English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52343/87441 (60%)
Visitors : 9112885      Online Users : 212
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/105508

    Title: 簡單快速雲端階層式組織授權之應用
    Other Titles: A simple and fast cloud authorization for hierarchical organization
    Authors: 蔡佳勳;Tsai, Chia-Hsun
    Contributors: 淡江大學資訊管理學系碩士班
    李鴻璋;Lee, Hung-Chang
    Keywords: 階層式;公開金鑰;雲端運算;Hierarchical;Public Key;Cloud Computing
    Date: 2015
    Issue Date: 2016-01-22 14:57:50 (UTC+8)
    Abstract: 本論文提出一套應用在雲端運算中,使階層式結構中群組間進行資料授權能夠簡單快速方法。本方法中,結構中群組有一把公開金鑰PK及私密金鑰SK,並且將群組私密金鑰SK,用直接上級群組公開金鑰加密產生公開參數R。利用直屬結構表公開各群組公開金鑰,相對公開參數R及直接上級群組等資訊。
    群組會將資料用群組私密金鑰SK所導出的加密金鑰,加密該文件,並將其上傳至雲端中。當被授權的群組(即上級群組們),則透過對直屬結構表中公開數值,遞迴路徑運算出該群組私密金鑰SK進而解密該資料。本論文所提機制亦與AKL、Lo-Hwang-Liu、Chu-Hsing Lin三位所提機制在多個面向(運作成員、效率、新成員加入及離開等)做比較,本論文具不用CA(Certificate Authority,憑證授權中心)、運算簡單、具當階層式結構擴大較少公開參數改變的優點。
    This study proposes a simple and fast data authorization in hierarchical structure between groups for cloud computing. Within this method, each group in hierarchical organization gets a pair key, naming the public key ’PK’and the private key ‘SK’. The group use its direct ancestor groups’ public keys ’PK’ to encrypt its own private key ’SK’ to generate the open parameters R. All these parameters(public keys PK, open parameters R) and their relationship are to open public by using an open table called RAP (Relation-And-Parameter) table.
    When comes to data encryption, groups derive the encryption key from its private key ‘SK’ by using a open function called F function, encrypt the files and upload them to the cloud. When the group is authorized (groups that are the ancestor groups’ ), they look the RAP table and find the path between his group and the authorized group, recursively computed the group’s private key ‘SK’ in the path, and finally use the F function to derive the decrypt encryption key. We also compared the proposed mechanisms with those by AKL, Lo-Hwang-Liu, and Chu-Hsing Lin in multiple faces like operation of member, efficiency, new members join and leave, etc.. As a result, the proposed one provides little CA (Certificate Authority), simple operation, fewer public parameters changes when come to a hierarchical structure expansion.
    Appears in Collections:[資訊管理學系暨研究所] 學位論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback