首页--工业技术论文--无线电电子学、电信技术论文--无线通信论文--移动通信论文

物联网环境分布式数据加密存储和访问控制技术研究

摘要第4-5页
ABSTARCT第5-6页
Chapter 1 Preface第10-17页
    1.1 Research background第10-14页
    1.2 Security requirements for the mass storage system第14-15页
    1.3 The main work for this paper第15-16页
    1.4 Article Contents第16-17页
Chapter 2 Security architecture of Internet of Things第17-31页
    2.1 Network model第17-19页
    2.2 Secu rity Threats for Internet of things第19-21页
    2.3 IoT Security structure第21-25页
        2.3.1 Sensor layer security architecture第22-23页
        2.3.2 Network layer security architecture第23-24页
        2.3.3 Co-processing layer security architecture第24页
        2.3.4 Application layer security architecture第24-25页
        2.3.5 Control systems security architecture第25页
    2.4 Security requirements第25-28页
        2.4.1 Terminal nodes security requirements第27页
        2.4.2 Sensor layer security requirement第27页
        2.4.3 Network layer security requirement第27-28页
        2.4.4 Application layer security requirement第28页
        2.4.5 Control management security requirement第28页
    2.5 Research status第28-31页
Chapter 3 Attribute-based encryption第31-45页
    3.1 Overview of att ribute-based encryption第31页
    3.2 Cipher text password policy mechanisms(Ciphertext-ABE)第31-32页
        3.2.1 CP-ABE basic principles and functions第32页
    3.3 Fundamental problems第32-33页
        3.3.1 Attribute-based encryption system第32-33页
        3.3.2 Bilinear Diffie-Hellman(BDH)第33页
        3.3.3 Access Strudcture第33页
    3.4 Implementation model第33-34页
        3.4.1 Expressed access structure tree第33-34页
        3.4.2 To meet the access tree structure第34页
    3.5 Construction strategies based on the properties of the ciphertext encrypted system第34-37页
    3.6 Attribute-based encryption mechanism's application on Internet of things第37-38页
    3.7 Simulation methods of attr.bute encryption based on Internet of things第38-45页
        3.7.1 The baslc principle of simulation第41页
        3.7.2 Simulation parameter settings for internet of things network第41-42页
        3.7.3 Analysis第42-45页
Chapter 4 Internet of things Network distributed data storage and access control第45-65页
    4.1 Data storage for Internet of Things第45-46页
    4.2 Local storage strategies(LS)第46-47页
    4.3 "Data-Centric" storage strategy第47-50页
        4.3.1 Based on geographic Hash table(GHT)DCS storage第47-48页
        4.3.2 DIFS(distributed index for features in sensor network)第48页
        4.3.3 DIM(distributed index for multi-dimensional data)第48页
        4.3.4 Comb and Double Ruling scheme stored query plan第48-50页
        4.3.5 Scoop第50页
    4.4 Distributed File system Access Control Analysis第50-52页
    4.5 Distributed access control mechanism on the property第52-61页
        4.5.1 Property description and management第53-54页
        4.5.2 Attrbute-based access policy management第54-58页
        4.5.3 Attrbute-based access control processes第58-60页
        4.5.4 Sha ring and deleting users第60-61页
    4.6 Encrypted storage and integrity check第61-62页
        4.6.1 Encrypted Storage第61页
        4.6.2 Delayed re-encryption technology第61-62页
        4.6.3 Integrity check第62页
    4.7 Security Analysis第62-63页
    4.8 Summary第63-65页
Chapter 5 Summary and Outlook第65-68页
    5.1 Summary第65-66页
    5.2 Work prospects第66-68页
References第68-71页
Acknowledgements第71-72页
详细中文摘要第72-78页

论文共78页,点击 下载论文
上一篇:脑电波信号的处理方法与应用
下一篇:基于Linux的软件无线电SDK设计