簡易檢索 / 詳目顯示

研究生: 江浩群
Chiang, Hao-Chun
論文名稱: 以詢答達成有效率的雲端儲存即時稽核系統
Real-time Auditing and Proof of Violation for Cloud Storage Systems Based on Transponder
指導教授: 黃冠寰
Hwang, Gwan-Hwan
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 31
中文關鍵詞: 即時稽核雲端儲存雲端安全不可否認性證明違約
英文關鍵詞: Real-time Auditing, Cloud Storage, Cloud Security, Non-Repudiation, Proof of Violation
DOI URL: https://doi.org/10.6345/NTNU202204432
論文種類: 學術論文
相關次數: 點閱:194下載:11
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於網路科技的發達,雲端技術的應用也日趨增加。如:政府單位、私人企業及律師事務所等。各種不同的單位都可以把自身的資料儲存在雲端上面。使用雲端的好處除了可以在各種不同的地方使用同一份資料,還可以使多人共同編輯一份資料。雲端發展快速的同時也伴隨著安全性的問題,假設我們放在雲端上的資料可能被別人竊取、消失、或者被提供雲端服務的公司所洩漏,是否可以提出證據證明有發生過上述狀況?本實驗室過去研究提出一個方法來解決此問題,製作出了可以成為有效法律證據的電子證據。但該方法的證據都必須等到一段時間之後才能做稽核的動作,如果資料處理時發生錯誤必須等到稽核的時候才會發現。於是本研究把上述技術再加入即時稽核(Real-time Auditing),把過去在特定時間才能做稽核的問題解決。

    摘要................................i 圖目錄................................iii 表目錄................................iv 第一章 緒論................................1 第一節 簡介雲端運算................................1 第二節 雲端上的信任問題................................2 第三節 章節介紹................................3 第二章 POV協定................................4 第一節 Proof of Violation.............................4 第二節 雜湊值與雜湊鏈................................4 第三節 C&L Scheme & A REAL-TIME POV SCHEME.................6 第三章 詢答式即時稽核系統................................8 第一節 系統架構................................8 第二節 訊息交換協定................................9 第三節 稽核................................12 第四節 證據縮減................................15 第四章 實驗結果................................19 第五章 相關研究................................27 第六章 結論................................28 第七章 參考著作................................29

    [1]“Google Compute Engine,” https://cloud.google.com/compute/
    [2]“Amazon EC2,” http://aws.amazon.com/tw/ec2/
    [3]“Google App Engine,” https://cloud.google.com/appengine/docs
    [4] “Google Drive,” https://drive.google.com/start#home
    [5] “Dropbox,” https://www.dropbox.com/home
    [6] “SugarSync,” https://www.sugarsync.com/
    [7] “Microsoft SkyDrive,” http://skydrive.live.com/.
    [8] “Box,” http://www.box.net
    [9]Gwan-Hwan Hwang, Jenn-Zjone Peng, and Wei-Sian Huang, “A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices,” The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2013), Melbourne, Australia, 16-18 July.
    [10]Gwan-Hwan Hwang, Wei-Sian Huang, and Jenn-Zjone Peng, “Real-time Proof of Violation for Cloud Storage,” International Conference on Cloud Computing Technology and Science, December 27-29, 2014, Singapore.
    [11]Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li Zhuang, “Enabling Security in Cloud Storage SLAs with CloudProof,” USENIX Annual Technical Conference (USENIX), 2011, pp. 31.
    [12]Jun Feng, Yu Chen, Douglas Summerville, Wei-Shinn Ku, Zhou Su, “Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol,” in IEEE Consumer Communications and Networking Conference (CCNC), pp.521-522, January 2011.
    [13]Alexander Shraer, Idit Keidar, Christian Cachin, Yan Michalevsky, Asaf Cidon, and Dani Shaket, “Venus: Verification for untrusted cloud storage,” ACM CCSW 2010.
    [14]Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, and Yu-Wei Lin, “Fulfilling mutual nonrepudiation for cloud storage,” Concurrency and Computation: Practice and Experience (2014).
    [15]Ravi S. Sandhu, Coynek, Edward J. Coyne, Feinsteink, Hal L. Feinstein, and Charles E. Youman, “Role-based access control models yz,” IEEE computer 29.2 (1996): 38-47.
    [16]Gwan-Hwan Hwang, and Hung-Fu Chen, “Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems,” International Conference on Cloud Computing, June 27 - July 2, 2016.
    [17]Gwan-Hwan Hwang, Yi-Ling Yuan, and Chi Wu-Lee, “Cryptographic Accountability for Cloud-based Service-oriented Architecture Systems,” Submitted to IEEE Transactions on Service Computing (In revision)
    [18]Crosby, Scott A., and Dan S. Wallach. “Efficient Data Structures For Tamper-Evident Logging”. USENIX Security Symposium. 2009.
    [19]Haeberlen, Andreas, Petr Kouznetsov, and Peter Druschel. “PeerReview: Practical accountability for distributed systems”. ACM SIGOPS operating systems review. Vol. 41. No. 6. ACM, 2007.
    [20]“對雲端不信任的問題-1,”
    http://technews.tw/2015/08/23/can-we-really-trust-google/
    [21]“對雲端不信任的問題-2,”
    http://www.netadmin.com.tw/article_content.aspx?sn=1208090001
    [22]FIPS, PUB. "Federal Information Processing Standards Publication." DES modes of operation, US Department of Commerce/National Institute of Standards and Technology (1980).

    下載圖示
    QR CODE