跳到主要內容

臺灣博碩士論文加值系統

(44.192.44.30) 您好!臺灣時間:2024/07/25 08:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:許智豪
研究生(外文):Jhih-Hao Syu
論文名稱:以門檻技術為基礎之可靠的異質雲行動儲存系統
論文名稱(外文):Reliable Heterogeneous Mobile Cloud Storage Based on Threshold Technology
指導教授:林峻立林峻立引用關係
學位類別:碩士
校院名稱:樹德科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:50
中文關鍵詞:雲端儲存門檻技術可靠性異質雲行動式
外文關鍵詞:Cloud StorageThresholdReliabilityHeterogeneous CloudMobile
相關次數:
  • 被引用被引用:0
  • 點閱點閱:146
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
因雲端運算的普及,造就了許多雲端服務產生,爰此雲端儲存服務,是近年來最具特色的服務之一。在雲端儲存服務尚未盛行前,一般都是將資料存在硬碟裡面,然因雲端儲技術的成熟,現今許多服務商紛紛推出別具心裁的雲端儲存服務,其優點如: (1) 上線無阻礙,只要有能夠上網的平台,即可立即連線或離線等功能 (2) 操作簡單方便,無須學習艱深的IT技術,亦無須更新或維修 (3) 適合用於開發應用程式,相關之服務商都會釋出開發之文件,以提供開發社群。 (4) 無須添購任何硬體,節省資金成本。綜上觀之,雲端儲存服務逐漸受到大眾之喜愛,亦愈來愈多之企業運用其來存放資料。

有鑒於此,各服務商之操作界面不盡相同,以致雲端儲存服務上之檔案出現了不便及安全性方面等疑慮,如將檔案存放在雲端儲存服務上的機密性 (Confidentiality)、以及服務中斷導致檔案遺失的可用性 (Availability),於此我們期望能創造出統一的操作平台,提高雲端儲存服務上檔案的機密性,且當某服務商之服務中斷而導致檔案遺失時,本系統能透過若干個服務商系統中的將其檔案復原。

本論文之參考文獻中以 Threshold 秘密分享演算法及WuKong異質雲儲存系統作為本論文系統架構之主軸。 Threshold 秘密分享演算法之運作方式係依使用者之設定,將機密內容分散成多塊且其不具意義的內容,倘沒有取回一定數量,則無法將其內容還原之。於Wukong中所建構的平台,其基礎架構能結合不同的雲端儲存服務所提供的資源,並可自訂基本的操作模式,將其不同操作平台加以整合,讓使用者易於存放資料。

本論文其針對文獻WuKong的方法及目前對於雲端儲存服務的疑慮提出幾點缺失,如檔案存放在雲端儲存服務上的機密性、服務中斷導致檔案遺失等。為了解決此類問題,運用文獻中所提及之Threshold秘密分享方法,加以解決使用者對於雲端儲存服務之不信任與資料之安全性,以及研究HDFS (Hadoop Distributed File System)分散式系統是如何將遺失或損毀的資料還原。於本研究的架構上提出將不同雲端儲存服務之API整合、運用Threshold之原理將檔案分散與還原來解決檔案之可用性,再加上密碼學對稱式加密來提高檔案之機密性等面向著手。綜上所言,將不同服務商之操作平台加以整合,提高使用者之操作便利性,並找尋更有效率的加密方法加以提高檔案的機密性和提高雲端儲存服務上檔案的可用性。

本系統的實作環境主要以行動裝置,其硬體規格為 CPU 1.6GHz 四核心處理器,2GB RAM 及 32GB ROM,系統環境為 Android 3.0 Honeycomb 以上。開發環境以 Eclipse Developer、Android SDK 、 Java JDK 1.6、DropBox Android SDK 1.5.4。資料庫系統為 SQLite

Due to the popularity of cloud computing, a lot of cloud services have created. Therefore, the cloud storage service is one of the most characteristic services in recent years. Before the cloud storage service has not been prevalent, the data generally exist inside the hard disk. However, because the aging of cloud storage technology, many today''s service providers have been offering unique conception of cloud storage services. Its advantages such as:
(1) On-line without hindrance: As long as accessing to the Internet, there are immediate features of on-line or off-line.
(2) Simple operation: Neither having to learn difficult IT technology nor need to update or repair.
(3) Suitable for the development of applications: Related service providers will release the development documents for development community.
(4) Without purchasing any hardware and save cost.
In summary, cloud storage services gradually are the general public''s favorite, also an increasing number of businesses use it to store data.
Consequently, the user interfaces of the service providers are different, so that the files on cloud storage services emerged inconvenience and safety concerns. For example, there are confidentiality problems of files stored in the cloud storage service, as well as the availability problem due to service interruptions resulting file missing. Therefore, we hope to create a unified operating platform to enhance the confidentiality of cloud file storage services. And if a service interruption resulting in missing files, the system can recover files through several service providers systems.

In this thesis, threshold secret sharing and WuKong heterogeneous cloud storage system are the thesis''s main frameworks. Threshold secret sharing depends on the user’s settings, scatter secret content into many a pieces and it doesn''t have any meaning. But if having not taken back definite framework can combine different cloud storage service resource. And users can set operating pattern independently, integrating with different operating platform, let the users be easy stocking data.
Therefore, this paper is aimed at Wukong''s way and present misgiving of cloud storage service suggest some hiatus, such as keep the file in the confidentiality of cloud storage service, service abort leads to file lose. For solving this kind of problem, utilize the method in this paper, for instance, threshold secret sharing to solve users’ mistrust and data safety with cloud storage service, and research HDFS now to restoration lose or destroy data. The framework of this research is integration of different cloud storage service''s API, scatter threshold''s principle to solve the file''s adaptability, and cryptographic symmetric encryption to increase confidentiality.
Finally, integrate various platform, increase users convenience and look for more efficient encryption method to increase file confidentiality and adaptability.
The implementation of this system is mainly in the mobile device environment, the hardware specifications includes CPU 1.6GHz quad-core processor, 2GB RAM and 32GB ROM, the system environment for the Android 3.0 Honeycomb or more. Development environment includes Eclipse Developer, Android SDK, Java JDK 1.6, DropBox Android SDK 1.5.4 and SQLite database system.


中文目錄 I
英文目錄 III
誌謝 VI
目錄 VII
表目錄 X
圖目錄 XI
一、緒論 1
1.1 研究背景 1
1.2 研究動機 2
1.3 研究目的與貢獻 3
1.4 論文架構 3
二、異質雲整合問題 5
2.1 雲端儲存異質雲 5
2.2 異質雲衍生的問題 6
2.3 異質雲整合 7
三、雲端儲存的可靠性 8
3.1 資料委外儲存的風險 8
3.2 集中與分散儲存的優勢 8
3.3 可靠的雲端儲存 10
四、相關研究 11
4.1 WUKONG異質雲整合系統 11
4.1.1 簡介 11
4.1.2 Storage Abstraction Layer抽象架構 14
4.2 THRESHOLD秘密分享機制 14
4.2.1 簡介 14
4.2.2 秘密分享演算法 15
五、系統架構 18
5.1 研究需求與目的 18
5.2 CONFIGURATION 機制 19
5.3 INTERFACE 操作架構 20
5.4 SYMMETRIC ENCRYPTION 安全性機制 21
5.5 THRESHOLD 資料分散架構 24
5.6 ABSTRACTION LAYER 整合API 之架構 25
六、安全與效率分析 27
6.1 安全性分析 27
6.1.1 可靠性 27
6.1.2 機密性 27
6.2 效率分析 27
6.2.1 儲存空間 27
6.2.2 運算效率 28
七、系統實作 30
7.1 系統環境與架構 30
7.1.1 系統環境 30
7.1.2 架構 30
7.1.3 操作概念 37
7.2 系統流程 40
7.2.1 Configuration Info and Abstraction Layer 40
7.2.2 Threshold Share and Join 41
7.2.3 Symmetric Encryption and Decryption 42
7.3 實作結果與分析 43
八、結論與未來展望 46
8.1 結論 46
8.2 未來展望 46
參考文獻 48
簡歷 50


[1]雲端運算,http://zh.wikipedia.org/wiki/雲端運算
[2]Build the power of Dropbox into your apps, https://www.dropbox.com/developers/
[3]Integrate your app with Google Drive, https://drive.google.com/
[4]Amazon Simple Storage Service (S3) Documentation, http://aws.amazon.com/s3/
[5]Welcome to Apache Hadoop,http://hadoop.apache.org/
[6]M. Huajian, X. Nong, S. Weisong, L. Yutong , “Wukong: A cloud-oriented file service for mobile Internet devices”, 2012, SDOL Comput in Conference, pp. 171-184.
[7]Shamir, A., “How to share a secret”, 1979, Communications of the ACM, pp. 612-613.
[8]鳥哥的Linux私房菜, http://linux.vbird.org/linux_basic/0420quota.php#raid
[9]Storage area network , http://en.wikipedia.org/wiki/Storage_area_network
[10]Shamir''s Secret Sharing, http://en.wikipedia.org/wiki/Shamir''s_Secret_Sharing
[11]Lagrange Polynomial ,http://en.wikipedia.org/wiki/Lagrange_polynomial
[12]高級加密標準,http://zh.wikipedia.org/wiki/高級加密標準
[13]RSA加密演算法, http://zh.wikipedia.org/wiki/RSA加密演算法
[14]Application Programming Interface, http://en.wikipedia.org/wiki/Application_programming_interface
[15]Skype, http://skype.pchome.com.tw/download.html
[16]Facebook, https://www.facebook.com/
[17]Youtube, http://www.youtube.com/?hl=zh-TW&;gl=TW
[18]Twitter,https://twitter.com/
[19]WindowsAzure,http://www.windowsazure.com/zh-tw/
[20]Google App Engine,https://developers.google.com/appengine/?hl=zh-tw
[21]Google Custom Search,http://www.google.com/cse/?hl=zh-TW
[22]Yahoo Boss, http://developer.yahoo.com/boss/search/
[23]Amazon CloudWatch,http://aws.amazon.com/cloudwatch/
[24]Rackspace,http://www.rackspace.com/
[25]Laih, Chi-Sung, Harn, Lein, and Chang, Chin-Chen., Contemporary. Cryptography and Its Applications, 2001, UNALIS CORPORATION.
[26]Z. Zhifang, C. Yeow Meng, L. San, L. Mulan. W. Huaxiong, Threshold changeable secret sharing schemes revisited, 2012, SDOL Comput in Conference,pp. 106-115.
[27]H. Wang, D.S. Wong, On secret reconstruction in secret sharing schemes, IEEE Trans. Inform. Theory, 2008, pp. 473–480
[28]H . Jemal. Abawajy, I. Syed Jami, A. Zubair Shaikh, A. Syed Hammad, A framework for scalable distributed provenance storage system, 2012, SDOL Comput in Conference, pp. 179-186.
[29]Android the world''s most popular mobile platform, http://developer.android.com/about/index.html
[30]史丹利部落格, http://stenlyho.blogspot.tw/2008/09/android-architecture.html


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top