云環(huán)境下多模指數(shù)安全外包方案研究
本文選題:云計算 + 外包算法; 參考:《西安電子科技大學(xué)》2014年碩士論文
【摘要】:隨著虛擬化技術(shù)、分布式存儲技術(shù)、寬帶互聯(lián)網(wǎng)技術(shù)、處理器技術(shù)和自動化管理技術(shù)的發(fā)展,云計算已經(jīng)越來越引人注目。云計算將實用性、便捷性和按需網(wǎng)絡(luò)訪問可配置計算資源集中池作為計算的長期目標(biāo)。云計算最具吸引力的優(yōu)勢之一是外包模式,使資源受限的設(shè)備可以以按使用付費的方式向云服務(wù)器外包其巨大的計算工作負(fù)載。通過服務(wù)器虛擬化的搭建和分布式的大規(guī)模集群,使“云”獲得了強(qiáng)大的計算能力。云計算講述的是移動服務(wù),計算和數(shù)據(jù)——為了降低本地的成本和提高商業(yè)利益,達(dá)到位置透明、集中設(shè)施和承包的目的。通過使云中的數(shù)據(jù)可利用,用戶可以更加容易而且不受位置的限制訪問云服務(wù)器。通過一個共享的平臺,在降低成本的同時,也可以實現(xiàn)增強(qiáng)合作、集成和分析的目的。然而,云計算和Web服務(wù)同樣運行在網(wǎng)絡(luò)結(jié)構(gòu)之上,所以它們暴露在網(wǎng)絡(luò)類型攻擊之下。為了實現(xiàn)保密性、完整性、可用性和可控性等信息安全的目標(biāo),安全外包算法被廣泛應(yīng)用于云計算當(dāng)中。作為當(dāng)前大多數(shù)密碼系統(tǒng)中的基本操作,模指數(shù)計算在構(gòu)建安全外包方案的同時也具有一些亟待解決的問題。本文對多模指數(shù)安全外包方案等進(jìn)行了系統(tǒng)的研究,主要工作包括以下幾個方面:1.對國內(nèi)外現(xiàn)有的基于模指數(shù)運算的外包方案進(jìn)行研究。在基于一個不可信云服務(wù)器的模型中,分析研究了三種安全外包方案,可以使用戶將模指數(shù)運算安全的外包給單云服務(wù)器,分別為固定的基于變量的指數(shù)冪運算安全外包方案、可變的基于變量的指數(shù)冪安全外包方案和同步模指數(shù)的安全外包方案?偨Y(jié)了這些方案的局限性,并且做了相應(yīng)的改進(jìn)。2.基于兩個不可信程序的單敵手(the one-malicious version of two untrusted program model)版本模型(簡稱為“單敵手模型”),提出了一種改進(jìn)的多模指數(shù)安全外包計算方案。通過對上述安全模指數(shù)外包方案的研究,本文所提出的方案對其進(jìn)行了改進(jìn),通過調(diào)用新的子程序?qū)υ桨高M(jìn)行了擴(kuò)展,不僅可以達(dá)到加/解密過程的高效性和保密性,也能實現(xiàn)外包方案的可檢驗性和安全性。3.針對模指數(shù)運算的相關(guān)安全性定義,本文通過嚴(yán)格的安全性分析,證明了多模指數(shù)安全外包方案在各種不同類型輸入的情況下是安全的。
[Abstract]:With the development of virtualization technology, distributed storage technology, broadband Internet technology, processor technology and automation management technology, cloud computing has become more and more attractive. Cloud computing uses availability, convenience and on-demand network access to configurable computing resource pooling as the long-term goals of computing. One of the most attractive advantages of cloud computing is the outsourcing model, which allows resource-constrained devices to outsource their huge computing workload to cloud servers on a pay-per-use basis. Through the establishment of server virtualization and distributed large-scale cluster, "cloud" has acquired powerful computing power. Cloud computing is about mobile services, computing and data-in order to reduce local costs and increase business benefits, location transparency, centralized facilities and contracting purposes. By making data available in the cloud, users can access the cloud server more easily and without restriction of location. Through a shared platform, the purpose of enhancing cooperation, integration and analysis can be achieved while reducing costs. However, cloud computing and Web services also run on the network structure, so they are exposed to network type attacks. In order to achieve the goal of information security such as confidentiality, integrity, availability and controllability, security outsourcing algorithms are widely used in cloud computing. As a basic operation in most cryptographic systems, modular exponent calculation has some problems to be solved while constructing security outsourcing scheme. In this paper, we systematically study the multi-mode exponential security outsourcing scheme. The main work includes the following aspects: 1. 1. The existing outsourcing schemes based on modular exponent operation at home and abroad are studied. In a model based on an untrusted cloud server, three security outsourcing schemes are analyzed and studied, which can enable users to outsource modular exponential operation security to a single cloud server, which is a fixed security outsourcing scheme based on variable exponential power operation. Variable exponential power security outsourcing scheme based on variable and synchronous mode exponential security outsourcing scheme. The limitations of these schemes are summarized and the corresponding improvements. 2. 2. Based on the one-malicious version of two untrusted program model) version model of two untrusted programs (referred to as "single adversary model" for short), an improved multi-mode exponential security outsourcing scheme is proposed. Based on the research of the security module exponent outsourcing scheme mentioned above, the scheme proposed in this paper is improved, and the original scheme is extended by calling a new subroutine, which can not only achieve the high efficiency and confidentiality of the encryption / decryption process. It can also realize the testability and security of the outsourcing scheme. 3. According to the definition of the security of modular exponential operation, this paper proves that the multi-mode exponential security outsourcing scheme is safe under different types of input through strict security analysis.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 ;Radware APSolute應(yīng)用安全解決方案[J];信息安全與通信保密;2006年02期
2 吳金龍;計算機(jī)網(wǎng)絡(luò)對等安全通信技術(shù)的研究[J];華僑大學(xué)學(xué)報(自然科學(xué)版);2000年04期
3 ;安全產(chǎn)品 電信行業(yè)技術(shù)領(lǐng)先獎[J];每周電腦報;2004年20期
4 王芬,趙梗明;嵌入式網(wǎng)絡(luò)接入的安全通信機(jī)制研究[J];單片機(jī)與嵌入式系統(tǒng)應(yīng)用;2005年09期
5 盧佐華;;正解網(wǎng)絡(luò)在安全體系架構(gòu)中的位置[J];計算機(jī)安全;2006年03期
6 成典勤;;集群分布式安全探討[J];現(xiàn)代計算機(jī);2006年03期
7 邱俊源;張躍;;異步消息驅(qū)動安全通信模塊的設(shè)計與實現(xiàn)[J];計算機(jī)工程與設(shè)計;2011年08期
8 向敏;劉福強(qiáng);;有關(guān)計算機(jī)網(wǎng)絡(luò)對等安全通信技術(shù)的研究[J];信息安全與技術(shù);2013年01期
9 莫琨;;智慧旅游的安全威脅與對策探討[J];旅游縱覽(下半月);2013年02期
10 林琪,盧昱;處方信息的安全通信[J];指揮技術(shù)學(xué)院學(xué)報;2001年01期
相關(guān)會議論文 前10條
1 鄭重;李少華;劉亞斌;李敬東;;安全通信中的抗重播機(jī)制的研究與實現(xiàn)[A];第十八次全國計算機(jī)安全學(xué)術(shù)交流會論文集[C];2003年
2 于秀蘭;丁曉誠;李影;英春;劉東;周彬;魏冰;;電信行業(yè)數(shù)據(jù)業(yè)務(wù)中Web Service的安全[A];中國通信學(xué)會信息通信網(wǎng)絡(luò)技術(shù)委員會2003年年會論文集[C];2003年
3 朱紅儒;焦文娟;齊e,
本文編號:1809406
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/1809406.html