跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.172) 您好!臺灣時間:2025/09/11 08:50
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林孝盈
研究生(外文):Lin, Hsiao-Ying
論文名稱:具有資訊隱密性與容錯能力的分散式雲端儲存系統
論文名稱(外文):Data confidentiality and robustness in decentralized cloud storage systems
指導教授:曾文貴曾文貴引用關係
指導教授(外文):Tzeng, Wen-Guey
學位類別:博士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:英文
論文頁數:102
中文關鍵詞:隨機容錯編碼公開金鑰加密系統網路儲存系統雲端儲存系統網路編碼
外文關鍵詞:Randomized erasure codeshomomorphic encryption schemesnetworked storage systemscloud storage systemsnetwork coding
相關次數:
  • 被引用被引用:0
  • 點閱點閱:1742
  • 評分評分:
  • 下載下載:739
  • 收藏至我的研究室書目清單書目收藏:3
隨著高速網路與行動通訊的普及,雲端儲存服務已融入常日生活中,例如網路信箱,網路相簿等。使用者可以隨時隨地遠端透過行動裝置存取資料。除了可信賴的儲存機制之外,雲端儲存系統中的資料隱私性問題已日益被重視。將資料儲存在雲端系統中意味著將資料放置在第三者的環境中。如何同時保障使用者資料隱私性與儲存系統功能性是我們研究的主題。我們考慮一個沒有中央控制單位的雲端儲存系統,結合了公開金鑰加密系統與容錯編碼技術來設計一個同時具有高度隱私性與容錯能力的雲端儲存系統,除了基本的存取功能之外,我們的系統更提供了一個安全的資料轉移機制,使用者可以將自己的資料授權給其他使用者使用。我們的儲存系統保障了使用者資料的隱私性,即使是所有的儲存伺服器都被攻擊者控制,也無法破壞。系統同時具有容錯能力,當儲存系統中的儲存伺服器無預警離線或關閉,系統服務仍能正常運作。為了非集中式的系統架構,我們的公開金鑰加密系統經過特殊設計,使得編碼的程序與解密的程序可以平行地在各伺服器中運作,無須中央控制單位的協助。整體儲存系統除了基本的容錯能例外,使用者可以享有高度的資料隱私安全。
A cloud storage system consisting of a collection of storage servers provides storage services over the Internet for long-term storage. A user can store data into the system and access data from anywhere at any time via the Internet access. However, storing data in a third party's cloud system brings a serious concern on the data confidentiality. We consider a cloud storage system model that has no central authority. A tight integration of public key encryption schemes and random erasure codes is developed. By using this integration, we present a secure cloud storage system, which guarantees the data confidentiality and robustness and supports the secure data forwarding functionality. Hence, in our storage system, a user can not only securely store data but also forward data to other user in a confidential way.
1 Introduction 1
2 Review of Networked Storage Systems 7
2.1 Centralized Data Management . . . . . . . . . . . . . . . . . . 8
2.1.1 Mirrors and Replicas . . . . . . . . . . . . . . . . . . . 8
2.1.2 Erasure Codes . . . . . . . . . . . . . . . . . . . . . . . 10
2.2 Decentralized Data Management . . . . . . . . . . . . . . . . . 16
2.2.1 Mirrors and Replicas . . . . . . . . . . . . . . . . . . . 17
2.2.2 Erasure Codes . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.3 Hybrid Strategy . . . . . . . . . . . . . . . . . . . . . . 20
2.3 Challenge of Data Confidentiality . . . . . . . . . . . . . . . . 22
2.3.1 Cleartext Storage . . . . . . . . . . . . . . . . . . . . . 22
2.3.2 Symmetric Encryption . . . . . . . . . . . . . . . . . . 22
2.3.3 Public Key Encryption . . . . . . . . . . . . . . . . . . 24
2.3.4 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . 25
3 Erasure Codes and System Models 26
3.1 Bilinear Map and Assumptions . . . . . . . . . . . . . . . . . 26
3.2 Erasure Codes over Exponents . . . . . . . . . . . . . . . . . . 27
3.2.1 Random Linear Codes . . . . . . . . . . . . . . . . . . 28
3.2.2 Random Erasure Codes over Exponents . . . . . . . . . 29
3.3 System Models . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.3.1 The First System Model . . . . . . . . . . . . . . . . . 31
3.3.2 Advanced System Model . . . . . . . . . . . . . . . . . 32
3.4 Threat Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.4.1 Model without Forwarding . . . . . . . . . . . . . . . . 34
3.4.2 Model with Forwarding . . . . . . . . . . . . . . . . . . 35
4 Secure Cloud Storage System 38
4.1 Threshold Public Key Encryption . . . . . . . . . . . . . . . . 38
4.2 System Construction . . . . . . . . . . . . . . . . . . . . . . . 41
4.2.1 Correctness . . . . . . . . . . . . . . . . . . . . . . . . 46
4.3 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
4.3.1 Performance Analysis . . . . . . . . . . . . . . . . . . . 47
4.3.2 Successful Retrieval Probability . . . . . . . . . . . . . 50
4.3.3 Security Analysis . . . . . . . . . . . . . . . . . . . . . 59
5 Secure Cloud Storage with Data Forwarding 62
5.1 Threshold Public Key Re-Encryption Scheme . . . . . . . . . 62
5.2 System Construction . . . . . . . . . . . . . . . . . . . . . . . 64
5.2.1 Correctness . . . . . . . . . . . . . . . . . . . . . . . . 69
5.3 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
5.3.1 Performance Analysis . . . . . . . . . . . . . . . . . . . 70
5.3.2 Successful Retrieval Probability . . . . . . . . . . . . . 73
5.3.3 Security Analysis . . . . . . . . . . . . . . . . . . . . . 78
6 Discussion 81
6.1 Security Features of Our Storage Systems . . . . . . . . . . . . 81
6.1.1 Data Confidentiality . . . . . . . . . . . . . . . . . . . 82
6.1.2 Data Availability . . . . . . . . . . . . . . . . . . . . . 82
6.1.3 Decentralized Storage Control . . . . . . . . . . . . . . 83
6.2 Data Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
6.3 Supporting Integrity Checking . . . . . . . . . . . . . . . . . . 86
6.4 Cloud Features . . . . . . . . . . . . . . . . . . . . . . . . . . 87
7 Summary and Future Work 88
[1] Google. A webmail system. http://mail.google.com.
[2] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung. The google
file system. In Proceedings of the 19th ACM Symposium on Operating
Systems Principles - SOSP 2003, pages 29–43. ACM, 2003.
[3] David R. Brownbridge, Lindsay F. Marshall, and Brian Randell. The
newcastle connection or unixes of the world unite! Software Practice
and Experience, 12(12):1147–1162, 1982.
[4] Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob
Lyon. Design and implementation of the sun network filesystem, 1985.
[5] Frank Gens. IT Cloud Services User Survey, pt.2: Top Benefits and
Challenges. http://blogs.idc.com/ie/?p=210, October 2008.
[6] Matt Blaze. A cryptographic file system for unix. In Proceedings of the
ACM Conference on Computer and Communications Security - CCS
1993, pages 9–16. ACM, 1993.
[7] Andrew D. McDonald and Markus G. Kuhn. Stegfs: A steganographic
file system for linux. In Proceedings of the 3rd International Workshop
on on Information Hiding - IH 1999, volume 1768 of Lecture Notes in
Computer Science, pages 462–477. Springer, 1999.
[8] Giuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, and Pino Persiano.
The design and implementation of a transparent cryptographic
file system for unix. In Proceedings of the FREENIX Track: 2001
USENIX Annual Technical Conference, pages 199–212. USENIX Association,
2001.
[9] Charles P. Wright, Michael C. Martino, and Erez Zadok. Ncryptfs: A
secure and convenient cryptographic file system. In Proceedings of the
General Track: 2003 USENIX Annual Technical Conference, pages 197–
210. USENIX, 2003.
[10] Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie
Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin
Theimer, and Roger Wattenhofer. Farsite: Federated, available, and
reliable storage for an incompletely trusted environment. In Proceedings
of the 5th Symposium on Operating Systems Design and Implementation
- OSDI 2002, pages 1–14, 2002.
[11] John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols,
Mahadev Satyanarayanan, Robert N. Sidebotham, and Michael J. West.
Scale and performance in a distributed file system. ACM Transactions
on Computer Systems, 6(1):51–81, 1988.
[12] Mahadev Satyanarayanan, James J. Kistler, Puneet Kumar, Maria E.
Okasaki, Ellen H. Siegel, and David C. Steere. Coda: A highly available
file system for a distributed workstation environment. IEEE Transac-
tions on Computers, 39(4):447–459, 1990.
[13] David Mazi`eres, Michael Kaminsky, M. Frans Kaashoek, and Emmett
Witchel. Separating key management from file system security. In
Proceedings of the ACM Symposium on Operating Systems Principles
- SOSP 1999, pages 124–139. ACM, 1999.
[14] Mahesh Kallahalla, Erok Riedel, Ram Swaminathan, Qian Wang, and
Kevin Fu. Plutus: Scalable secure file sharing on untrusted storage.
In Proceeding of the 2nd Conference on File and Storage Technologies -
FAST 2003. USENIX, 2003.
[15] Joseph A. Cooley, Jeremy L. Mineweaser, Leslie D. Servi, and Eushiuan
T. Tsung. Software-based erasure codes for scalable distributed
storage. In IEEE Symposium on Mass Storage Systems, pages 157–164,
2003.
[16] Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, and
Julien P. Stern. Scalable secure storage when half the system is faulty.
Information and Computation., 174(2):203–213, 2002.
[17] Mario Blaum, Jim Brady, Jehoshua Bruck, and Jai Menon. Evenodd:
An efficient scheme for tolerating double disk failures in raid architectures.
IEEE Transactions on Computers, 44(2):192–202, 1995.
[18] Chih-Shing Tau and Tzone-I Wang. An alternative decoding algorithm
for evenodd code in raid architectures. In Proceedings of the 21st In-
ternational Multi-Conference on Applied Informatics - AI 2003, pages
887–892. IASTED/ACTA Press, 2003.
[19] Cheng Huang and Lihao Xu. Star : An efficient coding scheme for correcting
triple storage node failures. IEEE Transactions on Computers,
57:889–901, 2007.
[20] Michael G. Luby, Michael Mitzenmacher, M. Amin Shokrollahi,
Daniel A. Spielman, and Volker Stemann. Practical loss-resilient codes.
In Proceedings of the twenty-ninth annual ACM symposium on Theory
of computing - STOC 1997, pages 150–159. ACM, 1997.
[21] Michael Luby. Tornado codes: Practical erasure codes based on random
irregular graphs. In Proceedings of Randomization and Approxima-
tion Techniques in Computer Science, Second International Workshop
- RANDOM 1998, volume 1518 of Lecture Notes in Computer Science,
page 171. Springer, 1998.
[22] MatthewWoitaszek and Henry M. Tufo. Tornado codes for maid archival
storage. Mass Storage Systems and Technologies, IEEE / NASA God-
dard Conference on, 0:221–226, 2007.
[23] James S. Plank and Michael G. Thomason. A practical analysis of lowdensity
parity-check erasure codes for wide-area storage applications.
pages 115–124, 2004.
[24] Peter Druschel and Antony I. T. Rowstron. PAST: A large-scale, persistent
peer-to-peer storage utility. In Proceedings of the 8th Workshop
on Hot Topics in Operating Systems - HotOS-VIII 2001, pages 75–80.
IEEE Computer Society, 2001.
[25] Andreas Haeberlen, Alan Mislove, and Peter Druschel. Glacier: Highly
durable, decentralized storage despite massive correlated failures. In
Proceedings on the 2nd Symposium on Networked Systems Design and
Implementation - NSDI 2005. USENIX, 2005.
[26] Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim
Weatherspoon, M. Frans Kaashoek, John Kubiatowicz, and Robert Morris.
Efficient replica maintenance for distributed storage systems. In
Proceedings on the 3rd Symposium on Networked Systems Design and
Implementation - NSDI 2006. USENIX, 2006.
[27] Patrick R. Eaton, Hakim Weatherspoon, and John Kubiatowicz. Efficiently
binding data to owners in distributed content-addressable storage
systems. In Proceedings of the 3rd International IEEE Security in
Storage Workshop - SISW 2005, pages 40–51. IEEE Computer Society,
2005.
[28] Jeremy Stribling, Jinyang Li, Isaac G. Councill, M. Frans Kaashoek,
and Robert Morris. Overcite: A distributed, cooperative citeseer. In
Proceedings on the 3rd Symposium on Networked Systems Design and
Implementation - NSDI 2006. USENIX, 2006.
[29] Emil Sit, Robert Morris, and M. Frans Kaashoek. Usenetdht: A lowoverhead
design for usenet. pages 133–146, 2008.
[30] Emil Sit Andreas, Andreas Haeberlen, Frank Dabek, Byung gon Chun,
Hakim Weatherspoon, Robert Morris, M. Frans Kaashoek, and John
Kubiatowicz. Proactive replication for data durability. In Proceedings
of the 5th International Workshop on Peer-to-Peer Systems - IPTPS
2006, 2006.
[31] Alessandro Duminuco, Ernst Biersack, and Taoufik En-Najjary. Proactive
replication in distributed storage systems using machine availability
estimation. In Proceedings of the ACM Conference on Emerging Network
Experiment and Technology - CoNEXT 2007, page 27. ACM, 2007.
[32] Szymon Acedanski, Supratim Deb, Muriel Medard, and Ralf Koetter.
How good is random linear coding based distributed network storage.
In Proceeding of IEEE International Symposium on Network Coding -
NetCod 2005, 2005.
[33] Alexandros G. Dimakis, Vinod Prabhakaran, and Kannan Ramchandran.
Ubiquitous access to distributed data in large-scale sensor networks
through decentralized erasure codes. In Proceedings of the Fourth
International Symposium on Information Processing in Sensor Networks
- IPSN 2005, pages 111–117. IEEE Computer Society, 2005.
[34] Alexandros G. Dimakis, Vinod Prabhakaran, and Kannan Ramchandran.
Decentralized erasure codes for distributed networked storage.
IEEE/ACM Transactions on Networking, 14:2809–2816, 2006.
[35] Salah A. Aly, Zhenning Kong, and Emina Soljanin. Fountain codes
based distributed storage algorithms for large-scale wireless sensor net-
works. In Proceedings of the 7th International Conference on Informa-
tion Processing in Sensor Networks - IPSN 2008, pages 171–182. IEEE
Computer Society, 2008.
[36] Zooko Wilcox-O’Hearn and Brian Warner. Tahoe: the least-authority
filesystem. In Proceedings of the 4th ACM international workshop on
Storage security and survivability - StorageSS 2008, pages 21–26. ACM,
2008.
[37] Salah A. Aly, Zhenning Kong, and Emina Soljanin. Raptor codes based
distributed storage algorithms for wireless sensor networks. CoRR,
abs/0903.0445, 2009.
[38] Zhenning Kong, Salah A. Aly, and Emina Soljanin. Decentralized coding
algorithms for distributed storage in wireless sensor networks. IEEE
Journal on Selected Areas in Communications, 28(2):261–267, 2010.
[39] Amin Shokrollahi. Raptor codes. IEEE/ACM Transactions on Network-
ing, 14(SI):2551–2567, 2006.
[40] Dejan Vukobratovic, ˇ Cedomir Stefanovic, Miloˇs Stojakovic, and
Vladimir Stankovic. Raptor packets: a packet-centric approach to distributed
raptor code design. In Proceedings of the 2009 IEEE inter-
national conference on Symposium on Information Theory - ISIT’09,
pages 2336–2340. IEEE Press, 2009.
[41] John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis
Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon,
Westly Weimer, Christopher Wells, and Ben Zhao. Oceanstore: An architecture
for global-scale persistent storage. In Proceedings of the 9th in-
ternational Conference on Architectural Support for Programming Lan-
guages and Operating Systems - ASPLOS 2000, pages 190–201. ACM,
2000.
[42] Ranjita Bhagwan Kiran, Kiran Tati, Yu chung Cheng, Stefan Savage,
and Geoffrey M. Voelker. Total recall: System support for automated
availability management. In Proceedings on the 31st Symposium on Net-
worked Systems Design and Implementation - NSDI 2003, pages 337–
350, 2004.
[43] Charles Blake and Rodrigo Rodrigues. High availability, scalable storage,
dynamic peer networks: Pick two. In HotOS, pages 1–6. USENIX,
2003.
[44] Rodrigo Rodrigues and Barbara Liskov. High availability in dhts: Erasure
coding vs. replication. In Proceedings on the 4th International
Workshop on Peer-to-Peer Systems IV - IPTPS 2005, volume 3640 of
Lecture Notes in Computer Science, pages 226–239. Springer, 2005.
[45] Chris Williams, Philippe Huibonhoa, JoAnne Holliday, Andy Hospodor,
and Thomas Schwarz. Redundancy management for p2p storage. In Pro-
ceedings on the IEEE International Symposium on Cluster Computing
and the Grid, pages 15–22. IEEE Computer Society, 2007.
[46] Ranjita Bhagwan, Stefan Savage, and Geoffrey M. Voelker. Understanding
availability. In Proceedings of the 2nd International Workshop on
Peer-to-Peer Systems, volume 2735 of Lecture Notes in Computer Sci-
ence, pages 256–267. Springer Berlin / Heidelberg, 2003.
[47] Server Protectors LLC. Secure cloud storage.
http://serverprotectors.com/solutions/secs.
[48] Paulo S. L. M. Barreto, Ben Lynn, and Michael Scott. Efficient implementation
of pairing-based cryptosystems. Journal of Cryptology,
17(4):321–334, 2004.
[49] Victor S. Miller. The weil pairing, and its efficient calculation. Journal
of Cryptology, 17(4):235–261, 2004.
[50] Rajeev Motwani and Prabhakar Raghavan. Cambridge University Press,
1995.
[51] Piotr Szczechowiak, Anton Kargl, Michael Scott, and Martin Collier.
On the application of pairing based cryptography to wireless sensor networks.
In Proceedings of the Second ACM Conference on Wireless Net-
work Security - WISEC 2009, pages 1–12. ACM, 2009.
[52] Craig Gentry. Fully homomorphic encryption using ideal lattices. In
Proceedings of the 41st annual ACM symposium on Theory of computing
- STOC 2009, pages 169–178, 2009.
[53] Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan.
Fully homomorphic encryption over the integers. Cryptology ePrint
Archive, Report 2009/616, 2009.
[54] Brett Hemenway and Rafail Ostrovsky. Public-key locally-decodable
codes. In Proceedings of the 28th Annual International Cryptology Con-
ference on Advances in Cryptology - CRYPTO 2008, volume 5157 of
Lecture Notes in Computer Science, pages 126–143. Springer, 2008.
[55] Craig Gentry. Fully homomorphic encryption using ideal lattices. In
Proceedings of the 41st annual ACM symposium on Theory of computing
- STOC 2009, pages 169–178. ACM, 2009.
[56] N.P. Smart and F. Vercauteren. Fully homomorphic encryption with
relatively small key and ciphertext sizes. Cryptology ePrint Archive,
Report 2009/571, 2009.
[57] Ari Juels and Burton S. Kaliski Jr. Pors: Proofs of retrievability for
large files. pages 584–597, 2007.
[58] Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea
Kissner, Zachary Peterson, and Dawn Song. Provable data possession
at untrusted stores. In Proceedings of the 14th ACM Conference on
Computer and communications security - CCS 2007, pages 598–609.
ACM, 2007.
[59] Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene
Tsudik. Scalable and efficient provable data possession. In Proceedings
of the 4th International Conference on Security and privacy in commu-
nication netowrks - SecureComm 2008, pages 1–10. ACM, 2008.
[60] Reza Curtmola, Osama Khan, and Randal Burns. Robust remote data
checking. In Proceedings of the 4th International Workshop on Storage
Security and Survivability - StorageSS 2008, 2008.
[61] Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia,
and Nikos Triandopoulos. Athos: Efficient authentication of outsourced
file systems. In Proceedings on the 11th International Conference on
Information Security - ISC 2008, volume 5222 of Lecture Notes in Com-
puter Science, pages 80–96. Springer, 2008.
[62] C. Christopher Erway, Alptekin Kup??u, Charalampos Papamanthou,
and Roberto Tamassia. Dynamic provable data possession. In ACM
Conference on Computer and Communications Security, pages 213–222.
ACM, 2009.
[63] Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. Enabling
public verifiability and data dynamics for storage security in cloud computing.
In Proceedings of the 14th European Symposium on Research in
Computer Security - ESORICS 2009, volume 5789 of Lecture Notes in
Computer Science, pages 355–370. Springer, 2009.
[64] Reza Curtmola, Osama Khan, Randal Burns, and Giuseppe Ateniese.
Mr-pdp: Multiple-replica provable data possession. In Proceedings of
International Conference on Distributed Computing Systems, pages 411–
420. IEEE Computer Society, 2008.
[65] Hovav Shacham and Brent Waters. Compact proofs of retrievability.
In Proceedings of the 14th International Conference on the Theory
and Application of Cryptology and Information Security - ASIACRYPT
2008, volume 5350 of Lecture Notes in Computer Science, pages 90–107.
Springer, 2008.
[66] Yevgeniy Dodis, Salil P. Vadhan, and Daniel Wichs. Proofs of retrievability
via hardness amplification. In Proceeding of the 6th Theory
of Cryptography Conference on Theory of Cryptography - TCC 2009,
volume 5444 of Lecture Notes in Computer Science, pages 109–127.
Springer, 2009.
[67] Giuseppe Ateniese, Seny Kamara, and Jonathan Katz. Proofs of storage
from homomorphic identification protocols. In Proceedings of the 15th
International Conference on the Theory and Application of Cryptology
and Information Security- ASIACRYPT 2009,, volume 5912 of Lecture
Notes in Computer Science, pages 319–333. Springer, 2009.
[68] CongWang, QianWang, Kui Ren, andWenjing Lou. Privacy-preserving
public auditing for data storage security in cloud computing. In Pro-
ceedings of the 28th IEEE International Conference on Computer Com-
munications - INFOCOM 2009. IEEE, 2010.
[69] Kevin D. Bowers, Ari Juels, and Alina Oprea. Hail: a high-availability
and integrity layer for cloud storage. In Proceedings of the 2009 ACM
Conference on Computer and Communications Security - CCS 2009,
pages 187–198. ACM, 2009.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top