請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74429
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 郭斯彥 | |
dc.contributor.author | I-Chen Tsai | en |
dc.contributor.author | 蔡宜蓁 | zh_TW |
dc.date.accessioned | 2021-06-17T08:35:19Z | - |
dc.date.available | 2019-08-19 | |
dc.date.copyright | 2019-08-19 | |
dc.date.issued | 2019 | |
dc.date.submitted | 2019-08-10 | |
dc.identifier.citation | [1] R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, ”CryptDB: Protecting confidentiality with encrypted query processing,” in 23rd ACM Symposium on Operating Systems Principles, pp. 85-100, 2011.
[2] J. Li, Z. Liu and X. Chen, ”L-EncDB: A lightweight framework for privacypreserving data queries in cloud computing,” in Knowledge-based Systems, vol. 79, pp.18-26, 2015. [3] H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, and W. Hu, ”Talos: Encrypted query processing for the internet of things,” in ACM Conference on Embedded Networked Sensor Systems (SenSys), pp. 197–210, 2015. [4] Y. Tang, T. Wang, L. Liu, X. Hu, and J. Jang, ”Lightweight authentication of freshness in outsourced key-value stores,” in Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC), pp. 176–185, 2014. [5] K. Chen, R. Kavuluru, and S. Guo. ”Rasp: Efficient multidimensional range query on attack-resilient encrypted databases,” in ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 249–260, 2011. [6] E. Shi, J. Bethencourt, T. Chan, D. Song, and A. Perrig, ”Multi-dimensional range query over encrypted data,” in IEEE Symposium on Security and Privacy, pp 350–364, 2007. [7] Y. Zhang, J. Katz, and C. Papamanthou, ”IntegriDB: Verifiable SQL for outsourced databases,” in Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), pp. 1480–1491, 2015. [8] Q. Chen, H. Hu, and J. Xu, ”Authenticating top-k queries in locationbased services with confidentiality,” in Proceedings of the VLDB Endowment, Vol. 7, No. 1, pp. 49–60, 2014. [9] H. Zhu, X. Meng and G. Kollios, ”Top-k query processing on encrypted databases with strong security guarantees,” in IEEE International Conference on Data Engineering (ICDE), 2018. [10] R. Zhang, J. Sun, Y. Zhang, and C. Zhang, ”Secure spatial top-k query processing via untrusted location-based service providers,” in IEEE Trans. Dependable and Secure Computing, vol.12, no.1, pp. 111–124, 2015. [11] J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, ”Toward secure multikeyword top-k retrieval over encrypted cloud data,” in IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239–250, 2013. [12] D. Schröder and H. Schröder, ”Verifiable data streaming,” in ACM Conference on Computer and Communications Security (CCS), 2012. [13] J. Krupp, D. Schröder, M. Simkin, D. Fiore, G. Ateniese, and S. Nuernberger, ”Nearly optimal verifiable data streaming,” in International Conference on Public-Key Cryptography (PKC), 2016. [14] C. Papamanthou, E. Shi, R. Tamassia, and K. Yi, ”Streaming authenticated data structures,” in International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013. [15] C.-Y. Chen, H.-M. Wu, L. Wang and C.-M. Yu, ”Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems,” in Computer Networks, vol. 129, no. 24, pp. 472-480, 2017. [16] R. Li, A. X. Liu, A. L. Wang and B. Bruhadeshwar, ”Fast range query processing with strong privacy protection for cloud computing,” in International Conference on Very Large Data Bases (VLDB), 2014. [17] R. A. Popa, F. H. Li, and N. Zeldovich, ”An ideal-security protocol for orderpreserving encoding,” in Proceedings of the 34th IEEE Symposium on Security and Privacy, pp. 463-477, 2013. [18] Y.-T. Tsou, Y.-L. Hu, Y. Huang, and S.-Y. Kuo, ”SFTopk: Secure functional top-k query via untrusted data storage,” in IEEE Access, vol. 3, pp. 2875-2890, 2015. [19] B. Sheng and Q. Li, ”Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks,” in Proceedings of IEEE INFOCOM, pp. 46-50, 2008. [20] B. Wang, Y. Hou, M. Li, and H. Li, ”Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index,” in Proceedings of ACM ASIACCS, pp. 111-122, 2014. [21] J. Li, A. C. Squicciarini, D. Lin, S. Sundareswaran, and C. Jia, ”MMBcloud-tree: Authenticated index for verifiable cloud service selection,” in Proceedings of IEEE INFOCOM, vol. 14, no. 2, pp. 185-198, 2017. [22] W. Sun, X. Liu, W. Lou, Y. Thomas and H. Li, ”Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data,” in Proceedings of IEEE INFOCOM, pp. 2110-2118, 2015. [23] R. Zhang, J. Shi, Y. Liu, and Y. Zhang, ”Verifiable fine-grained topk queries in tiered sensor networks,” in Proceedings of IEEE INFOCOM, pp. 1-9, 2010. [24] Q. Zheng, S. Xu, and G. Ateniese, ”VABKS: Verifiable attributebased keyword search over outsourced encrypted data,” Proceedings of IEEE INFOCOM, pp. 522-530, 2014. [25] F. Chen and A.-X. Liu, ”Privacy and integrity-preserving range queries in sensor networks,” in IEEE/ACM Transactions on Networking (TON), vol. 20, pp. 1774-1787, 2012. [26] Eujin-Goh, ”Secure indexes,” Stanford University Technical Report, 2004. [27] G. Becker, ”Merkle signature schemes, Merkle trees and their cryptanalysis,” 2008. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74429 | - |
dc.description.abstract | 隨著物聯網技術日趨的發達,物聯網裝置已與我們的生活密不可分。由於這些裝置常被用來處理一些比較敏感的資料,像是個人的醫療數據或是公司的機密檔案,這些資訊都是需要防止惡意的第三方加以利用及取得,所以對於物聯網裝置的安全議題是急需被重視的。其中,物聯網裝置通常是資源缺乏的,可能是計算能力不足或是儲存空間太小,因此會需要將接收到的資料外包到雲端的儲存空間。然而,我們必須視雲端的角色為不可完全信任的一方(honest-but-curious),也就是雲端可能會透過一些分析及比對來猜測實際資料的內容或是當使用者對這些資料做查詢(query)時,回傳錯誤的答案。在此情境的假設下,我們需要解決的問題是如何提供一個資料串流環境下安全且可驗證的查詢方法給雲端。在這篇論文中,我們提出了兩個資料結構,HPBTree 和MIXTree,分別用來解決安全保護下的range query 以及top-k query 問題。另外,也提供使用者對於查詢結果的正確性做驗證的方法。有了這個機制,雲端能對這些資料做常見的SQL 查詢來提供物聯網裝置更完整的功能,同時使用者的資料也能被保護。我們更提供方法的安全性證明以及實做的分析結果來顯示方法的可行性。 | zh_TW |
dc.description.abstract | As IoT devices are becoming part of our everyday life and some of these devices have access to sensitive data that we don’t want any malicious party to make use of, we should pay more attention on their security issues. Since IoT devices are often resource-constrained, data need to be outsourced to cloud storages. However, cloud storages are consider honest-but-curious, which means they may try to know what the data is about or return a falsified answer when the client requests a query operation. Under this scenario, we try to solve the problem of performing verifiable privacy-preserving queries under streaming settings. In this thesis, we proposed two data structures, HPBTree (for range query) and MIXBtree (for top-k query) to solve the problem. With these data structures, cloud storage providers can perform secure range or top-k query. Moreover, user can verify the correctness of the query results and check the freshness of his outsourced data. In this way, cloud storage providers can contribute more functionalities based on the most used SQL queries and user can make sure their data is under protected at the same time. We evaluate our proposed methods and demonstrate that our construction is efficient and practical. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T08:35:19Z (GMT). No. of bitstreams: 1 ntu-108-R06921044-1.pdf: 1579714 bytes, checksum: 52bb1a31d06db9149a96ab97148d081c (MD5) Previous issue date: 2019 | en |
dc.description.tableofcontents | 誌謝 i
摘要 ii Abstract iii 1 Introduction 5 2 Related Works 7 2.1 Verification on Outsourced Data Stream 7 2.2 Privacy-preserving Range/Top-k query 9 3 Preliminaries 11 3.1 Merkle Tree 11 3.2 PBTree 13 3.3 mOPE 14 4 Verifiable Range Query: HPBTree 16 4.1 Data Preprocessing 16 4.2 Query Preprocessing and Query-Result Verification 17 5 Privacy-preserving Top-k Query: MIXBTree 20 5.1 Basic Idea 20 5.2 Data Preprocessing 21 5.3 MIXBTree 22 6 Security Analysis 24 6.1 Threat model 24 6.2 Security proof for HPBTree 24 6.3 Security proof for MIXBTree 25 6.4 Proof for Merkle hash security 26 7 Evaluation 27 7.1 Evaluation on HPBTree 27 7.2 Evaluation on MIXBTree 31 8 Conclusion 34 Bibliography 35 | |
dc.language.iso | en | |
dc.title | 物聯網雲端資料串流環境下安全且可驗證的查詢方法 | zh_TW |
dc.title | Verifiable and Privacy-preserving Query in IoT-Cloud Data
Streaming | en |
dc.type | Thesis | |
dc.date.schoolyear | 107-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 雷欽隆,顏嗣鈞,陳英一,陳俊良 | |
dc.subject.keyword | 安全性查詢,範圍查詢,top-k 查詢,物聯網,驗證,資料串流,雲端, | zh_TW |
dc.subject.keyword | privacy-preserving query,range query,top-k query,IoT,verification,data streaming,cloud storage, | en |
dc.relation.page | 38 | |
dc.identifier.doi | 10.6342/NTU201902886 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2019-08-12 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-108-1.pdf 目前未授權公開取用 | 1.54 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。