Font Size: a A A

Research On Key Technologies Of Distributed Data Security For Moving Target Location And Tracking System

Posted on:2021-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:X X GuoFull Text:PDF
GTID:2518306476450344Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the maturity of the Global Positioning System(GPS),the GPS technology has been more and more civilized so as to make various LBS(Location Based Service)applications popularly.In such a background,a sole system usually cannot meet the simultaneous requests of a large number of users so that a large number of distributed tracking and positioning systems have benn emerged.Most of the distributed tracking and positioning systems are closely related to people's lives,which include bicycle sharing,vehicle rental companies,vehicle navigation,electric vehicle trackers,etc.In reality,data security problems occur frequently in distributed positioning and tracking systems,especially for increasing serious user data leakage,which means the existing distributed positioning and tracking system cannot provide security services,cannot guarantee the confidentiality and integrity of data,and cannot guarantee the stability and efficiency of services.Due to the era of big data and the openness of the Internet,various attack behaviors threaten the security of data in distributed systems.The distributed positioning and tracking systems should be paid more attention to the security for data transmission in the Internet.However,the existing security technologies still have many common problems,which includ how to securely and conveniently distribute the user session keys,how to prevent various common attacks from threatening data security,how to ensure the reliability and integrity of data sources,and how to protect data with minimal impact on system efficiency.Based on the existing distributed mobile target positioning and tracking system,in this thesis,we do the researches on three key security technologies,which include the group key agreement protocol based on complete ternary tree,the secure distributed database interaction technology suitable for mobile positioning system,and the encryption resume transmission technology with key agreement function.The group key agreement protocol based on complete ternary tree can solve the problem of multi-member key negotiation in distributed mobile positioning system,and can finally obtain the group key for all members by exchanging necessary parameters required for key negotiation.The secure distributed database interaction technology suitable for mobile positioning system can solve the problems of the confidentiality and integrity for distributed databases in the open network,and the low performance of distributed databases.In this technology,we design the key negotiation algorithm with encryption algorithm to protect confidentiality and integrit for the distributed database interactions,and improve the performance of the distributed database through read-write separation,database and table separation,and temporary table technologies.The encryption resume transmission technology with key agreement function can solve the data security and efficiency problems for data uploading or downloading in mobile positioning systems.In this technology,we merge the key agreement algorithms,breakpoint resume transmission algorithms,and encryption algorithms to guarantee the efficiency and safety for large data transmission.The main contributions of this thesis are as follows.Firstly,we do the research on a group key agreement protocol based on complete ternary tree.By studying the group key agreement protocol,combined with a complete ternary tree and bilinear mapping algorithm,we propose a group key agreement protocol based on a complete ternary tree(CT-GKA),which is suitable for dynamically changeable member systems,and can solves the problems of high calculation cost and security for general group key agreement protocols.Moreover,we can apply the CT-GKA protocol successfully in the distributed mobile target location and tracking system.Secondly,we do the research on a secure distributed database interaction technology,which is suitable for mobile positioning system.We first do the researches on the end-to-end system architecture,on the pre-sharing key agreement algorithm and on the SM4 algorithm to design the enhanced SM4 algorithm,which is fit for tabular data encryption.Then,we propose a pre-shared key negotiation algorithm,and combine it with the enhanced SM4 algorithm to provide the system with the session key for encryption,and to ensure the confidentiality and integrity protection for data.At last,based on the above proposed protocols and algorithms,we realize a secure distributed mobile positioning system database scheme,which is based on secure distributed database interaction technology,through code development and system design.Thirdly,we do the research on an encryption resume transmission technology with key exchange protocol.We first propose a novel key exchange protocol,which is based on the Diffe-Hellman key agreement algorithm,RSA algorithm and trusted third-party authentication technology,to ensure the security and efficiency of the key negotiation.Then,we propose an encryption resuming technology with key agreement function,which is combined with the proposed key exchange protocol,breakpoint resuming algorithm,SM4 algorithm and CBC cipher packet connection mode,to realize the safe and efficient transmission of big data.At last,based on the proposed encryption resuming technology,we realize a secure distributed mobile positioning system scheme with key negotiation and encryption continued transmission functions through code development and system design.Finally,we test and analyze the key technologies for the security of distributed data in mobile target positioning and tracking system.We first test the technology of group key agreement protocol based on complete ternary tree,which includes the applicability of group key agreement protocol based on complete ternary tree,success rate of key agreement and negotiation time.In the case of 10 members,the key agreement success rate is above 99.3%,the negotiation has good compatibility with the positioning system,which takes about 22 ms.Then,we test the secure distributed database interaction technology suitable for mobile positioning system,which includes the distributed database read and write separation success rate,temporary table technology success rate,read and write request time,data recovery accuracy and integrity,and transmission data confidentiality.Compared with a distributed database without read-write separation,the time for reading and writing a single data request is greatly reduced,the read-write separation success rate is more than 99.3%,the improved temporary table technology success rate reaches 100%.In the data recovery test,we discover that there is only one record for incomplete data recovery during the test.At last,we test the encryption resuming technology with key agreement function,which includes the success rate of the new key agreement algorithm,the success rate of encryption and decryption,and the accuracy of aggregation of the resuming data.The success rate of the new key agreement algorithm is above 99.6%,the success rate of encryption and decryption has reached 100%,and the data aggregation accuracy rate is above 97.5%.When the network is interrupted,the resuming technology will ensure to continue the unfinished data transmission after the network reconnects.
Keywords/Search Tags:complete ternary tree, key agreement, distributed database, distributed system, breakpoint resume, data security
PDF Full Text Request
Related items