透過您的圖書館登入
IP:3.17.128.129
  • 學位論文

Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers

用於儲存空間提供者之有效率的加密文件共通字首搜尋法

指導教授 : 孫宏民
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


為了減少維護硬體設備的成本,現今有許多企業將它們的資料儲存外包給雲 端服務提供商。若企業的資料能被妥善地保護,不受第三方威脅,那雲端服務提 供商與企業之間的通訊可以只是一個安全通訊協定,例如SSL。然而,在這樣的 架構中,企業的資料必須是被以明文的形式儲存在雲端服務中,方能執行搜尋特 定資料。換言之,企業必須信任雲端服務提供商以及其管理員。   或者,將資料加密後儲存在雲端服務中,但一般的加密演算法的結果並 不適合被用來做搜尋。例如,當一個用戶希望可以找出包含有特定文字的文件時, 資料儲存伺服器無法在不失保密性的要求下事先知道如何處理請求的回應。而使 用我們所提出的加密方式帶來的優點在於,從客戶端產生的查尋會被轉化成一種 形式,使的它能直接以資料儲存伺服器中的加密資料來做評估。 用戶端會再解密資料儲存伺服器所產生的結果,以決定最終的搜尋結果。另 外,我們也采用了一有效率的糢糊關鍵字搜尋,使得我們的架構可以處理輸入錯 誤或文字誤用

並列摘要


Company data are very often outsourced to cloud service providers in order to lower costs of maintaining hardware. If the outsourced data are to be kept secure from a third party, the connection between the cloud service provider and the company could be secured by a protocol similar to SSL. This, however, requires that the data is stored at the cloud service provider in plaintext form, meaning the company has to trust the cloud service provider and its administrators in order to perform search on the outsourced data. Alternatively, the data themselves could be encrypted, however, the outputs of typical cryptographic algorithms are not amenable to search. For example, if a client wishes to retrieve only documents containing certain words, it was not previously known how to let the data storage server perform the search and answer the query without loss of data confidentiality. By the advantage of our cryptography scheme a query generated at the client-side, is transformed into a representation so that it can be evaluated directly on encrypted data at the data storage server. The results might be processed by the client after decryption to determine the final answers. Additionally, we introduce an efficient common prefix keyword search which makes the scheme more tolerant of minor typos and format inconsistencies when exact keyword matching fails.

參考文獻


[3] .net framework cryptographic services. http://msdn.microsoft.com/en-us/
[4] Windows communication foundation. http://msdn.microsoft.com/en-us/
[7] Microsoft virtual studio 2012. http://www.microsoft.com/visualstudio/
[9] Cloud Security Alliance. Security guidance for critical areas of focus in cloud
[11] Mikhail J Atallah, Florian Kerschbaum, and Wenliang Du. Secure and private

延伸閱讀