請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/4441
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 鄭卜壬 | |
dc.contributor.author | Chia-Yi Ku | en |
dc.contributor.author | 古佳怡 | zh_TW |
dc.date.accessioned | 2021-05-14T17:42:16Z | - |
dc.date.available | 2020-08-25 | |
dc.date.available | 2021-05-14T17:42:16Z | - |
dc.date.copyright | 2015-08-25 | |
dc.date.issued | 2015 | |
dc.date.submitted | 2015-08-18 | |
dc.identifier.citation | [1] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, 'Privacy-preserving multi-keyword ranked search over encrypted cloud data,' in IEEE Transactions. Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, Jan. 2014.
[2] D. Chaum, 'Untraceable electronic mail, return addresses, and digital pseudonyms,' in Communications of the ACM, vol. 4, no. 2, pp. 84-90, Feb. 1981. [3] G. O’Gorman, S. Blott, 'Improving stream correlation attacks on anonymous networks,' in Proceedings of the 2009 ACM symposium on Applied Computing, pp. 2024-2028, Mar. 2009. [4] F. Wu, J. Xu, H. Li, and X. Jiang, 'Ranking optimization with constraints,' in Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pp. 1049-1058, Nov. 2014. [5] O. Goldreich, R. Ostrovsky, 'Software protection and simulation on oblivious RAMs,' in Journal of the ACM, vol. 43, no. 3, pp. 431-473, May 1996. [6] X. Ding, Y. Yang, and R. Deng, 'Database access pattern protection without full-shuffles,' in IEEE Transactions. Information Forensics and Security, vol. 6, no. 1, pp. 189-201, Mar. 2011. [7] K. Yang, J. Zhang, W. Zhang, and D. Qiao, 'A light-weight solution to preservation of access pattern privacy in un-trusted clouds,' in Proceedings of the 16th European conference on Research in computer security, pp. 528-547, 2011. [8] P. Williams, R. Sion, and B. Carbunar, 'Building castles out of mud: practical access pattern privacy and correctness on untrusted storage,' in Proceedings of the 15th ACM conference on Computer and communications security, pp. 139-148, Oct. 2008. [9] E. Stefanov, E. Shi, 'Oblivistore: High performance oblivious cloud storage,' in Security and Privacy, 2013 IEEE Symposium on, pp. 253-267, May 2013. [10] E. Yilmaz, J. A. Aslam, and S. Robertson, 'A new rank correlation coefficient for information retrieval,' in Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, pp. 587-594, July 2008. [11] D. Lillis, F. Toolan, R. Collier, and J. Dunnion, 'Probfuse: a probabilistic approach to data fusion,' in Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 139-146, Aug. 2006. [12] M. Shokouhi, 'Segmentation of search engine results for effective data-fusion,' in Proceedings of the 29th European conference on IR research, pp. 185-197, 2007. [13] D. Lillis, F. Toolan, R. Collier, and J. Dunnion, 'Extending probabilistic data fusion using sliding windows,' in Proceedings of the 29th European conference on IR research, pp. 358-369, 2007. [14] S. Wu and F. Crestani. 'Methods for ranking information retrieval systems without relevance judgments,' in Proceedings of the 2003 ACM symposium on Applied computing, pp. 811-816, Mar. 2003. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/4441 | - |
dc.description.abstract | 隨著雲端儲存服務的普及,越來越多使用者選擇將資料儲存於雲端服務平台上(如:Dropbox、Google Drive、Apple iCloud Drive等),以方便後續管理與使用。然而,對於一些較隱私的資料,使用者儘管仍欲使用服務供應商所提供的儲存與管理服務,但因擔心可能遭受他人窺視、攻擊以及資料外洩的風險,而往往會傾向不將該類資料放於雲端平台上。因此,為提供使用者一個更好且安心的使用環境,許多雲端服務所需具備的隱私要求(privacy requirements)與相關加密與搜尋技術相繼被提出。其中一部分為有關搜尋模式(search pattern)的隱藏,即當使用者下達一組關鍵字查詢(query)後,對於最終回傳的排名結果(ranked list)應做適度隱藏。以避免雖已對查詢所下達的關鍵字做隱藏的動作,但因回傳的排名結果間的相似,而致第三方推測出兩筆查詢間有所關聯。並減少因洩漏使用者的行為模式或較常存取哪些特定文件等資訊,以使第三方有機會對此作特定攻擊。
然而對於搜尋模式的隱藏,在現有辦法中皆存在著一些問題,如未考慮排名結果間次序性的重要度,搜尋模式隱藏時未對排名結果的效能做維持,或者耗費過多時間做隱藏等。為此,我們基於文件與查詢字眼間所計算出的相關分數(relevance score),提出同儕的概念。在維持排名結果品質的情況下,讓同一組的關鍵字查詢盡可能產生不同回傳結果,以隱藏使用者的搜尋行為。 | zh_TW |
dc.description.abstract | Since cloud service are wide-spread used nowadays, more and more users store their data on cloud storage (e.g., Dropbox, Google Drive, Apple iCloud Drive, etc.) for management. However, because of the risks of information leakage, user might tend not to store sensitive personal data in cloud. Thus some privacy requirements and corresponding technologies are being proposed. One of the requirements is search pattern privacy (i.e., hiding the query search’s result). To avoid a third party infer query correlation from result correlation (i.e., similar query results might come from similar queries). And preventing focused attack because of private interest leakage.
Unfortunately, existing search pattern hiding techniques have some shortcomings. For example, the method does not consider rank order, do not maintain ranking performance, or is inefficient. Thus, based on the relevance score between document and query keyword, we propose the concept of peer. Not only to generate as different result as possible by the same query, but also maintain ranking performance. That means achieve search pattern privacy. | en |
dc.description.provenance | Made available in DSpace on 2021-05-14T17:42:16Z (GMT). No. of bitstreams: 1 ntu-104-R02922008-1.pdf: 1893464 bytes, checksum: 730f845fd2b5ca25531728920f28004c (MD5) Previous issue date: 2015 | en |
dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii 中文摘要 iii ABSTRACT iv 目錄 v 圖目錄 vii 表目錄 viii 第一章 緒論……………………………………………………………………… 1 1.1 研究動機……………………………………………………………… 1 1.2 研究目的……………………………………………………………… 2 1.3 內容架構……………………………………………………………… 2 第二章 相關研究與文獻………………………………………………… 3 2.1 串流關聯度隱藏………………………………………………… 3 2.2 有條件限制的排名優化…………………………………… 3 2.3 增加無意義關鍵字的排名隱藏……………………… 3 2.4 Oblivious RAM…………………………………………… 4 第三章 研究方法………………………………………………………… 5 3.1 系統架構…………………………………………………………… 5 3.2 基本概念…………………………………………………………… 7 3.3 同儕切割…………………………………………………………… 9 3.4 基於同儕的交換方法……………………………………… 12 3.4.1 產生候選人………………………………………………………… 13 3.4.2 挑選適當者………………………………………………………… 18 3.5 使用者回饋機制………………………………………………… 20 第四章 實驗……………………………………………………………………… 23 4.1 實驗資料……………………………………………………………… 23 4.2 Baseline………………………………………………………… 23 4.3 評估方法……………………………………………………………… 23 4.4 實驗結果……………………………………………………………… 24 4.4.1 實驗一:與Baseline的比較………………………… 25 4.4.2 實驗二:第一個交換物件的策略比較…………… 27 4.4.3 實驗三:第二個交換物件的策略比較…………… 29 4.4.4 實驗四:搜尋結果間的關聯度變化………………… 31 4.4.5 實驗五:加入使用者回饋機制………………………… 33 第五章 結論與未來研究方向…………………………………………… 35 參考文獻………………………………………………………………………… 36 | |
dc.language.iso | zh-TW | |
dc.title | 基於安全性的排名優化 | zh_TW |
dc.title | Ranking Optimization with Security Awareness | en |
dc.type | Thesis | |
dc.date.schoolyear | 103-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 曾新穆,蔡銘峰,張嘉惠,陳信希 | |
dc.subject.keyword | 安全性,隱藏搜尋模式,排名效能,排名關聯度,基於同儕, | zh_TW |
dc.subject.keyword | security,search pattern privacy,ranking performance,rank correlation,peer-based, | en |
dc.relation.page | 37 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2015-08-18 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-104-1.pdf | 1.85 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。