首页> 外文学位 >Secure query processing in untrusted cloud environments.
【24h】

Secure query processing in untrusted cloud environments.

机译:在不受信任的云环境中进行安全的查询处理。

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to find the adversary and get a correct result by removing the adversary.;To address these challenges, we propose several schemes. First, with respect to secure kNN query processing and secure proximity detection, we give novel schemes based on Mutable Order Preserving Encryption (MOPE) and Secure Point Evaluation Method (SPEM). Second, for authenticated top-k aggregation, we suggest novel schemes using Three Phase Uniform Threshold Algorithm, Merkle Hash Tree, and Condensed-RSA. Third, for detecting malicious nodes, we propose novel algorithms based on Additively Homomorphic Encryption and Multipath Transmission. Our experimental evaluation and security analyses demonstrate that robust mechanisms can be deployed with a minimal amount of computational and communicational expense.
机译:如今,数据已存储到云环境中的第三方,并且第三方也进行了查询处理,以减少维护系统的费用。尽管在查询处理中使用独立的第三方有很多优势,但是由于我们不能完全信任容易损坏或发生故障的第三方,因此安全问题变得更加关键。不受信任的第三方的安全问题在隐私,身份验证和恢复等多个领域中都是多方面的。为了保护隐私,第三方不应该知道用户的查询,因为查询本身描述了用户的兴趣。对于身份验证,用户应该能够验证来自第三方的信息是否被篡改,因为查询结果的正确性取决于来自第三方的信息的正确性。为了恢复,当发现对手伪造了结果时,我们应该能够找到对手并通过删除对手来获得正确的结果。为了解决这些挑战,我们提出了几种方案。首先,关于安全kNN查询处理和安全邻近检测,我们给出了基于可变序数保存加密(MOPE)和安全点评估方法(SPEM)的新颖方案。其次,对于经过身份验证的top-k聚合,我们建议使用三相统一阈值算法,Merkle哈希树和Condensed-RSA的新颖方案。第三,为检测恶意节点,我们提出了基于可加同态加密和多径传输的新颖算法。我们的实验评估和安全性分析表明,可以以最少的计算和通信费用部署可靠的机制。

著录项

  • 作者

    Choi, Sunoh.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Engineering Computer.;Computer Science.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 166 p.
  • 总页数 166
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号