English  |  正體中文  |  简体中文  |  Items with full text/Total items : 51258/86283 (59%)
Visitors : 8029786      Online Users : 91
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/111447


    Title: 雲端儲存第三方稽核策略之探討
    Other Titles: Research on third-party auditing strategies for securing cloud storage
    Authors: 莊涵君;Chuang, Han-Chun
    Contributors: 淡江大學電機工程學系碩士班
    莊博任
    Keywords: 雲端儲存;隱私保護;公共稽核;Cloud Storage;Privacy preserve;Public audit
    Date: 2016
    Issue Date: 2017-08-24 23:53:05 (UTC+8)
    Abstract: 雲端儲存可以讓使用者輕易的儲存資料,但儲存在雲端伺服器的外包資料其正確性是否有被確保則是個問題,由於使用者將資料儲存到雲端後本地端的原始資料就會刪除,因此檢查這些外包資料的正確性將會是個困難的任務,因此我們需要一個高效且能夠達成公共稽核的第三方(Third-party Auditor, TPA)來完成檢查正確性的任務,但TPA做為一個第三方,我們並不能完全信任它,我們希望TPA能夠稽核資料的正確性,同時在稽核過程中不能得知有關使用者的資料內容,因此如何設計稽核流程成為這個議題的關鍵。
    在第三方稽核方案的議題中,我們需要考量的幾個要點有:方案運算時間、支持批次稽核、隱私性;過去所提出的方案裡,已有完整的第三方公開稽核流程,但其隱私性是有洩漏的可能性,雖然在近年的方案中,有人提出以遮蔽的方式來解決隱私性的問題,但我們發現這樣的方式依然存在著資料被解讀的可能性,因此我們將以過去的方案為基礎,並加以改良來補足其隱私性的缺陷。
    我們以過去的方案為基本架構,並對稽核的流程做改良,透過這樣的改動,解決了過去隱私性洩漏的問題;此外我們針對無效回應的問題做出改良,使TPA在進行批次稽核時,即便有無效的回應,也不會使其運算時間上升。
    我們在文中證明了TPA如何針對過去方案來破解使用者的資料,並且在同樣的攻擊模式下是無法由我們所提出的方案達到相同的目的;此外我們利用Pairing-Based Cryptography(PBC)函式庫來模擬過去方案以及我們提出的方案,並進行各種情況下的模擬,最後可看出我們所提出的方案在增進隱私性的同時,不會使得使用者、雲端伺服器、TPA這三個實體增加額外的運算時間。
    Cloud storage allows users to store data easily, but whether the integrity of outsourced data stored in the cloud server is guaranteed that is a problem. Because the local data will be deleted after the user saves data to the cloud, checking the integrity of the outsourcing data will be a difficult task. We need a efficient third-party which is able to support public audit (Third-party Auditor, TPA) to complete the task of checking the data integrity, but TPA as a third party, which we can not trust it completely. We hope that TPA can audit the integrity of the data, and TPA can not learned about the user''s data in the audit processes, so how to design the audit processes become the key issue.
    In the issue of third-party audit strateties, we need to consider few key points: the strategy computation time, supporting batch audit, and privacy protection. The proposed strategies in the past have been complete third-party audit processes, but there is the possibility of privacy leakage. Although a strategy has been proposed which blinds the parameter to solve the privacy problem in recent years, we find it still exists the possibility of data to be learned. So we will enhance the privacy protection based on past strategies. We improve the audit processes to solve the problem of privacy leakage. In addition we make improvements for the problem of invalid responses. When TPA does the batch audit, even if there exists invalid responses, it does not increase computation time.
    We show how the TPA learn user''s data in past strategies in this paper, and in the same attack patterns TPA can not achieve the same purpose in the strategy we proposed. In addition we use Pairing-Based Cryptography (PBC) library to simulate our strategy and the strategies which are proposed in the past under the variety of situations. Finally, we can see that our strategy improves the privacy protection, at the same time doesn''t increase the computation time of the three entities, the user, the server, and the TPA.
    Appears in Collections:[電機工程學系暨研究所] 學位論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML15View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback