淡江大學機構典藏:Item 987654321/105508
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62819/95882 (66%)
造访人次 : 4003589      在线人数 : 663
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/105508


    题名: 簡單快速雲端階層式組織授權之應用
    其它题名: A simple and fast cloud authorization for hierarchical organization
    作者: 蔡佳勳;Tsai, Chia-Hsun
    贡献者: 淡江大學資訊管理學系碩士班
    李鴻璋;Lee, Hung-Chang
    关键词: 階層式;公開金鑰;雲端運算;Hierarchical;Public Key;Cloud Computing
    日期: 2015
    上传时间: 2016-01-22 14:57:50 (UTC+8)
    摘要: 本論文提出一套應用在雲端運算中,使階層式結構中群組間進行資料授權能夠簡單快速方法。本方法中,結構中群組有一把公開金鑰PK及私密金鑰SK,並且將群組私密金鑰SK,用直接上級群組公開金鑰加密產生公開參數R。利用直屬結構表公開各群組公開金鑰,相對公開參數R及直接上級群組等資訊。
    群組會將資料用群組私密金鑰SK所導出的加密金鑰,加密該文件,並將其上傳至雲端中。當被授權的群組(即上級群組們),則透過對直屬結構表中公開數值,遞迴路徑運算出該群組私密金鑰SK進而解密該資料。本論文所提機制亦與AKL、Lo-Hwang-Liu、Chu-Hsing Lin三位所提機制在多個面向(運作成員、效率、新成員加入及離開等)做比較,本論文具不用CA(Certificate Authority,憑證授權中心)、運算簡單、具當階層式結構擴大較少公開參數改變的優點。
    This study proposes a simple and fast data authorization in hierarchical structure between groups for cloud computing. Within this method, each group in hierarchical organization gets a pair key, naming the public key ’PK’and the private key ‘SK’. The group use its direct ancestor groups’ public keys ’PK’ to encrypt its own private key ’SK’ to generate the open parameters R. All these parameters(public keys PK, open parameters R) and their relationship are to open public by using an open table called RAP (Relation-And-Parameter) table.
    When comes to data encryption, groups derive the encryption key from its private key ‘SK’ by using a open function called F function, encrypt the files and upload them to the cloud. When the group is authorized (groups that are the ancestor groups’ ), they look the RAP table and find the path between his group and the authorized group, recursively computed the group’s private key ‘SK’ in the path, and finally use the F function to derive the decrypt encryption key. We also compared the proposed mechanisms with those by AKL, Lo-Hwang-Liu, and Chu-Hsing Lin in multiple faces like operation of member, efficiency, new members join and leave, etc.. As a result, the proposed one provides little CA (Certificate Authority), simple operation, fewer public parameters changes when come to a hierarchical structure expansion.
    显示于类别:[資訊管理學系暨研究所] 學位論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML86检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈