English  |  正體中文  |  简体中文  |  Items with full text/Total items : 49647/84944 (58%)
Visitors : 7706307      Online Users : 72
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/111343


    Title: Auditing study for cloud storages and cloud computations
    Other Titles: 雲端儲存與計算服務的稽核研究
    Authors: 李宗霖;Li, Tsung-Lin
    Contributors: 淡江大學資訊工程學系資訊網路與多媒體碩士班
    黃心嘉;Hwang, Shin-Jia
    Keywords: 個人隱私保護;公開稽核;行動裝置上的雲端儲存;雲端儲存;Merkle雜湊樹;雲端計算;數位簽章;Identity privacy-preserving;Public Auditing;mobile cloud storage;Cloud Storage;Merkle hash trees;Cloud Computing;digital signature schemes
    Date: 2016
    Issue Date: 2017-08-24 23:50:28 (UTC+8)
    Abstract: 對於雲端計算服務以及雲端儲存服務而言,稽核是相當重要的。其中,行動裝置上對於雲端儲存服務的稽核方法必須支持動態群組以及個人隱私保護。為了達到個人身分隱私保護,Yu 等學者提出他們支援動態群組的方法。然而,我們針對動態群體的攻擊明確指出他們的方法,當群體成員與群體金鑰變動時、無法滿足前向與後向的安全性要求。為了改正這個安全缺失,提出我們的第一個方法,除了前向與後向的安全性要求外,還提供最大化的個人身分隱私保護。
    對於雲端計算稽核方面,Wei等學者提出他們的雲端計算稽核方法。然而,他們針對攻擊者的行為假設是不實際的。移除不實際的假設後,將導致稽核所需的數量大增,稽核者的計算需求將變得龐大,導致可能無法在合理的時間內回應稽核結果。同時,發現不正確的計算結果的稽核機率也無法達到使用者的要求。針對改善線上稽核的效能或是稽核機率,我們提出一些策略有效地增加稽核驗證子的數量,透過稽核驗證子數量增加,可以改善效能或是稽核的機率。我們的策略利用了離線計算或是利用雲端計算伺服器計算能力,藉以提升線上稽核效能和稽核機率。根據我們的效能分析與探討,我們的策略不只是提升線上效能,也能用來提升線上稽核機率。
    Auditing is important both for cloud computing services and cloud storage services. The audit scheme of cloud storage services for mobile devices should support dynamic groups and identity privacy protection. To audit uploading files for the dynamic mobile groups, Yu et al. proposed their scheme to protect identity-privacy. However, our dynamic group attacks shows that their scheme does not satisfy the forward and backward privacy for the group secret key change after some members leave. To provide forward and backward privacy for the group secret keys, our first protocol is proposed. Besides, our protocol provides the maximal identify-privacy protection.
    For cloud computation, Wei et al. proposed their cloud computation auditing scheme. However, their assumption about the adversary’s behaviors is impractical. After removing this impractical assumption, auditors’ computation load becomes so heavy that auditors may not return the auditing results in reasonable time. The probability of finding out incorrect computed results cannot reach the users’ requirement. To improve the on-line audit performance or probability, some improving strategies are proposed to increase the number of auditors efficiently. Then the increase of the number of auditors will improve either audit performance or audit probability. Our strategies utilize the off-line computation and cloud computation server help to improve the online audit performance and the audit probability. According to our performance analysis and the discussion, our strategies improve not only the online audit performance but also the audit probability for cloud computation.
    Appears in Collections:[資訊工程學系暨研究所] 學位論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML41View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback