English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52068/87197 (60%)
Visitors : 8909078      Online Users : 112
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/111447

    Title: 雲端儲存第三方稽核策略之探討
    Other Titles: Research on third-party auditing strategies for securing cloud storage
    Authors: 莊涵君;Chuang, Han-Chun
    Contributors: 淡江大學電機工程學系碩士班
    Keywords: 雲端儲存;隱私保護;公共稽核;Cloud Storage;Privacy preserve;Public audit
    Date: 2016
    Issue Date: 2017-08-24 23:53:05 (UTC+8)
    Abstract: 雲端儲存可以讓使用者輕易的儲存資料,但儲存在雲端伺服器的外包資料其正確性是否有被確保則是個問題,由於使用者將資料儲存到雲端後本地端的原始資料就會刪除,因此檢查這些外包資料的正確性將會是個困難的任務,因此我們需要一個高效且能夠達成公共稽核的第三方(Third-party Auditor, TPA)來完成檢查正確性的任務,但TPA做為一個第三方,我們並不能完全信任它,我們希望TPA能夠稽核資料的正確性,同時在稽核過程中不能得知有關使用者的資料內容,因此如何設計稽核流程成為這個議題的關鍵。
    我們在文中證明了TPA如何針對過去方案來破解使用者的資料,並且在同樣的攻擊模式下是無法由我們所提出的方案達到相同的目的;此外我們利用Pairing-Based Cryptography(PBC)函式庫來模擬過去方案以及我們提出的方案,並進行各種情況下的模擬,最後可看出我們所提出的方案在增進隱私性的同時,不會使得使用者、雲端伺服器、TPA這三個實體增加額外的運算時間。
    Cloud storage allows users to store data easily, but whether the integrity of outsourced data stored in the cloud server is guaranteed that is a problem. Because the local data will be deleted after the user saves data to the cloud, checking the integrity of the outsourcing data will be a difficult task. We need a efficient third-party which is able to support public audit (Third-party Auditor, TPA) to complete the task of checking the data integrity, but TPA as a third party, which we can not trust it completely. We hope that TPA can audit the integrity of the data, and TPA can not learned about the user''s data in the audit processes, so how to design the audit processes become the key issue.
    In the issue of third-party audit strateties, we need to consider few key points: the strategy computation time, supporting batch audit, and privacy protection. The proposed strategies in the past have been complete third-party audit processes, but there is the possibility of privacy leakage. Although a strategy has been proposed which blinds the parameter to solve the privacy problem in recent years, we find it still exists the possibility of data to be learned. So we will enhance the privacy protection based on past strategies. We improve the audit processes to solve the problem of privacy leakage. In addition we make improvements for the problem of invalid responses. When TPA does the batch audit, even if there exists invalid responses, it does not increase computation time.
    We show how the TPA learn user''s data in past strategies in this paper, and in the same attack patterns TPA can not achieve the same purpose in the strategy we proposed. In addition we use Pairing-Based Cryptography (PBC) library to simulate our strategy and the strategies which are proposed in the past under the variety of situations. Finally, we can see that our strategy improves the privacy protection, at the same time doesn''t increase the computation time of the three entities, the user, the server, and the TPA.
    Appears in Collections:[電機工程學系暨研究所] 學位論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback