跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/06 18:22
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:吳政勳
研究生(外文):Cheng-hsun Wu
論文名稱:植基於雲端架構下設計一種緊急回應及求救系統
論文名稱(外文):Based on Cloud Computing Architecture to Design An Emergency Response and SOS System
指導教授:陳金鈴陳金鈴引用關係
指導教授(外文):Chin-ling Chen
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:45
中文關鍵詞:RFC 2631代理簽章雲端運算對稱式加密訊息驗證碼Schnorr 簽章
外文關鍵詞:proxy signatureCloud computingSchnorr signaturesymmetric encryptionMACRFC 2631
相關次數:
  • 被引用被引用:1
  • 點閱點閱:306
  • 評分評分:
  • 下載下載:13
  • 收藏至我的研究室書目清單書目收藏:1
近年來,在許多國家中,登山運動越來越普及化,但卻存在著許多登山客因為登山而遭遇危險之問題。因此,我們提出一種基於雲端運算的架構設計一套以快速回應SOS急救之突發事件發生之應變系統。我們基於雲端運算建立一種急救平台,並且結合移動通訊設備的移動性以及方便通訊之特性,受傷人員可以快速的送出SOS訊息給幫助者。此架構為基於 Schnorr 簽章方法讓受傷人員可以透過代理授權給幫助者的方式向醫院提出掛號,在方法中也整合了對稱式加密技術、訊息驗證碼以及 RFC 2631來抵擋已知的攻擊,並且達到代理簽章的相關安全需求。最後,我們分析運算和通訊成本來證明我們的系統適合應用在一個緊急事件回報及求救系統中。
In recent years, the sport of mountaineering has become more and more popular in many countries, and people may encounter danger when mountaineering. In this paper, we propose a cloud-computing-based architecture to respond rapidly to an SOS emergency event requiring first aid. Our scheme constructed an aid platform based on cloud computing. Based on the features of mobile devices, such as mobility and convenient communication, the injured party/patient can quickly send an SOS to the helper. The proposed scheme can accomplish the proxy authorization of the Schnorr signature from the patient. It also integrates symmetric encryption technology, message authentication code (MAC), and RFC 2631 to defend against known attacks, and achieve the security requirements provided by proxy signature. Finally, we analyze the performance cost to determine whether our scheme is suitable for implementation in an emergency response and SOS system.
TABLE OF CONTENTS
致謝 ...................................................................................................................... V
中文摘要 ........................................................................................................... VII
ABSTRACT ................................................................................................... VIII
TABLE OF CONTENTS .................................................................................. IX
LIST OF TABLES ............................................................................................. XI
LIST OF FIGURES ......................................................................................... Chapter 1 Introduction ....................................................................................... 1
1.1 Background ......................................................................................... 1
1.2 The research motives ......................................................................... 2
1.3 Reviewing the Schnorr signature ...................................................... 6
Chapter 2 Our protocol ....................................................................................... 8
2.1 Construct session key model ........................................................... 12
2.2 Registration phase ............................................................................ 13
2.3 Login phase ....................................................................................... 15
2.4 Delegation phase ............................................................................... 16
2.5 Signing and verification phase ........................................................ 19
2.6 Password change phase ................................................................... 23
Chapter 3 Security analysis .............................................................................. 25
3.1 Defend against known attacks ........................................................ 25
3.1.1 Defend tampering attack ....................................................... 25
3.1.2 Defend denial-of-service (DoS) attack ................................. 26
3.1.3 Defend replay attack .............................................................. 26
3.1.4 Defend man-in-the-middle attack ........................................ 27
3.1.5 Defend password guessing attack ......................................... 27
3.1.6 Defend mobile device lost attacks ......................................... 28
3.2 Verifiability issue .............................................................................. 28
3.3 Unforgeability issue .......................................................................... 29
3.4 Non-repudiation issue ...................................................................... 29
3.5 Non-designated issue ........................................................................ 31
3.6 Identifiability issue ........................................................................... 31
3.7 Privacy revocation issue .................................................................. 32
Chapter 4 Performance analysis ...................................................................... 33
4.1 To compare cloud server with general server ................................ 37
Chapter 5 Conclusions ...................................................................................... 39
References .......................................................................................................... 41
Appendix 作者簡介 .......................................................................................... 45
LIST OF TABLES
Table 1 The non-repudiation proofs of each phase ........................................ 30
Table 2 The computation cost of our scheme .................................................. 33
Table 3 The communication cost of WiMAX part ......................................... 36
Table 4 The communication cost of the Ethernet part .................................. 36
Table 5 To compare cloud server and general server .................................... 37
LIST OF FIGURES
Figure 1 Cloud computing types ........................................................................ 3
Figure 2 The architecture of our scheme .......................................................... 9
Figure 3 Overview of the registration phase ................................................... 14
Figure 4 Overview of the login phase .............................................................. 15
Figure 5 Overview of the delegation phase ..................................................... 17
Figure 6 Overview of the signing and verification phase .............................. 20
[1]Sport England: Primary Offer Data Information Pack for Mountaineering, website: http://www.sportengland.org/, Access available 5/31/2011.
[2]Chinese Taipei Mountaineering Association, website: http://www.alpineclub.org.tw/tier/front/bin/ptdetail.phtml?Part=tmd-2&Category=100106706, Access available 6/14/2011.
[3]M.A.Vouk, “Cloud Computing – Issues, Research and Implementations,” IEEE International Conference on Information technology Interfaces, 2008, pp. 31-40.
[4]K. Beaty, A. Kochut and H. Shaikh, “Desktop to Cloud Transformation Planning,” IEEE International Symposium on, Parallel & Distributed Processing, 2009, pp. 1-8.
[5]B. Ohlman, A. Eriksson and R. Rembarz, “What Networking of Information Can Do for Cloud Computing,” IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009, pp. 78-83.
[6]Sun Microsystems, Inc. “Introduction to Cloud Computing Architecture,” website: http://webobjects.cdw.com/webobjects/media/pdf/Sun_Cloud Computing.pdf, Access available 6/14/2011.
[7]H. Li, J. Sedayao, J. Hahn-Steichen, E. Jimison, C. Spence and S. Chahal, “Developing An Enterprise Cloud Computing Strategy,” Intel Corporation, 2009, pp. 1-16.
[8]P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, 2009, pp.1-2.
[9]I. Muttik and Chris. Barton, “Cloud Security Technologies,” Information Security Technical Report, 2009, pp. 1-6.
[10]W. Itani, A. Kayssi, and A. Chehab, Privacy as a Service Privacy-Aware Data Storage and Processing in Cloud Computing Architectures, IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 711-716.
[11]K. Hwang, S. Kulkareni, and Y. Hu, “Cloud Security with Virtualized Defense and Reputation-Based Trust Management,” IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 717-722.
[12]S. Berger, R. Caceres, K. Goldman, D. Pendarakis, R. Perez, J.R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez “Security for the Cloud Infrastructure-Trusted Virtual Data Center Implementation,” IBM Journal of Research and Development, 2009, Vol. 53, pp. 6:1-6:12.
[13]M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signature: Delegation of the Power to Sign Message,” In IEICE Trans. Fundamentals, 1996, Vol. E79-A, No. 9, pp. 1338-1353.
[14]B. Lee, H. Kim, and K. Kim, “Strong Proxy Signature and Its Application,” Proceedings of SCIS2001, 2001, pp. 603–608.
[15]C.P. Schnorr, “Efficient Signature Generation by Smart Cards,” Journalofcryptology, 1991, Vol. 4, No. 3, pp161–174.
[16]B. Lee, H. Kim and K. Kim, “Strong Proxy Signature and Its Applications,” International Conference in Information and Communications Security, Lecture Notes in Computer Science, 2001, pp. 223–232.
[17]R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Magazine Communications of the ACM, 1978, Vol. 21. pp. 120–126.
[18]T. ElGamal, “A Public-Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, 1985, Vol. 31, pp. 469–472.
[19]W. Diffie and M.E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, 1976, Vol. 22, pp. 644–654.
[20]Internet Engineering Task Force (IETF) Working Group, “Diffie–Hellman Key Agreement Method (RFC 2631), 1999, website: http://www.ietf.org/rfc/rfc2631.txt, Access available 6/14/2011.
[21]HTC product, 2011, website: http://www.htc.com/hk-en/product/desirehd/ specification. html, Access available 6/14/2011.
[22]M. F. Finneran dBrn Associates, Inc, “WiMax Versus Wi-Fi,”2001, website:http://media.techtarget.com/searchMobileComputing/downloads/Finneran.pdf, Access available 6/14/2011.
[23]LAN/MAN Standards Committee of the IEEE computer Society,“802.3ba-2010 IEEE Standard for Information technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Amendment 4: Media Access Control Parameters, Physical Layers and Management Parameters for 40 Gb/s and 100 Gb/s Operation,” 2010, pp. 1-457.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 張國恩(1999),資訊科技融入各科教學之內涵與實施。資訊與教育雜誌,72,2-9。
2. 邱炯友(2000),電子出版的歷史與未來,佛教圖書館館訊,23,6-17。
3. 張基成、王秋錳(2008),台北市高職教師資訊科技融入教學之影響因素,教育實踐與研究月刊,21(1),97-132。
4. 何榮桂(2002),臺灣資訊教育的現況與發展—兼論資訊科技融入教學,資訊與教育雜誌,87,22-31。
5. 李彥甫(2002),數位內容驅動的力量,通訊雜誌,98,89-91。
6. 王全世(2000),對資訊科技融入各科教學之資訊情境的評估標準,資訊與教育雜誌,77,36-46。
7. 陳景堯(2000),電子書-給閱讀一個新定義,天下雜誌,224,32。
8. 陳昭珍(2004),數位出版發展現況與趨勢研究,圖書館學與資訊科學 30(2), 107-115。
9. 黃寶心(2001),「挑戰閱讀史--電子書破繭而出」,網際先鋒,83,82-87。
10. 程蘊嘉(2006),圖書館電子書使用與產業現況,全國新書資訊月刊,90,10-13。
11. 程蘊嘉(2002),網路時代的新閱讀風貌-電子書,全國新書資訊月刊,42,8-11。
12. 顏永進、何榮桂(2001),資訊科技融入健康與體育領域教學,教師天地,112,71-77。
13. 鄧振源、曾國雄(1989),「層級分析法的內涵特性與應用上」,中國統計學報,27(6),5-22。
14. 李宗派(2004)。老化理論與老人保健。身心障礙研究 Vol2, No.23.。
15. 林正祥、陳佩含、林惠生(2010)。臺灣老人憂鬱狀態變化及其影響因子。人口學刊,41,67-109。