基于匿名完美门限方案的网络数据安全传储方法
基于匿名完美门限方案的网络数据安全传储方法(任务书,开题报告,论文14000字)
摘 要
近年来,在数据通信技术不断创新进步的情形下,越来越多的信息甚至隐私信息和机密信息都愈加频繁的在网络上进行传输和存储。一旦数据被泄漏或者截获,将给人们带来巨大的威胁。本文基于秘密分割的思想提出了保证数据安全传输和存储的方案。本方案使用可划分的Steiner系构造的匿名完美门限方案,对数据按照一定规则进行了分割,得到若干数据碎片。在数据重组时,不需要收到所有的数据碎片,只要收到多于门限值个数的数据碎片,就能恢复原数据。这种方案不仅能够很好地保护数据的安全性和可用性,而且数据分割和重组的时间复杂度较低,能很好的应用于数据安全传输和存储。对于数据传输,就算部分数据碎片在传输过程中受到非法攻击者攻击而导致了破坏或者缺失,只要数据接收方能收到多于门限值的正确数据碎片,便仍然能够恢复原始数据。对于数据存储,将原始数据分割成多个数据碎片并分开存储后,就算发生数据因操作失误或者系统故障而导致损坏时,只要还有多于门限值数据碎片还正确的存在着,就能根据这些数据碎片恢复出原数据并复原缺失的数据碎片。分析结果表明,本文提出的方案能够在数据缺损或被篡改的情况下,确保数据的机密性和完整性,并且数据分割和恢复操作的时间复杂度较低,是一种安全高效的数据传储方法。 [资料来源:http://www.doc163.com]
关键词:数据传储;秘密分割;网络安全;可划分Steiner系;完美匿名门限方案
Abstract
In recent years, with the continuous innovation and progress of information communication technology, more and more information, even private information and confidential informationare being transmitted and stored on the network more frequently.Once the data is leaked or intercepted, it will pose a great threat to people.Based on the idea of secret segmentation, this paper puts forward a scheme to ensure the safe transmission and storage of data.This scheme uses an anonymous perfect threshold scheme constructed by a separable Steiner system. This scheme uses the perfect anonymous secret scheme to segment the data with certain rules into a number of data fragments.In data reorganization, you do not need to receive all the data fragments, as long as you receive more than the threshold number of data fragments, you can recover the original data.This approach is well suited for secure data transmission and storage.For data transmission, even if some pieces of data are attacked by illegal attacker during transmission and led to the destruction or loss, as long as the recipients can receive more than the threshold value of correct data fragments, then recipients still be able to restore the original data.For data storage, after spliting the raw data into multiple pieces of data and storing separately, even if the data is damaged by the error or system failure, as long as there isfragments more than the threshold data, managers can restore the original data andrecover the missing pieces.The research results show that the scheme proposed in this paper can ensure the confidentiality and integrity of data in the case of data defect or tampering, which is an effective method of data security transmission and storage.
[资料来源:http://www.doc163.com]
Key Words:Data transmission and storage;Secret sharing;Network security;Resolvable Steiner system;Perfect anonymous threshold scheme.
目录
第1章绪论 1
1.1 数据安全传储的研究背景 1
1.2 数据安全传储的研究目的与意义 2
1.3 国内外研究现状 2
第2章 数据安全传储算法基础 7
2.1 秘密分割介绍 7
2.2 区组设计介绍 8
2.3 匿名完美门限方案 9
第3章基于匿名完美门限方案的数据传储算法设计 11
3.1 数据处理 11
3.1.1 数据填充 11
3.1.2 数据恢复 13
3.2 数据安全传储方案设计 14
3.2.1 数据分割 14
3.2.2 数据重组 16
3.2.3 数据安全存储上的应用 17
3.2.4 安全性分析 17 [版权所有:http://DOC163.com]
第4章数据传储算法的测试与分析 18
4.1 基于数据分割的数据安全传储方案 18
4.1.1 加密过程 18
4.1.2 解密过程 18
4.2 比较结果讨论 19
第5章总结与展望 20
5.1 总结 21
5.2 展望 21
参考文献 23
致谢 24 [来源:http://Doc163.com]