁
|
本站說明
|
聯絡我們
|
相關資源
|
台聯大論文系統
|
操作說明
|
English
簡易查詢
進階查詢
論文瀏覽
熱門排行
我的研究室
上傳論文
新版博碩士論文系統
建檔說明
常見問題
帳號:guest(216.73.216.146)
離開系統
字體大小:
詳目顯示
第 1 筆 / 共 1 筆
/1
頁
以作者查詢圖書館館藏
、
以作者查詢臺灣博碩士論文系統
、
以作者查詢全國書目
論文基本資料
摘要
外文摘要
論文目次
參考文獻
電子全文
作者(中文):
婁瑋婷
作者(外文):
Lu, Wei Ting
論文名稱(中文):
可分享的密文關鍵字搜尋系統之研究
論文名稱(外文):
A System of Shareable Keyword Search on Encrypted Data
指導教授(中文):
孫宏民
指導教授(外文):
Sun, Hung Min
口試委員(中文):
曾文貴
許富皓
黃世昆
口試委員(外文):
Tzeng, Wen Guey
Hsu, Fu Hau
Huang, Shih Kun
學位類別:
碩士
校院名稱:
國立清華大學
系所名稱:
資訊工程學系
學號:
102062562
出版年(民國):
104
畢業學年度:
103
語文別:
英文
論文頁數:
40
中文關鍵詞:
密文搜尋
、
可分享
外文關鍵詞:
encrypted data search
、
multi-user shareable
相關次數:
推薦:0
點閱:636
評分:
下載:0
收藏:0
伴隨著雲端技術的發展,雲端儲存技術日趨成熟,例如Dropbox、Google Drive等,在Windows、iOS、Android上均有其用戶端應用程式,消費者越來越樂於將數據儲存於雲端儲存服務中,享有高品質隨時隨地讀寫與分享的需求的解決方案。除此之外,對企業而言,將數據儲存的工作交由雲端儲存服務提供商處理比起往常建立數據中心處理更加可以降低數據管理與硬體維護的成本。因此,享用雲端儲存服務的使用者越來越多,所儲存的數據量也非常快速地成長。漸漸地,文件搜尋的功能顯得不可或缺。
然而,雲端安全成為議題,使用者瞭解到即便有完整且安全的數據管理機制,也不足以完全避免攻擊者存取商業資訊或私人資訊的可能性。越來越多單人使用的密文搜尋架構被提出,讓使用者可以在密文的環境下做多種關鍵字搜尋,但如此卻犧牲了雲端可方便與他人共享檔案的好處。
因此我們提出可用於多人分享的密文搜尋平台,讓使用者除了可以搜尋自己的檔案外,也可將檔案分享給其他授權使用者做關鍵字搜尋,且在關鍵字及檔案部份仍使用對稱式加密法,保留單人使用密文搜尋的效率及安全性,同時加上可與他人分享的功能增添系統的實用性及方便性。
With the technical development of cloud computing, more and more company
provide their own cloud storage, such as Dropbox, Google Drive, Sky Drive etc..
Some of them also provide mobile application on Windows, iOS, and Android sys-
tem. To individual users, they could access their data anytime and anywhere by
storing their data on cloud storage. They could also save space of their own PC
storage. To enterprises, compared with building a conventional data center, they
could reduce the cost of data management and maintenance of hardware devices by
using the service supplied by cloud provider. Due to plenty of advantages above,
more and more people enjoy using cloud storage. And the amount of data stored in
the cloud increases rapidly. As a result, the searching functionality is indispensable.
However, the cloud security became a significant issue, users figured out that
even if the storage providers apply secure data management mechanism, it is still
possible for hijacker to steal users' credentials and secret of the commerce. Thus,
more and more single user keyword search on encrypted data were proposed. Users
could perform different keyword search without decrypting data. However, encrypt-
ing files before uploading scarified the advantage of the convenience of sharing data
with others on the cloud.
Consequently, we aimed to design a searchable encryption for multi-user. Data
owners could share their data with authorized users without directly sharing their
data keys. We combine the advantage of effciency of symmetric encryption with
authentication of asymmetric encryption to provide a secure and effcient system of
shareable keyword search on encrypted data.
Contents
Table of Contents i
List of Figures iii
List of Tables iv
1 Introduction 1
2 Related Work 4
3 Design 7
3.1 Design Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Basic Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.3 Design of Proposed Scheme . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.1 Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.2 Key Management . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.3 Create Secure Index/Data . . . . . . . . . . . . . . . . . . . . 13
3.3.4 Authentication Mechanism . . . . . . . . . . . . . . . . . . . . 13
3.4 Denition of Shareable Keyword Search . . . . . . . . . . . . . . . . . 13
3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4 Key Generation 18
4.1 Generating password for authentication . . . . . . . . . . . . . . . . . 18
4.2 Generating short-term KD and short-term KW for dierent shared les 19
4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5 Implementation 21
5.1 Programming Language and Server database . . . . . . . . . . . . . . 21
i
5.2 System Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.1 Signup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.2 Login Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.3 Upload the le . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.4 Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3 Search Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6 Conclusion and Future Work 37
[1] .net framework cryptographic services. http://msdn.microsoft.com/en-
us/libbrary/92f9ye3s.aspx/.
[2] Xenserver. http://www.citrix.com/products/xenserver/overview.html.
[3] Zen load balancer. http://www.xenloadbalancer.com/.
[4] Windows server 2008, 2008. https://technet.microsoft.com/zh-
tw/windowsserver/bb310558.aspx.
[5] Microsoft sql server 2010, 2010. http://www.microsoft.com/zh-
tw/download/details.aspx?id=29074.
[6] Microsoft virtual studio 2012., 2012. http://www.microsoft.com/virsualstudio/eng/oce-
dev-tools-for-virsual-studio/.
[7] Ostrovsky R Persiano G. Boneh D, G C. Public Key Encryption with Keyword
Search. In : EUROCRY PT2004, 2004.
[8] Kamara S Ostrovsky R. Curtmola R, Garay J. Searchable symmetric encryp-
tion:improved denitions and ecient constructions. In: Proceedings of the
13th ACM conference on Computer and Communications Security, ACM Press,
2006.
[9] Waters B. Golle P, Staddon J. Secure Conjunctive Keyword Search Over En-
crypted Data. In:ACNS2004, 2004.
39
[10] Li J Liu Z. Li J, Jia C. A Novel Framework for Outsourcing and Sharing Search-
able Encrypted Data on Hybrid Cloud. Intelligent Networking and Collaborative
Systems(INCoS), 2012 4th International Conference, 2012.
[11] Liu Z Jia C. Li J, Li J. Enabling Ecient and Secure Data Sharing in Cloud
Computing. Concurrency and Computation: Practice and Experience 2013,
2013.
[12] Wang C Cao N Ren K Li J, Wang Q and Lou W. Fuzzy Keyword Search over
Encrypted Data in Cloud Computing. Proc. IEEE INFOCOM 2010, 2010.
[13] Wang C Cao N Ren K Lou W. Li J, Wang Q. Fuzzy keyword search over
encrypted data in cloud computing. In:INFOCOM2010,IEEE Press, 2010.
[14] Cheng X Jia C Yuan K Liu Z, Wang Z. Multi-user Searchable Encryption with
Coarser-Grained Access Control in Hybrid Cloud. Emerging Intelligent Data
and Web Technologies, 2013 4th International Conference, 2013.
[15] Amir R. Ecient Common Prex Search on Encrypted Data as an Additional
Service on the Top of the Storage Providers. 2013.
[16] Perrig A. Song X, Wagner D. Practical techniques for searches on encrypted
data. IEEESymposiumonSecurityandPrivacy, 2000.
[17] Wang S. Zhang Y, Jia Z. A Multi-User Searchable Symmetric Encryption
Scheme for Cloud Storage System. Intelligent Networking and Collaborative
Systems(INCoS), 2013 5th International Conference, 2013.
[18] Ma H et al. Zhao Y, Chen X F. A New Trapdoorindistinguishable Public Key
Encryption with Keyword Search. Journal of Wireless Mobile Networks, 2012.
[19] Zou C.C. Zittrower S. Encrypted phrase searching in the cloud. Global Com-
munications Conference (GLOBECOM), IEEE, 2012.
(此全文未開放授權)
電子全文
摘要
推文
當script無法執行時可按︰
推文
推薦
當script無法執行時可按︰
推薦
評分
當script無法執行時可按︰
評分
引用網址
當script無法執行時可按︰
引用網址
轉寄
當script無法執行時可按︰
轉寄
top
相關論文
1.
用於實現秘密分享方法之具多項式時間複雜度的分解構建法
2.
基於特徵點之數位影像版權保護
3.
無線感知網路上具能量節約特性之安全路徑繞送協定的研究
4.
使用API監測系統對抗蠕蟲與惡意程式之研究
5.
無線感知網路之金鑰管理研究
6.
適用於無線感知網路安全群組通訊之具有效性及擴充性的金鑰管理方法
7.
基於身份與以隱私為主體的數位版權管理系統之研究
8.
A Study of Arithmetic Codes for Joint Encryption and Compression
9.
A Study of Key Management Mechanism for Content Access Control in Pay-TV Broadcasting Systems
10.
RSA金鑰產生器之後門研究
11.
基於微軟作業系統API掛勾之Shellcodes偵測之研究
12.
A Study on Lightweight Authentication Protocols for RFID
13.
多重服務環境下抵擋TCP SYN Flooding DDoS 攻擊之入侵防禦系統
14.
On the Design and Cryptanalysis of Efficient RSA Variants
15.
高可靠度網路資料傳輸與驗證
簡易查詢
|
進階查詢
|
論文瀏覽
|
熱門排行
|
管理/審核者登入
前往新版 [國立清華大學博碩士論文庫]
Go [NTHU Theses & Dissertations Repository]
關閉