研究生: |
湯亦祥 Tang Yi-Hsiang |
---|---|
論文名稱: |
巨量資料上傳需求之證明違約稽核 Proof of Violation for the Requirement of Big Data Uploading |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2020 |
畢業學年度: | 108 |
語文別: | 中文 |
論文頁數: | 55 |
中文關鍵詞: | 雲端安全 、不可否認性 、雲端儲存 、即時稽核 、證明違約 、智能合約 、區塊鏈 |
DOI URL: | http://doi.org/10.6345/NTNU202000899 |
論文種類: | 學術論文 |
相關次數: | 點閱:139 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
放在雲端上的資料、數據因為不完全受到數據擁有者的掌控,有可能因為雲端系統的故障、駭客及人為惡意入侵等原因造成資料的完整性受到破壞。從雲端上取回的資料的完整性應該要受到驗證稽核並在發現錯誤時能夠釐清錯誤的責任歸屬,此概念被稱為證明違約稽核(Proof of Violation)。然而,在巨量資料上傳的場景中,每筆的資料的依序稽核容易受到網路環境的影響,而讓稽核成為系統中的瓶頸。不僅如此,傳統雲端稽核的申訴也因為向可信任第三方的長時間的申訴流程,如法院,而令人感到不便甚至因此放棄申訴。
本文研究了巨量資料上傳場景中的稽核申訴,分析了兩種不同的違約證明協定Full Binary Hash Tree 以及 Aggregate Hash在該場景中無法應用的劣勢並提出了一個有效的解決方案。此外,也分析了Aggregate Hash可能遭受的攻擊並完善了協定來防禦攻擊,並進一步將稽核寫進智能合約中,完成了自動申訴的機制,去除了可信任第三方的角色,增強了申訴的信任價值以及效率。
1. Google Drive. https://www.google.com/drive/#home.
2. OneDrive. https://www.microsoft.com/zh-tw/microsoft-365/onedrive/online-cloud-storage.
3. iCloud. https://www.icloud.com/.
4. Goh, E.-J., et al. SiRiUS: Securing Remote Untrusted Storage. in NDSS. 2003.
5. Li, J., et al. Secure Untrusted Data Repository (SUNDR). in Osdi. 2004.
6. Stefanov, E., et al. Iris: A scalable cloud file system with efficient integrity checks. in Proceedings of the 28th Annual Computer Security Applications Conference. 2012.
7. Hwang, G.H., et al., Fulfilling mutual nonrepudiation for cloud storage. Concurrency and Computation: Practice and Experience, 2016. 28(3): p. 583-599.
8. Hwang, G.-H., W.-S. Huang, and J.-Z. Peng. Real-time proof of violation for cloud storage. in 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. 2014. IEEE.
9. Hwang, G.-H. and H.-F. Chen. Efficient real-time auditing and proof of violation for cloud storage systems. in 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). 2016. IEEE.
10. 吳承翰, 利用集合雜湊值達到有效率的雲端儲存系統稽核與證明違約協定, in 資訊工程學系. 2018, 國立臺灣師範大學. p. 1-50.
11. Hwang, G.-H., P.-C. Tien, and Y.-H. Tang. Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services. in 2020 The 2nd International Conference on Blockchain Technology (ICBCT 2020). 2020. ACM.
12. Bitcoin. Available from: https://www.bitcoin.com/.
13. Ethereum. Available from: https://ethereum.org/.
14. HyperLeger. Available from: https://www.hyperledger.org/.
15. Nakamoto, S., Bitcoin: A peer-to-peer electronic cash system. 2009, Manubot.
16. MORRIS, D.Z., Bitcoin Hits a New Record High, But Stops Short of $20,000, in Fortune. 2017.
17. Merkle, R.C. A digital signature based on a conventional encryption function. in Conference on the theory and application of cryptographic techniques. 1987. Springer.
18. jagttt, Clumsy. https://jagt.github.io/clumsy/index.html.