研究生: |
葉上語 Yeh,Shang-Yu |
---|---|
論文名稱: |
設計及實作雲端環境中可用性之行為違反證明技術 Design and Implementation of POV Scheme for Availability in Cloud Computing |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2015 |
畢業學年度: | 104 |
語文別: | 中文 |
論文頁數: | 27 |
中文關鍵詞: | 雲端運算 、安全協定 、可用性檢測 |
論文種類: | 學術論文 |
相關次數: | 點閱:148 下載:19 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
今日的雲端提供商(Cloud Provider)在提供服務給予使用者前,皆會與其簽訂服務階層協議(Service-Level Agreement,簡稱SLA),然而目前雲端上卻沒有提供一個可信任的方法去證明服務是否達到SLA的標準。Amazon本身有提供雲端監控服務(CloudWatch),然而此監控工具(Monitoring tools),為雲端提供商所提供,若提供商給予錯誤資訊或想規避一些服務缺失,使用者也無從防範,可稱為「球員兼做裁判」的狀況,球員自己審查自己的比賽,對使用者來說沒有信服力。
本論文為避免雲端服務商在租用虛擬機器給予使用者時,出現非使用者自主性服務中斷等狀況,我們使用證明違約(Proof of Violation,POV)技術在服務提供商及虛擬機器間建立一個可信任的演算法,並且再改良此演算法,使其證據儲存空間及稽核時間能進一步優化。
[1] “Amazon AWS,” http://aws.amazon.com/tw/
[2] “Amazon EC2,” http://aws.amazon.com/tw/ec2/
[3] “Amazon EC2 SLA,” http://aws.amazon.com/tw/ec2/sla/
[4] “Google App Engine,” https://cloud.google.com/appengine/docs
[5] “Microsoft Azure,” http://azure.microsoft.com/zh-tw/
[6] “Summary of the October 22, 2012 AWS Service Event in the US-East Region,” http://aws.amazon.com/tw/message/680342/
[7] “Summary of the Amazon EC2, Amazon EBS, and Amazon RDS Service Event in the EU West Region,” http://aws.amazon.com/tw/message/2329B7/
[8] “Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region,” http://aws.amazon.com/tw/message/65648/
[9] R. A. Popa and J. R. Lorch. “Enabling Security in Cloud Storage SLAs with CloudProof,” USENIX Annual Technical Conference (USENIX), 2011, pp. 31.
[10] Gwan-Hwan Hwang, Jenn-Zjone Peng, and Wei-Sian Huang, “A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices,” The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2013), Melbourne, Australia, 16-18 July.
[11] Dami´an Serrano, Sara Bouchenak, Yousri Kouki, Thomas Ledoux, and Jonathan Lejeune, Julien Sopena, ” Towards QoS-Oriented SLA Guarantees for Online Cloud Services” in Proceeding of the IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid ), 2013, pp. 19–26
[12] Salman A. Baset, “Cloud SLAs: Present and Future,” ACM SIGOPS Operating Systems Review, vol. 46, no. 2, Jul. 2012.
[13] A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. “Accountable Virtual Machines, “In Proc. of OSDI, 2010.
[14] Khalid Alhamazani, Rajiv Ranjan, Karen Mitra, Fethi Rabhi, Prem Prakash Jayaraman, Samee Ullah Khan, Adnene Guabtni, Vasudha Bhatnagar. “An overview of the commercial cloud monitoring tools: research dimensions, design issues, and state-of-the-art,” arXiv Computing Research Repository, vol. abs/1312.6170, Dec. 2013.
[15] Yan Han, “IaaS cloud computing services for libraries: cloud storage and virtual machines,” , OCLC Systems & Services: International digital library perspectives, Vol. 29 Iss: 2, pp.87 – 100, 2013.
[16] Ibrahim, Amani S., et al. "CloudSec: a security monitoring appliance for Virtual Machines in the IaaS cloud model." Network and System Security (NSS), 2011 5th International Conference on. IEEE, 2011.
[17] Petcu, Dana, and C. Crăciun. "Towards a security sla-based cloud monitoring service." 2014 4th International Conference on Cloud Computing and Services Science (CLOSER). 2014.
[18] Kamara, Seny, and Kristin Lauter. "Cryptographic cloud storage." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. 136-149, 2010.
[19] Wang, Zhi, and Xuxian Jiang. "Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity." Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010.
[20] Garfinkel, Tal, and Mendel Rosenblum. "A Virtual Machine Introspection Based Architecture for Intrusion Detection." NDSS. Vol. 3. 2003.
[21] Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38.5 (2005): 39-47.
[22] Hwang, Gwan‐Hwan, et al. "Fulfilling mutual nonrepudiation for cloud storage." Concurrency and Computation: Practice and Experience (2014).
[23] Proof of Violation for Response Time Auditing in Cloud Systems. Gwan-Hwan Hwang and Yi-Ling Yuan Accepted for presentation in the 2015 International Conference on Cloud Computing and Big Data (CloudCom-asia 2015), sponsored by IEEE Computer Society, Huangshan, China, June 17-19, 2015.
[24] Kremer, Steve, Olivier Markowitch, and Jianying Zhou. "An intensive survey of fair non-repudiation protocols." Computer communications 25.17 (2002): 1606-1621.
[25] Garfinkel, Tal, et al. "Terra: A virtual machine-based platform for trusted computing." ACM SIGOPS Operating Systems Review. Vol. 37. No. 5. ACM, 2003.