跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.91) 您好!臺灣時間:2025/01/21 10:37
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:闕居樞
研究生(外文):Ju-Shu Chueh
論文名稱(外文):Design and Implementation of Security System for Cloud Storage
指導教授:孫敏德
指導教授(外文):Min-Te Sun
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:法文
論文頁數:56
中文關鍵詞:網路安全雲端儲存金鑰管理AES加密演算法
外文關鍵詞:Network SecurityCloud StorageKey ManagementAES
相關次數:
  • 被引用被引用:0
  • 點閱點閱:187
  • 評分評分:
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
雲端運算提供了各種服務以及儲存空間給使用者,這也幫助業者減少
管理以及維護儲存伺服器上的成本。但這種新型態的資料儲存服務的興起
也隨之帶來了資料安全上的疑慮,因為使用者無法全權控制儲存在雲端的
資料。目前提出的架構以及方法無法有效率的解決資訊安全上的問題且仍
然存在著其他隱憂。因此本篇論文中首先利用第三認證機制來設計出一個
三方架構以及提出了一套認證方式,再提出了一套加密金鑰管理系統以及
針對系統設計的資料結構來提升整體效率,此外本架構中也利用有效率的
加解密演算法來降低使用者端的運算時間,最後利用模擬以及分析結果來
驗證本架構的安全性以及系統整體效率。
Cloud storage system provides storage to enterprises and
end users, and it helps to reduce the cost of server maintenance. Unfortunately, this new type of data storage service also brings new security challenges as data owners do not have full control of their data. The existing research works can not completely resolve these security issues efficiently or may cause other security problems. In this thesis, a framework with
the third party auditor is first proposed. Based on our system model, a key management scheme and an authentication process are proposed which can ensure the security of cloud storage. In addition, two types of key loading methods are proposed to improve the performance of key management. In order to create a system with balanced load, AES encryption algorithm is adopted to reduce the computation load on the user side. Through analyses and simulations, we have shown that the proposed system achieves both security and good overall
performance.
1 Introduction 1
2 Related Work 4
2.1 Ensuring Security via Cryptographic Techniques 4
2.2 Ensuring Security via Framework or Protocol 6
3 Preliminary 8
3.1 B-tree 8
3.2 Advanced Encryption Standard 9
3.3 Secure Hash Algorithm . . . . . . . . . . . . . . . . . . . . 10
3.4 Password-Based Key Derivation Function 2 . . . . . . . . . 11
4 Proposed Scheme 13
4.1 Problem Analysis . . . . . . . . . . . . . . . . . . . . . . . 13
4.1.1 Issues of Cloud Storage . . . . . . . . . . . . . . . . 13
4.1.2 Design Goal . . . . . . . . . . . . . . . . . . . . . . 16
4.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.3 Data Structure for Key Management . . . . . . . . . . . . 18
4.4 Authentication Process . . . . . . . . . . . . . . . . . . . . 22
4.5 Cryptographic Techniques and Key Management . . . . . . 24
4.6 Encryption/Decryption Process . . . . . . . . . . . . . . . 27
iii
5 Performance and Evaluation 30
5.1 Qualitative Analysis . . . . . . . . . . . . . . . . . . . . . 30
5.1.1 Security Analysis . . . . . . . . . . . . . . . . . . . 30
5.2 Quantitative Analysis . . . . . . . . . . . . . . . . . . . . . 33
5.2.1 Performance of Searching . . . . . . . . . . . . . . . 33
5.2.2 Computational Load . . . . . . . . . . . . . . . . . 34
5.2.3 File Encryption and Decryption . . . . . . . . . . . 38
6 Conclusions 41
Reference 43
[1] Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced Encryption Standard/.
[2] Secure hash algorithm. http://en.wikipedia.org/wiki/Secure Hash Algorithm.
[3] Gary Anthes. Security in the cloud. Communications of the ACM,
53:16–18, 2010.
[4] Zhang Jing ; Wang Jinsu ; Zheng Zhuangfeng ; Zhao Chongan. Cloud
storage encryption security analysis. In Cloud Computing and Big
Data Analysis (ICCCBDA), 2016.
[5] Akshita Bhandari ; Ashutosh Gupta ; Debasis Das. A framework for
data security and storage incloud computing. In International Con
ference on Computational Techniques in Information and Communi
cation Technologies (ICCTIC), 2016.
[6] Nivedita Shimbre ; Priya Deshpande. Enhancing distributed data
storage security for cloud computing using tpa and aes algorithm.
In Computing Communication Control and Automation (ICCUBEA),
2015.
[7] Ali Azougaghe ; Zaid Kartit ; Mustapha Hedabou ; Mostafa Belkasmi ;
Mohamed El Marraki. An efficient algorithm for data security in cloud
storage. In Intelligent Systems Design and Applications (ISDA), 2015.
43
[8] L. Arockiam ; S. Monikandan. Efficient cloud storage confidentiality
to ensure data security. In International Conference on Computer
Communication and Informatics (ICCCI), 2014.
[9] Information Technology Laboratory National Institute of Standards
and Technology. Federal information processing standards publication
secure hash standard (shs).
[10] Bin Feng ; Xinzhu Ma ; Cheng Guo ; Hui Shi ; Zhangjie Fu ; Tie
Qiu. An efficient protocol with bidirectional verification for storage
security in cloud computing. IEEE Access, 4:7899 – 7911, 2016.
[11] Pradnyesh Bhisikar;Amit Sahu. Security in data storage and transmis
sionin cloud computing. International Journal of Advanced Research
in Computer Science and Software Engineering (IJARCSSE), 3, 2013.
[12] Sakinah Ali Pitchay ; Wail Abdo Ali Alhiagem ; Farida Ridzuan ;
Madihah Mohd Saudi. A proposed system concept on enhancing the
encryption and decryption method for cloud computing. In Modelling
and Simulation (UKSim), 2015.
[13] Jian Li ; Sicong Chen ; Danjie Song. Security structure of cloud storage
based on homomorphic encryption scheme. In Cloud Computing and
Intelligent Systems (CCIS), 2012.
44
[14] Jun Feng ; Yu Chen ; Douglas Summerville ; Wei-Shinn Ku ; Zhou
Su. Enhancing cloud storage security against roll-back attacks with a
new fair multi-party non-repudiation protocol. In Consumer Commu
nications and Networking Conference, 2011.
[15] Alfred J. Menezes;Paul C. van Oorschot;Scott A. Vanstone. Handbook
of Applied Cryptography. 2001.
[16] Deepak Singh ; Harsh K Verma. A new framework for cloud stor
age confidentiality to ensure information security. In Colossal Data
Analysis and Networking (CDAN), 2016.
[17] Neal R. Wagner. The Laws of Cryptography: Introduction to the Ad
vanced Encryption Standard (AES). 2001.
[18] Fara Yahya ; Robert J. Walters ; Gary B. Wills. Protecting data in
personal cloud storage with security classifications. In Science and
Information Conference (SAI), 2015.
[19] Biaoshuai Tao ; Hongjun Wu. Improving the biclique cryptanalysis of
aes. Lecture Notes in Computer Science, 9144:39–56, 2015.
[20] Fei Chen ; Tao Xiang ; Yuanyuan Yang ; Cong Wang ; Shengyu
Zhang. Secure cloud storage hits distributed string equality checking:
45
More efficient, conceptually simpler, and provably secure. In Computer
Communications (INFOCOM), 2015.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top