(35.175.212.130) 您好!臺灣時間:2021/05/17 20:22
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:陳適怡
研究生(外文):Shih-Yi Chen
論文名稱:一個基於點對點網路的備份系統之金鑰管理方案
論文名稱(外文):A Key Management Scheme for Backup System Based on P2P Network
指導教授:李維斌李維斌引用關係
指導教授(外文):Wei-Bin Lee
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:27
中文關鍵詞:金鑰管理安全的備份系統點對點網路
外文關鍵詞:key managementP2P networksecure backup system
相關次數:
  • 被引用被引用:0
  • 點閱點閱:284
  • 評分評分:
  • 下載下載:43
  • 收藏至我的研究室書目清單書目收藏:0
近年來,許多整合點對點網路機制的備份系統陸續被提出,以期達到系統的負載平衡、高延展性以及低成本的好處。當私密資料透過點對點網路被散佈到其他電腦,保護資料在遠端不被竊取以及確保資料可以在未遭竄改的情況下取回,將會是使用者所關注的。換而言之,檔案的機密性與完整性在這個環境下是決絕對必要的。我們可以直接的利用現有的保密與數位簽章機制來保護檔案以達到這些安全性需求。然而在這樣的場景中,如何管理密碼系統中的秘密金鑰才是真正須要考慮的問題。因此這篇論文提出一個名為IC-Lock的金鑰管理方案,希望藉此有效率的管理私密金鑰以達到遠端備份檔案的機密性與完整性,確保點對點備份系統之安全性。
Recently, several backup approaches applying P2P (Peer-to-Peer) mechanisms are introduced to gain the benefits of load-balance, high scalability as well as low cost. When secret data is reserved throughout P2P network, it is crucial to protect the secrets from eavesdropping in remote sides and guarantee files can be retrieved without modification. That is, the confidentiality and integrity of files are both necessary. Hence, we can easily adopt encryption to assure the confidentiality and sign the files to assure the integrity. However, the real problem behind such a scenario is how the corresponding cryptographic keys are managed. Therefore, an efficient cryptographic key management mechanism, called IC-Lock, is designed to guarantee the Integrity and the Confidentiality of the backups. In such a way, the security of the P2P based backup system can be assured with low cost.
Acknowledgements ii
中文摘要 iii
Abstract iv
Table of Contents v
List of Figures vii
List of Tables viii
Chapter 1 Introduction 1
1.1 Motivation 1
1.2 The requirements of a secure P2P backup system 2
Chapter 2 Background 4
2.1 Metadata in P2P 4
2.2 Distributed Hash Table (DHT) 4
2.3 Data redundancy 5
Chapter 3 Related works 7
Chapter 4 IC-Lock key management scheme 13
4.1 Backup phase 13
4.2 Retrieval phase 14
4.3 Remote deletion phase 16
Chapter 5 Discussions 18
5.1 Requirement achievement 18
5.2 Implementation consideration 20
5.2.1 Data block 20
5.2.2 Metadata management 21
5.2.3 Symmetric trading and reputation mechanism 21
5.2.4 Expiration date file deletion 22
5.3 Comparisons 22
Chapter 6 Conclusions 24
References 25
[1] Christopher Batten, Kenneth Barr, Arvind Saraf and Stanley Trepetin, “pStore: A Secure Peer-to-Peer Backup System,” Technical Report, LCS Technical Memo 632, MIT Laboratory for Computer Science, Dec 2001.
[2] M. O. Rabin. “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,” Journal of the ACM, Vol. 36, Issue 2, pp. 335-348, Apr 1989.
[3] Birgir Stefansson and Antonios Thodis, “MyriadStore: A Peer-to-Peer Backup System,” Technical Report, Master of Science Thesis Stockholm, Sweden, Jun 2006.
[4] Fernando Meira, “A P2P Backup System for Small and Medium-sized Enterprises,” Technical University of Denmark, Informatics and Mathematical Modelling, 2007.
[5] Andrew Tytula, “Peer-to-Peer File Sharing System Using An Information Dispersal Algorithm,” Carleton University Honours Projects, 2002.
[6] Martin Landers Han Zhang and Kian-Lee Tan, “PeerStore: Better Performance by Relaxing in Peer-to-Peer Backup,” Fourth International Conference on Peer-to-Peer Computing, pp. 72-79, Aug 2004.
[7] L. P. Cox and B. D. Noble., “Pastiche: Making Backup Cheap and Easy,” In Proceedings of Fifth ACM/USENIX Symposium on Operating Systems Design and Implementation, Vol. 36, Issue SI, pp. 285-298, Boston, MA, Dec 2002.
[8] P. Druschel, A. Rowstron. “PAST: A Large-scale, Persistent Peer-to-Peer Storage Utility,” In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS VIII), pp. 75-80, IEEE Computer Society Press, May 2001.
[9] J. Daemen and V. Rijmen, “Rijndael: The Advanced Encryption Standard,” Dr. Dobb''s Journal, Vol. 26, Issue 3, pp. 137-139, Mar 2001.
[10] Hakim Weatherspoon and John D. Kubiatowicz, “Erasure Coding Vs. Replication: A Quantitative Comparison,” Lecture Notes in Computer Science, Vol. 2429, pp. 328-337, Jan 2002.
[11] Lin W.K., Chiu D.M., Lee Y.B., “Erasure Code Replication Revisited,” Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P’04), pp. 90-97, 25-27 Aug 2004.
[12] R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, Issue 2, pp. 120-126, Feb 1987.
[13] Bittorrent Protocol Specification v1.0: http://wiki.theory.org/BitTorrentSpecification
[14] JXTA Protocols:
http://java.sun.com/developer/Books/networking/jxta/jxtap2pch03.pdf
[15] Giampaolo Bella, Costantino Pistagna and Salvatore Riccobene, “Distributed Backup through Information Dispersal,” Electronic Notes in Theoretical Computer Science, Vol. 142, pp. 63-77, Jan 2006
[16] A. Rowstron and P. Druschel, “Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-Peer Systems,” In IFIP/ACM International Conference on Distributed Systems Platforms, pp. 329-350, Heidelberg, Germany, Nov 2001.
[17] Adi Shamir, “How to Share A Secret,” Communications of the ACM, Vol. 22, Issue 11, pp. 612-613, Nov 1979.
[18] W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, “Feasibility of A Serverless Distributed File System Deployed on An Existing Set of Desktop PCs,” In Proceedings of the International Conference on Measurement and Modeling of Computer Systems, pp. 34-43, Santa Clara, CA, Jun 2000.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top