透過您的圖書館登入
IP:18.216.190.167
  • 學位論文

針對複數使用者設計之索引式加密關鍵字搜尋系統

A Secure Indexed Keyword Search System over Encrypted Data for Multiple Users

指導教授 : 鄭振牟

摘要


市面上推出愈來愈多雲端儲存服務,諸如Google雲端硬碟、Amazon S3、Dropbox亦或是其他的網路空間儲存服務,有些人偏重把此服務當作雲端硬碟在使用,可以從公司、學校或是家裡的主機連上線,同步分享檔案;有些人則把他當作分享檔案的媒介,供他人取用自己分享的檔案。 2012年初美國著名網路硬碟服務商MEGAUPLOAD的伺服器被美國政府強行關閉,並且取走儲存伺服器進行蒐證。此則案例凸顯若是本身的檔案沒有受到適當的加密保護,若受到駭客攻擊或是法律壓力,將會變的沒有隱私可言。除此之外若是線上的檔案進行加密,將會很難提供使用者做搜尋關鍵字的服務,找出特定檔案。 因此本研究實做一個多使用者及時系統架構,提供儲存在雲端的檔案加密服務,並且可以對檔案(文件)做檢索關鍵字的服務,且驗證此系統的安全性。

並列摘要


There are many cloud-storage services nowadays, for example, Google drive, Amazon S3, Dropbox, or other cloud-storage services. Some people use this kind of service as a synchronous drive who can achieve their file of the latest version in the company, at school, or at home. Other people use it as a platform, who want to share files with others. MEGAUPLOAD Limited [19], best known for its fast download speeds and large capacity storage spaces, is an online Hong Kong-based company established in 2005 that ran a number of online services related to file storage and viewing. The domain names were seized and the sites associated with Megaupload were shut down by the United States Department of Justice in January 2012. Also, the storage servers were seized by FBI. This case highlights that if files stores on cloud-storage had not been encrypted appropriately, when hackers attack the server to try to dump out the files or the government asks for files to service provider by law, there is no privacy for consumers. Besides, files are encrypted and stores on the server, users hardly can search specific files or document by keyword search. Our thesis implemented a secure indexed keyword search system over encrypted data for multiple users that provide consumers with a real-time service storing encrypted files or documents on the server. Documents’ owner or not want to search for specific files, they can key in keyword to find the exact files.

參考文獻


[1] N. Amato and M. Loui. Checking linked data structures. In Proceedings of the 24th International Symposium on Fault-Tolerant Computing, pages 164-173. IEEE, 1994.
[5] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004, pages 506-522. Springer, 2004.
[9] P. Devanbu and S. Stubblebine. Stack and queue integrity on hostile platforms. IEEE Transactions on Software Engineering, 28(1):100-108, 2002.
[12] P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security (ACNS 2004), pages 31-45. Springer, 2004.
[15] M. Ramakrishna. Practical performance of bloom _lters and parallel free-text searching. Communications of the ACM, 32(10):1237-1239, 1989.

延伸閱讀