没有合适的资源?快使用搜索试试~ 我知道了~
云计算-普适计算模式下的文档组合与安全研究.pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 159 浏览量
2022-07-04
16:03:22
上传
评论
收藏 2.88MB PDF 举报
温馨提示
试读
102页
云计算-普适计算模式下的文档组合与安全研究.pdf
资源推荐
资源详情
资源评论
I
摘要
互联网使得把许多不同来源的文档元素组合成为新的文档成为可能,这种组
合文档在新型网络的服务提供、资源共享、预测分析和信息交互方面发挥日益重要
的作用。虽然已经出现了一些专用组合文档的使用、安全管理方面的研究成果,但
尚无文档组合的理论和方法研究,也没有文档组合过程的数据安全与隐私保护研
究。因此,本课题提出的研究内容具有重要的理论意义和实用价值。
本文对普适计算模式下的网络化文档组合模型和方法、组合文档的安全需求
分析及安全管理机制进行了系统的研究,所取得的主要研究成果为:
1. 研究了可自主组合、动态装配的文档制作与生成的可行性,提出网络化文
档组合概念,以可伸缩的规模化调度应用技术,把互联网上大量的文档资源协同、
交互、高效地组合生成新文档。网络化文档组合概念决定了网络化文档组合模式、
网络化文档组合领域工程和网络化文档组合应用工程三个层面的任务和相互关系。
进而提出组合文档用户的网络接入结构模型和文档组合方法,在用户接入网络代
理后由每个网络代理中的一组 agent 遵循协同框架模型执行文档组件的搜索和信
息的交互,最后形成组合文档实现用户组合目标。
2. 研究了结构化文档的安全访问对云服务质量控制的关键作用,提出云计算
环境中结构化文档的访问控制需求。我们分析云环境中结构化文档的新特征和租
户访问结构化文档的不同行为模式,进而系统阐明安全访问控制需求,包括基于行
为访问控制、控制租户的访问行为、租户的隐私保护、细粒度访问、多级安全和自
适应策略,还提出基于行为的多级访问控制框架。同时研究了组合文档的安全性和
隐私保护问题,分析了基于属性加密技术在文档存储的加密与完整性验证中的适
用性、文档组合和合成式攻击的区别及其对隐私保护带来的冲击、控制文档有限生
存的必要性及其主动删除、副本拷贝控制和副本关联删除技术需求。
3. 研究了以数字社区域模式管理的 agent 信任、社区域内外协作等特征,提出
以社区域为中心基于信任的访问控制模型,即依据 agent 自身上下文及信任证书建
立社区域,其后信任等级随会话动态调整,通过信任等级与信任阈值的匹配关系有
效地控制权限的激活和使用。与最新研究成果相比,该模型突出的特点是实现动态
权限控制,同时满足社区域内及社区域间角色的安全交互与协作。
4. 研究了电子投标模式的电子文件定时发布原理和存储在云端的电子文档存
在的隐私信息泄露风险,提出基于身份的定时发布加密文档又使文档定时自毁的
方案。该方案首先采用对称密钥加密电子文档,其密文经过提取算法变为提取密文
和封装密文;然后采用基于身份定时发布加密算法加密对称密钥,其密文结合提取
II
密文产生密文分量并分发到分布式 Hash 表(DHT)网络,封装密文被封装成电子
文档自毁对象后存储在云端。仅当到达预订的发布时间时,授权用户才能访问受保
护的电子文档,且当超过一定的时间期限时,DHT 网络将自动丢弃所存密文分量,
使得原始密钥不可恢复,实现电子文档安全自毁。安全分析表明,该方案能够同时
抵抗来自云端的密码分析攻击和来自 DHT 网络的 Sybil 攻击;实验结果表明,该
方案的计算代价要小于已有方案,具有较高的效率。
关键词:文档工程 网络化文档组合 访问控制 基于属性加密 社区
III
ABSTRACT
The Internet makes it possible to easily combine new documents using information
from many disparate sources. As a result, these documents, which we call composite
documents, play an increasingly important role in service providing , resource sharing,
predictive parsing and information interaction. Some research results on the usage and
security management of proprietary composite documents have been proposed. However,
not only the theory and method of document composite is rarely covered, but also lack of
the research on data security and private preserve during composite process. Therefore,
it’s especially important to study the topics of this dissertation. In addition, the
applicability and practicalness are quite vital.
The dissertation mainly concerns with the model and method of networked
document composite, the security requirement analysis anf security management
mechanism for ubiquitous computing mode. Its major contributions are outlined as
follows:
1. The feasibility of document generation by compositing autonomously and
dynamically has been studied. We has proposed a conception named networked document
composite(abbreviated to NDC), a novel scaleable scheduling technology to enable
generating new document by composite components from web under collaboration and
interaction. The conception of networked document composite determines the tasks and
relations among NDC's paradigm, domain engineering and application engineering.
Further, we has proposed both a network access architecture of user and a scheme of
document compsite. In this scheme, when one user connects network brokers, a set of
agents of each broker execute document components searching and information
exchanging to form composite document driven by user composite requirement.
2. As a key technology for the quality control of cloud services, secure access to
composite document has been studied. We describe the “live” characteristics of structured
document and tenants’ diverse action patterns to access structured document in cloud
computing. And then, we systematically present the access control requirements for
structured document in cloud computing from the following aspects: action-based,
control tenants’ access actions, tenants’ privacy protection, fine-grained, multilevel
security, and self-adaptive policies. Finally, we present the Action-based Multilevel
Access Control model (ABMAC) framework to implement the access control
requirements. Meanwhile the privacy preserve issue has also been studied. We analyze
the suitability of attribe-based encryption and integrity verification, the necessity to
IV
distinguishing composite operation from synthetic attack and the maneuverability by
active deletion with copy retroaction at composite document expiration time for stored
composite documents.
3. When agents are organized as digital communties, both the trust level of agent and
the cooperation among agents inside and outside of community fields in digital
community have been studied. A novel community field-centric trust-based access
control model (referred to as the CTBAC) was developed. There are two novel ingredients.
First, A community field was established in terms of agent’s own contexts and trust
certificate. Thus, the trust level could be dynamically adjusted based on the sessions.
Secondly, the activation and use of access control permissions according to the match
relationship between the trust level of agents and trust threshold. We compare our
proposed CTBAC model to several access control models and its effectiveness in both
dynamic permission control and security protection is demonstrated.
4. Both the timed-released principle and the privacy leakage risk of electronic
documents stored in cloud servers have been studied. To overcome this problem, we
develop a novel two-step scheme for self-destructing electronic document by using
identity-based timed-release encryption(referred to as ITE). In the first step, we use
symmetric key to encrypt the electronic document. Thus, we can obtain an extracted
ciphertext and an encapsulated ciphertext by using an extraction algorithm. Secondly, we
use ITE algorithm to encrypts the symmetric key. On one hand, we get the ciphertext
shares and distribute it into the distributed Hash table (DHT) network by combining key’s
ciphertext and the extracted ciphertext. On the other hand, the encapsulated ciphertext is
stored in cloud servers after encapsulated into a self-destructing object. There are two
advantages for the proposed scheme. First, we can only access the protected electronic
document when the desired release time arrived . Second, the original decryption key
cannot be recovered after a certain period of time. The reason is that DHT network will
discard the stored ciphertext shares automatically, so the function of self-destruction is
implemented safely. Security analysis shows that our proposed ESITE scheme is able to
resist against cryptanalysis attacks from the cloud servers and the Sybil attacks from the
DHT network. Experimental results demonstrate that the computational overheads of the
proposed scheme is much lower than existing schemes.
Keywords: Document engineering Networked document composite Access
control Attribute-based encryption Community
剩余101页未读,继续阅读
资源评论
programxh
- 粉丝: 17
- 资源: 1万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功