研究生: |
鄭安傑 Jheng, An-Jie |
---|---|
論文名稱: |
雲端資料庫之即時稽核 Real-Time Auditing for Cloud Database Systems |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 中文 |
論文頁數: | 42 |
中文關鍵詞: | 雲端資料庫 、雲端安全 、不可否認性 、證明違約 |
DOI URL: | https://doi.org/10.6345/NTNU202201976 |
論文種類: | 學術論文 |
相關次數: | 點閱:100 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
雲端資料庫是一種執行在雲端運算平台上的資料庫系統,使用者不需要自己維護資料庫,而是由雲端服務提供者負責安裝、維護資料庫實體。服務提供者可能因為系統當機、錯誤的操作或是遭受嚴重的攻擊而造成重要的資料遺失或被更動導致回傳不一 致 的 版 本 。 某 些 雲 端 資 料 庫 可 以 讓 使 用 者 透 過 Web interface 或 是API(Application programming interface)存取資料庫操作的日誌檔,但使用者無法使用日誌檔去證明服務提供者是否有違反 Query Integrity 與Transaction
Serializability,因為這些日誌檔不是經由密碼學加密的證據。本篇論文提出了一個即時稽核架構,雲端服務提供商在租借資料庫給予用戶時,用戶能夠在執行 query動作之後即時性的發現因為雲端服務提供商不當的疏忽而造成資料庫損毀或者被竄改,我們希望在每次使用 Database 時都能透一些證據來作即時性稽核,將使用 FullBinary Hash Tree 來實作我們的架構。
[1] “Cloud database” http://en.wikipedia.org/wiki/Cloud_database
[2] “SQL” http://en.wikipedia.org/wiki/SQL
[3] “NoSQL” http://en.wikipedia.org/wiki/NoSQL
[4] “Relational_database” https://en.wikipedia.org/wiki/Relational_database
[5] “Google Cloud SQL” https://cloud.google.com/sql/
[6] “Amazon RDS for MySQL” http://aws.amazon.com/tw/rds/mysql/
[7] Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng. “Real-time proof of
violation for cloud storage,” Cloud Computing Technology and Science
(CloudCom), 2014 IEEE 6th International Conference on IEEE, 2014.
[8] Gwan-Hwan Hwang and Shih-Kai Fu, “Proof of Violation for Trust and Accountability
of Cloud Database Systems,” 2016 16th IEEE/ACM International Symposium on Cluster,
Cloud, and Grid Computing
[9] R. A. Popa and J. R. Lorch. “Enabling Security in Cloud Storage SLAs with
CloudProof,” USENIX Annual Technical Conference (USENIX), 2011, pp. 31.
[10] Gwan-Hwan Hwang, Hung-Fu Chen. “Efficient Real-time Auditing and Proof of
Violation for Cloud Storage Systems,” Cloud Computing (Cloud) 016 9th IEEE
International Conference on Cloud Computing on IEEE ,2016.
[11] HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan “Verifying
Completeness of Relational Query Results in Data Publishing”
[12] “Digital Signature“ https://en.wikipedia.org/wiki/Digital_signage
[13] “Hash_function” https://en.wikipedia.org/wiki/Hash_function
[14] Feng J, Chen Y, Summerville D, Ku WS, and Su Z, “Enhancing Cloud Storage Security
Against Roll-back Attacks with a New Fair Multi-party Non-repudiation
protocol,” IEEE Consumer Communications and Networking Conference (CCNC), 2011.
[15] Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Yang Xiang. “ Verifiable Auditing for
Outsourced Database in Cloud Computing,” IEEE TRANSACTIONS ON COMPUTERS, VOL. 64,
NO. 11, NOVEMBER 2015
[16] Kyriakos Mouratidis, Dimitris Sacharidis, HweeHwa Pang “Partially materialized
digest scheme: an efficient verification method for outsourced databases,”
[17] “B+Tree” https://en.wikipedia.org/wiki/B%2B_tree
[18] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,”
Commun. ACM, vol. 13, no. 7, pp. 422–426, Jul. 1970.