- 无标题文档
查看论文信息

中文题名:

 云名片安全共享系统访问控制与云端存储功能实现    

姓名:

 唐秋楠    

学科名称:

 信息安全    

学生类型:

 学士    

学位名称:

 工学学士    

学校:

 中国人民大学    

院系:

 信息学院    

专业:

 信息安全    

第一导师姓名:

 秦波    

完成日期:

 2016-05-20    

提交日期:

 2016-05-20    

中文关键词:

 云存储电子名片访问控制CP-ABE    

中文摘要:
& ltp& gt近年来人们日常生活中使用的通讯方式随着网络技术的发展和各类社交平台的兴起逐渐趋于多元化。在提高了用户通讯和生活质量的同时,通讯方式的复杂化也带来了诸多的安全问题。市面上出现过一些将各平台通讯录信息整合到一起形成电子名片的应用,但这些应用依然存在着诸多缺点:一方面在将通讯信息存储到本地的情况下,一旦本地文件损坏或手机遗失,信息的寻回将是一个巨大的难题;另一方面由于平台的多元化和社交方式的多样化,名片交换过程中应设置分级,对用户的敏感资料进行合理的保护,消除安全隐患。因此,需要一种电子名片的管理共享系统,来对用户的通讯信息整合、备份并实现合理有效共享。& lt/p& gt & ltp& gt    本文主要介绍了一种云名片安全共享系统中的云端存储功能和访问控制功能的实现,通过Hadoop和基于属性加密技术结合在云端备份用户名片信息并安全共享的同时,实现细粒度的访问控制,为用户提供便捷安全可靠的使用体验。实现的主要功能有:信息丢失,资料可以寻回;设置级别定向交友;对于可见资料进行分类,联系人查看资料权限分级。作为原型与示范,在安卓手机和Ubuntu虚拟机上进行了功能实现,本文设计的方案具备安全、智能、便捷等特点,易于推广。& lt/p& gt & ltp& gt & lt/p& gt & ltp& gt关键词:云存储电子名片访问控制CP-ABE& lt/p& gt
外文摘要:
& ltp& gtIn recent years, with the development of Internet technology and the rise of various social networking platforms, the means of daily communication become more and more diversified. Though these diversified communication means have improved the quality of communication and life, they have caused some security problems at the same time. Nowadays, some apps can consolidate address books of different platforms into e-card, but these apps are coming with shortcomings: on the one hand, if we saved the communication information in cellphone, once the local files were corrupted or the phone was lost, it would be too difficult to find the phone. On the other hand, because of the diversification of communication means and social networking platforms, the interchange mode of e-card should not be limited to scanning face to face. Online interchange mode should be taken into consideration. What&rsquos more, the interchange process of e-card should be ranked and we should protect the sensitive data of users and try to eliminate the security risks.& lt/p& gt & ltp& gtThus, it is quite necessary to design a management and sharing system of e-card so that we can consolidate, back up and share the communication information effectively.& lt/p& gt & ltp& gtWe designed a safe cloud management and sharing system of e-card for fine-grained access control in order to make the user experience safer and more reliable. The data will be backed up in the cloud and be shared safely. The main function includes that: the e-card can be found though the phone lost the data are accurate and comprehensive while the system is concise and clear direct pal. From the perspective of safety management, the system can help sort out the visible data and grading the authority of viewing the contact information. As a sample, the functions of this system were implemented in the Android mobile phone. In a word, this system is safe, intelligent and convenient and it is easy to be replicated.& lt/p& gt & ltp& gtKey Words:cloudstorage e-cardaccess controlCP-ABE& lt/p& gt
总页码:

 29    

参考文献:

[1] 董新华,李瑞轩,周湾湾,王聪,薛正元,廖东杰. Hadoop系统性能优化与功能增强综述[J]. 计算机研究与发展,2013,v.50S2:1-15.

[2] 朱珠. 基于Hadoop的海量数据处理模型研究和应用[D].北京邮电大学,2008.

[3] 郝树魁. Hadoop HDFS和MapReduce架构浅析[J]. 邮电设计技术,2012,No.43707:37-42.

[4] 郭振洲. 基于属性的加密方案的研究[D].大连理工大学,2012.

[5] Shvachko K, Kuang H, Radia S, et al. The hadoop distributed file system[C]//Mass Storage Systems and Technologies & #40MSST), 2010 IEEE 26th Symposium on. IEEE, 2010: 1-10.

[6] 单忆南. 基于属性的加密算法[D].上海交通大学,2010.

[7]郭利君. 基于属性加密的云计算安全研究[D].西安电子科技大学,2014.

[8] White T. Hadoop: The definitive guide[M]. " O& #39Reilly Media, Inc.", 2012.

[9] Shamir A. How to share a secret[J]. Communications of the ACM. ACM, 1979, 22& #4011) : 612-613.

[10] Sahai A, Waters B. Fuzzy identity based encryption[C]. Advances in Cryptology& #40EUROCRYPT 2005). Lecture Notes in Computer Science& #403494), Berlin: Springer-Verlag, 2005: 457-473.

[11] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]//Security and Privacy, 2007. SP& #3907. IEEE Symposium on. IEEE, 2007: 321-334.

[12] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM conference on Computer and communications security. Acm, 2006: 89-98.

[13] Sahai A, Waters B. Fuzzy identity-based encryption[M]//Advances in Cryptology–EUROCRYPT 2005. Springer Berlin Heidelberg, 2005: 457-473.

[14] Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures[C]//Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007: 195-203.

[15] Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[M]//Public Key Cryptography–PKC 2011. Springer Berlin Heidelberg, 2011: 53-70.

[16] Cheung L, Newport C. Provably secure ciphertext policy ABE[C]//Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007: 456-465.

[17] Yu S, Wang C, Ren K, et al. Attribute based data sharing with attribute revocation[C]//Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010: 261-270.

[18] Lewko A, Waters B. Decentralizing attribute-based encryption[M]//Advances in Cryptology–EUROCRYPT 2011. Springer Berlin Heidelberg, 2011: 568-588.

[19] Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing[C]//Infocom, 2010 proceedings IEEE. Ieee, 2010: 1-9.

[20] Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Advances in Cryptology—CRYPTO 2001. Springer Berlin Heidelberg, 2001: 213-229.

[21] Borthakur D. The hadoop distributed file system: Architecture and design[J]. Hadoop Project Website, 2007, 11& #402007): 21.

[22] Tang Z, Zhou J, Li K, et al. A MapReduce task scheduling algorithm for deadline constraints[J]. Cluster computing, 2013, 16& #404): 651-662.

[23] Cheng P, An J. The key as dictionary compression method of inverted index table under the Hbase database[J]. Journal of Software, 2013, 8& #405): 1086-1093.

[24] Xu Z, Yan B, Zou Y. Beyond Hadoop: Recent Directions in Data[J]. Cloud Computing Advancements in Design, Implementation, and Technologies, 2012: 49.

[25] 陈吉荣, 乐嘉锦. 基于 Hadoop 生态系统的大数据解决方案综述[J]. 计算机工程与科学, 2013, 35& #4010): 25-35.

[26] 孟小峰, 慈祥. 大数据管理: 概念, 技术与挑战[J]. 计算机研究与发展, 2013, 50& #401): 146-169.

[27] 王珊, 王会举, 覃雄派, 等. 架构大数据: 挑战, 现状与展望[J]. 计算机学报, 2011, 34& #4010): 1741-1752.

[28] 张春明, 芮建武, 何婷婷. 一种 Hadoop 小文件存储和读取的方法[J]. 计算机应用与软件, 2012, 29& #4011): 95-100.

[29] 赵跃龙 谢晓玲 蔡咏才 王国华 刘 霖. 一种性能优化的小文件存储访问策略的研究[J]. 计算机研究与发展, 2012, 49& #407): 1579-1586.

[30] Verma A, Cho B, Zea N, et al. Breaking the MapReduce stage barrier[J]. Cluster computing, 2013, 16& #401): 191-206.

[31] Satzger B, Hummer W, Leitner P, et al. Esc: Towards an elastic stream computing platform for the cloud[C]//Cloud Computing & #40CLOUD), 2011 IEEE International Conference on. IEEE, 2011: 348-355.

[32] Ko S Y, Hoque I, Cho B, et al. On Availability of Intermediate Data in Cloud Computations[C]//HotOS. 2009.

[33] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22& #401).

[34] Kamara S, Lauter K. Cryptographic cloud storage[M]//Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010: 136-149.

[35] Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[M]//Advances in Cryptology–EUROCRYPT 2008. Springer Berlin Heidelberg, 2008: 146-162.

[36] Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products[M]//Advances in Cryptology–EUROCRYPT 2008. Springer Berlin Heidelberg, 2008: 146-162.

开放日期:

 2016-05-20    

无标题文档

   建议浏览器: 谷歌 火狐 360请用极速模式,双核浏览器请用极速模式