跳到主要內容

臺灣博碩士論文加值系統

(3.231.230.177) 您好!臺灣時間:2021/07/28 22:41
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:許育魁
研究生(外文):HSU,Yu-Kuei
論文名稱:建構以代理人為基礎之雲端運算服務的單一登入機制
論文名稱(外文):Constructing an Agent-based Single Sign-On Scheme for Cloud Computing Services
指導教授:曹偉駿曹偉駿引用關係
指導教授(外文):Tsaur,Woei-Jiunn
口試委員:曹偉駿曾育民楊豐兆
口試委員(外文):Tsaur,Woei-JiunnTseng,Yuh-MinYang,Feng-Chao
口試日期:2012-06-27
學位類別:碩士
校院名稱:大葉大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:64
中文關鍵詞:雲端運算行動代理人單一登入資訊安全
外文關鍵詞:Cloud computingMobile agentSingle sign-onInformation security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:234
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
目前,雲端服務已有數百個,而使用者只須要註冊一組帳號密碼,就能隨時隨地透過瀏覽器,在各雲端服務平台存取服務。雲端雖然帶來諸多好處,然而,讓使用者擔心的,就是如何確保資料的安全性與機密性。由國際聯盟OASIS制定的安全宣告標記語言 (Security Assertion Markup Language, SAML)標準,結合了雲端服務單一登入的功能,系統利用重新導向到認證伺服器的方法來達到認證的目的,其做法除了增加主機端之負載以及網路的流量與頻寬的浪費外,在安全上容易遭受重送攻擊及中間人攻擊之風險,因此,很容易造成機密資料與個人隱私的曝露。
本論文之主要目的在於透過安全代理人平台與雲端服務進行整合,並建置出在信任模式下之單一登入系統。透過行動代理人本身之自發性攜帶使用者的資訊,讓使用者與主機間的溝通次數減少,以避免遭受駭客及其他惡意攻擊,提高在雲端服務環境之單一登入安全性並保護使用者的帳戶隱私內容,減少分散式環境中網路流量,進而使得整體服務及效能更加流暢。
Nowadays, there are hundreds of cloud services, and users just need to register with one account and password and then they can use browsers to access services in each platform at any time. Although the cloud system can bring a lot of advantages, users still worry about how they can ensure the information security and confidentiality. The international alliance OASIS sets up the standard of the security assertion markup language, which combines the function about single sign-on that uses the way of redirecting to the authentication server to achieve authentication, but its operation not only increases the load of servers and consume huge bandwidth, but also is vulnerable to the replay and man-in-the-middle attacks. In such a way, it will not be able to protect confidential information and personal privacy.
The main purpose in this thesis is to integrate the secure agent platform and cloud services to build a single sign-on system in the trust mode. Through the way of carrying users’ information by mobile agents to let the times of communication between a user and the host be reduced, the proposed scheme can avoid a variety of malicious attacks. In summary, the proposal scheme can enhance the security of single sign-on in cloud service environments and protect users’ privacy, reduce the network traffic in distributed environments, and thus make all services and efficiency better.
內容目錄

中文摘要                       iii
英文摘要                       iv
致謝辭                        vi
內容目錄                       vii
表目錄                        ix
圖目錄                        x
第一章 緒論
    第一節 研究背景與動機            1
    第二節 研究目的               2
    第三節 研究流程               2
    第四節 研究架構               4
第二章 文獻探討
    第一節 雲端運算安全             5
    第二節 雲端單一登入             12
    第三節 行動代理人               21
第三章 研究方法
    第一節 系統架構               26
    第二節 系統流程               28
第四章 安全性與效能分析
    第一節 安全性分析              34
    第二節 效能比較               36
    第三節 綜合比較               36
第五章 系統實作與模擬
    第一節 硬體架構               39
    第二節 工具軟體架構             39
    第三節 系統設計流程             40
    第四節 程式執行畫面             53
第六章 結論與未來發展方向
    第一節 結論                 57
    第二節 未來發展方向             58
參考文獻                     59

1.M. A. AlZain, E. Pardede, B. Soh and J. A. Thom, “Cloud Computing Security: From Single to Multi-Clouds,” in Proceedings of 2012 45th Hawaii International Conference on System Science (HICSS), pp. 5490-5499, 2012.
2.A. Armando, R. Carbone, Luca Compagna, J. Cuellar and Llanos Tobarra, “Formal Analysis of SAML 2.0 Web Browser Single Sign-On:Breaking the SAML-based Single Sign-On for Google Apps,” in Proceedings of the 6th ACM workshop on Formal methods in security engineering, 2008.
3.R. Aversa, B. D. Martino, M. Rak and S. Venticinque, “Cloud Agency: A Mobile Agent Based Cloud System,” in Proceedings of 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 132-137, 2010.
4.J. Bellamy-McIntyre, C. Luterroth and G. Weber, “OpenID and the Enterprise:A Model-based Analysis of Single Sign-On Authentication,” in Proceedings of 2011 15th IEEE International Enterprise Distributed Object Computing Conference, pp. 129-138, 2011.
5.A. Boldyreva and V. Kumar “Provable-security Analysis of Authenticated Encryption in Kerberos,” IET Information Security, vol. 5, pp. 207-219, 2011.
6.A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Federation Establishment Between CLEVER Clouds Through a SAML SSO Authentication Profile,” International Journal on Advances in Internet Technology, vol 4, pp. 14-27, 2011.
7.A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication,” 2010 Second International Conference on Advances in Future Internet, pp. 94-101, 2010.
8.C. C. Chang and C. Y. Lee, “A Secure Single Sign-on Mechanism for Distributed Computer Networks,” IEEE Transactions on Industrial Electronics, Vol. 59, No. 1, PP. 629-637, 2012.
9.G. Chen, J. Lu, J. Huang and Z. Wu, “SaaAS - The Mobile Agent based Service for Cloud Computing in Internet Environment,” in Proceedings of 2010 Sixth International Conference on Natural Computation (ICNC 2010), pp. 2935-2939, 2010.
10.C. T. Fan, W. J. Wang and Y. S. Chang, “Agent-Based Service Migration Framework in Hybrid Cloud,” in Proceedings of 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 887-892, 2011.
11.J. Fang and X. Meng “Application Investigation on Private Cloud in the Field of Group Company Financial Information Management,” in Proceedings of 2011 International Conference on Mechatronic Science, Electric Engineering and Computer, pp. 1926-1929, 2011.
12.N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho, M. Simplicio, M. Naslund and M. Pourzandi, “A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing,” in Proceedings of 2011 Third IEEE International Conference on Coud Computing Technology and Science, pp. 231-238, 2011.
13.B. Grobauer, T. Walloschek and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” IEEE Security & Privacy, vol. 9, pp. 50-57, 2011.
14.I. Moise, M. Hurfin, L. Zeghache and B. Nadjib, “Cloud-Based Support for Transactional Mobile Agents,” in Proceedings of 2011 Workshops of International Conference on Advanced Information Networking and Applications, pp. 190-197, 2011.
15.K. Mukherjee and G. Sahoo “A Secure Cloud Computing,” in Proceedings of 2010 International Conference on Recent Trends in Information,Telecommunication and Computing (ITC), pp. 269-271, 2010.
16.H. K. Oh and S. H. Jin “The Security Limitations of SSO in OpenID,” in Proceedings of ICACT 2008. 10th International Conference on Advanced Communication Technology, vol. 3, pp. 1608-1611, 2008.
17.T. Orawiwattanakul, K. Yamaji, M. Nakamura, T. Kataoka and N. Sonehara, “User-controlled Privacy Protection with Attribute-filter Mechanism for a Federated SSO Environment using Shibboleth,” in Proceedings of 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 243-249, 2010.
18.G. Papuzzo and G. Spezzano “Autonomic Management of Workflows on Hybrid Grid-Cloud Infrastructure,” in Proceedings of 2011 7th International Conference on Network and Service Management (CNSM), pp. 1-4, 2011.
19.S. K. Pippal, A. Kumari and D. S. Kushwaha, “CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds,” in Proceedings of 2011 2nd International Conference on Computer & Communication Technology (ICCCT), pp. 444-449, 2011.
20.L. N. G. Paredes and S. D. Zorzo, “Privacy Mechanism for Applications in Cloud Computing,” IEEE Latin America Transactions, Vol. 10, No. 1, pp. 1402-1407, 2012.
21.A. Ramaswamy, A. Balasubramanian, P. Vijaykumar, V. P, “A Mobile Agent based Approach of Ensuring Trustworthiness in the Cloud,” in Proceedings of 2011 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 678-682, 2011.
22.A. G. Revar and M. D. Bhavsar “Securing User Authentication using Single Sign-On in Cloud Computing,” in Proceedings of 2011 Nirma University International Conference on Engineering (NUiCONE), pp. 1-4, 2011.
23.F. Rocha, S. Abreu and M. Correia, “The Final Frontier: Confidentiality and Privacy in the Cloud,” IEEE Computer Society, Vol. 44, pp. 40-50, 2011.
24.K. Sim, “Agent-based Cloud Computing,” IEEE Transactions on Services Computing, 2011.
25.S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, Vol. 34, pp. 1-11, 2011.
26.A. Tripathi and A. Mishra, “Cloud Computing Security Considerations,” in Proceedings of 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1-5, 2011.
27.W. J. Tsaur, “Secure Communication for Electronic Business Applications in Mobile Agent Networks,” Expert Systems With Applications, Vol. 39, No. 1, pp. 1047-1055, 2012.
28.W. J. Tsaur and L. Y. Yeh, “A Novel Mobile Agent Authentication Scheme for Multi-host Environments Using Self-certified Pairing-based Public Key Cryptosystem,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 5(A), pp. 2389-2404, 2011.
29.W. J. Tsaur and Y. M. Lin, “An Agent-based Single Sign-On Scheme for Web Services Environments,” in Proceedings of the 2009 International Conference on Security and Management (SAM’09), Vol. I, pp. 220-226, 2009.
30.P. Zhang, H. Sun and Z. Yan, “Building up Trusted Identity Management in Mobile Heterogeneous Environment,” in Proceedings of 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 873-877, 2011.
31.M. Zhou, R. Zhang, W. Xie, W. Qian and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” in Proceedings of 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105-112, 2010.
32.D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, Vol. 28, pp. 583-592, 2012.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊