帳號:guest(216.73.216.146)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):婁瑋婷
作者(外文):Lu, Wei Ting
論文名稱(中文):可分享的密文關鍵字搜尋系統之研究
論文名稱(外文):A System of Shareable Keyword Search on Encrypted Data
指導教授(中文):孫宏民
指導教授(外文):Sun, Hung Min
口試委員(中文):曾文貴
許富皓
黃世昆
口試委員(外文):Tzeng, Wen Guey
Hsu, Fu Hau
Huang, Shih Kun
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學號:102062562
出版年(民國):104
畢業學年度:103
語文別:英文
論文頁數:40
中文關鍵詞:密文搜尋可分享
外文關鍵詞:encrypted data searchmulti-user shareable
相關次數:
  • 推薦推薦:0
  • 點閱點閱:636
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
伴隨著雲端技術的發展,雲端儲存技術日趨成熟,例如Dropbox、Google Drive等,在Windows、iOS、Android上均有其用戶端應用程式,消費者越來越樂於將數據儲存於雲端儲存服務中,享有高品質隨時隨地讀寫與分享的需求的解決方案。除此之外,對企業而言,將數據儲存的工作交由雲端儲存服務提供商處理比起往常建立數據中心處理更加可以降低數據管理與硬體維護的成本。因此,享用雲端儲存服務的使用者越來越多,所儲存的數據量也非常快速地成長。漸漸地,文件搜尋的功能顯得不可或缺。
然而,雲端安全成為議題,使用者瞭解到即便有完整且安全的數據管理機制,也不足以完全避免攻擊者存取商業資訊或私人資訊的可能性。越來越多單人使用的密文搜尋架構被提出,讓使用者可以在密文的環境下做多種關鍵字搜尋,但如此卻犧牲了雲端可方便與他人共享檔案的好處。
因此我們提出可用於多人分享的密文搜尋平台,讓使用者除了可以搜尋自己的檔案外,也可將檔案分享給其他授權使用者做關鍵字搜尋,且在關鍵字及檔案部份仍使用對稱式加密法,保留單人使用密文搜尋的效率及安全性,同時加上可與他人分享的功能增添系統的實用性及方便性。
With the technical development of cloud computing, more and more company
provide their own cloud storage, such as Dropbox, Google Drive, Sky Drive etc..
Some of them also provide mobile application on Windows, iOS, and Android sys-
tem. To individual users, they could access their data anytime and anywhere by
storing their data on cloud storage. They could also save space of their own PC
storage. To enterprises, compared with building a conventional data center, they
could reduce the cost of data management and maintenance of hardware devices by
using the service supplied by cloud provider. Due to plenty of advantages above,
more and more people enjoy using cloud storage. And the amount of data stored in
the cloud increases rapidly. As a result, the searching functionality is indispensable.
However, the cloud security became a significant issue, users figured out that
even if the storage providers apply secure data management mechanism, it is still
possible for hijacker to steal users' credentials and secret of the commerce. Thus,
more and more single user keyword search on encrypted data were proposed. Users
could perform different keyword search without decrypting data. However, encrypt-
ing files before uploading scarified the advantage of the convenience of sharing data
with others on the cloud.
Consequently, we aimed to design a searchable encryption for multi-user. Data
owners could share their data with authorized users without directly sharing their
data keys. We combine the advantage of effciency of symmetric encryption with
authentication of asymmetric encryption to provide a secure and effcient system of
shareable keyword search on encrypted data.
Contents
Table of Contents i
List of Figures iii
List of Tables iv
1 Introduction 1
2 Related Work 4
3 Design 7
3.1 Design Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Basic Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.3 Design of Proposed Scheme . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.1 Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.2 Key Management . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.3 Create Secure Index/Data . . . . . . . . . . . . . . . . . . . . 13
3.3.4 Authentication Mechanism . . . . . . . . . . . . . . . . . . . . 13
3.4 De nition of Shareable Keyword Search . . . . . . . . . . . . . . . . . 13
3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4 Key Generation 18
4.1 Generating password for authentication . . . . . . . . . . . . . . . . . 18
4.2 Generating short-term KD and short-term KW for di erent shared les 19
4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5 Implementation 21
5.1 Programming Language and Server database . . . . . . . . . . . . . . 21
i
5.2 System Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.1 Signup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2.2 Login Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.3 Upload the le . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.4 Retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3 Search Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
5.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6 Conclusion and Future Work 37
[1] .net framework cryptographic services. http://msdn.microsoft.com/en-
us/libbrary/92f9ye3s.aspx/.
[2] Xenserver. http://www.citrix.com/products/xenserver/overview.html.
[3] Zen load balancer. http://www.xenloadbalancer.com/.
[4] Windows server 2008, 2008. https://technet.microsoft.com/zh-
tw/windowsserver/bb310558.aspx.
[5] Microsoft sql server 2010, 2010. http://www.microsoft.com/zh-
tw/download/details.aspx?id=29074.
[6] Microsoft virtual studio 2012., 2012. http://www.microsoft.com/virsualstudio/eng/oce-
dev-tools-for-virsual-studio/.
[7] Ostrovsky R Persiano G. Boneh D, G C. Public Key Encryption with Keyword
Search. In : EUROCRY PT2004, 2004.
[8] Kamara S Ostrovsky R. Curtmola R, Garay J. Searchable symmetric encryp-
tion:improved de nitions and ecient constructions. In: Proceedings of the
13th ACM conference on Computer and Communications Security, ACM Press,
2006.
[9] Waters B. Golle P, Staddon J. Secure Conjunctive Keyword Search Over En-
crypted Data. In:ACNS2004, 2004.
39
[10] Li J Liu Z. Li J, Jia C. A Novel Framework for Outsourcing and Sharing Search-
able Encrypted Data on Hybrid Cloud. Intelligent Networking and Collaborative
Systems(INCoS), 2012 4th International Conference, 2012.
[11] Liu Z Jia C. Li J, Li J. Enabling Ecient and Secure Data Sharing in Cloud
Computing. Concurrency and Computation: Practice and Experience 2013,
2013.
[12] Wang C Cao N Ren K Li J, Wang Q and Lou W. Fuzzy Keyword Search over
Encrypted Data in Cloud Computing. Proc. IEEE INFOCOM 2010, 2010.
[13] Wang C Cao N Ren K Lou W. Li J, Wang Q. Fuzzy keyword search over
encrypted data in cloud computing. In:INFOCOM2010,IEEE Press, 2010.
[14] Cheng X Jia C Yuan K Liu Z, Wang Z. Multi-user Searchable Encryption with
Coarser-Grained Access Control in Hybrid Cloud. Emerging Intelligent Data
and Web Technologies, 2013 4th International Conference, 2013.
[15] Amir R. Ecient Common Pre x Search on Encrypted Data as an Additional
Service on the Top of the Storage Providers. 2013.
[16] Perrig A. Song X, Wagner D. Practical techniques for searches on encrypted
data. IEEESymposiumonSecurityandPrivacy, 2000.
[17] Wang S. Zhang Y, Jia Z. A Multi-User Searchable Symmetric Encryption
Scheme for Cloud Storage System. Intelligent Networking and Collaborative
Systems(INCoS), 2013 5th International Conference, 2013.
[18] Ma H et al. Zhao Y, Chen X F. A New Trapdoorindistinguishable Public Key
Encryption with Keyword Search. Journal of Wireless Mobile Networks, 2012.
[19] Zou C.C. Zittrower S. Encrypted phrase searching in the cloud. Global Com-
munications Conference (GLOBECOM), IEEE, 2012.
(此全文未開放授權)
電子全文
摘要
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *