期刊文献+

基于线性隐藏的租户副本混淆模型

Tenant duplicates data obfuscation model by line hidden
下载PDF
导出
摘要 在软件即服务模式下,针对租户定制的副本数据在明文存储情况下容易被服务提供商合谋欺诈问题,提出基于线性隐藏的数据混淆模型,通过混淆使得存储相同数据的租户副本具有不同的数据内容表现,防止服务提供商为节省存储空间,整个删除租户不常用数据副本,欺骗租户。使用蒙特卡罗随机单调函数对混淆模型进行拓展,制定关键字查询保序策略,可以在混淆后的租户副本数据上进行查询操作。实验结果表明,扩展的混淆模型在保序关键字上的查询性能接近明文查询。 In Software as a Service(SaaS),tenants can customize multiple duplicates and pay for use.However,plaintext data duplicates are vulnerable to the conspired attacks of malicious service provider.It is important to adopt the confusion strategy to enhance duplicates storage security.This paper introduces the Tenant Duplicates Data Obfuscation model(TDDO)based on linear hidden to resist the conspired attack of service provider.TDDO can make duplicates different with each other to prevent untrusted service provider deleting the whole copy of tenant data.Based on Monte Carlo random monotone function,an extended TDDO model with query keyword ordering strategy is promoted to improve the query efficiency of obfuscation duplicates.Experimental results show that the extended TDDO model has better query performance.
作者 李琳 丁艳辉 张永新 赵晓晖 LI Lin;DING Yanhui;ZHANG Yongxin;ZHAO Xiaohui(School of Mathematics and Statistics,Shandong Normal University,Jinan 250358,China;School of Information Science and Engineering,Shandong Normal University,Jinan 250358,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第22期10-15,共6页 Computer Engineering and Applications
基金 山东省重点研发计划(No.2017GGX10112) 山东省高等学校科技计划(No.J15LN24)
关键词 软件即服务(SaaS) 多租户 数据副本 数据混淆 线性隐藏 Software as a Service(SaaS) multi-tenants data duplicates data obfuscation line hidden
  • 相关文献

参考文献4

二级参考文献57

  • 1Hakan Hacigumtis, Bala Iyer, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model [C] //Proc of ACM SIGMOD 2001. New York, ACM, 2001:223-234.
  • 2Agrawal R, Kierman J, Srikant R, et al. Order preserving encryption for numeric data [C] //Proc of ACM SIGMOND 2004. New York: ACM, 2004:563-574.
  • 3Bellare M, Garay J, Rabin T. Fast batch verification for modular exponentiation and digital signatures [G] //LNCS 1043: Advances in Gryptology Eurocrypt'98. Berlin: Springer, 1998.
  • 4Merkle R. A certified digital signature [G] //LNCS 435: Advance in Cryptology-Crypto'89. Berlin: Springer, 1990: 218- 238.
  • 5Devanbu P, Gertz M, Martel C, et al. Authentic data publication over the Internet [J]. Journal of Computer Security, 2003, 11 (3) :291-314.
  • 6Pang H, Tan K L. Authenticating query results in edge computing [C] //Proc of ICDE 2004. Washington: IEEE Computer Society, 2004:560-571.
  • 7Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2): 107-138.
  • 8Xie Min, Wang Haixun, Yin Jian, et al. Integrity auditing of outsourced data[C] //Proc of VLDB 2007. New York: ACM, 2007:782-793.
  • 9Narasimha M, Tsudik G. DSAC: Integrity of outsourced databases with signature aggregation and chaining [C]//Proc of the ACM Conf on Information and Knowledge Management. New York: ACM, 2005:235-236.
  • 10Pang Hweehwa, Tan Kian-Lee. Verifying completeness of relational query answers from online servers [J]. ACM Trans on Information and System Security, 2008, 11(2) : 1-50.

共引文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部