English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 47249/51115 (92%)
造訪人次 : 14298999      線上人數 : 711
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/23809


    題名: 基於雙時間及秘密分享之雲端資料儲存安全機制
    作者: 施姵含
    貢獻者: 資訊安全產業研發碩士專班
    關鍵詞: 雲端運算
    cloud computing
    RAID
    雙時間資料庫
    Bitemporal Database
    秘密分享
    secret sharing
    日期: 2012
    上傳時間: 2012-11-27 10:27:06 (UTC+8)
    摘要: 雲端運算技術是近來資訊產業最受青睞之議題,透過網際網路分享龐大的運算資源,讓資訊科技與應用發展技術有無限遐想的空間更造就了人類生活型態的重大改變,然雲端之安全性及隱私問題仍是使用者最大之顧慮。本研究主要探討雲端資料儲存的安全議題,並提出一個包含身份鑑別與資料儲存的安全架構。
    本架構分成兩個部分設計,第一部分為利用雙時間資料庫之概念的交易時間及有效時間做存取控制,以及稽核使用者之身份,達到保護使用者之帳戶以及加強資料的安全性。第二部分為資料儲存的安全方面,將檔案在儲存到資料庫之前,先切割並運用RAID 5概念結合秘密分享技術,讓資料就算遭到竊取與遺失,對方也無法得到原始檔案的內容。

    In recent years, cloud computing is not only a technical issue but also a popular commercial issue. It supplies services as well as resources through the Internet. Though cloud computing brings a lot of convenience, some people have doubt about its security.
    This study focuses on data and accounts protection on the cloud. We proposed security mechanisms to improve confidentiality, integrity, authentication, access control and audit in the cloud. The proposed security mechanisms are divided into two parts. The first part is for security of data storage, which combines the concept of RAID 5 with secret sharing. The second part is for account protection, which stores two time dimensions to make use of bitemporal databases.
    Before being uploaded, data are split using of the first part mechanisms. Even if someone steals some data, he couldn’t read and use them. The first part mechanisms will achieve confidentiality and integrity.
    When consumers perform some actions on cloud bitemporal databases, corresponding transaction times will be recorded and checked with their valid times. Thus we can audit consumers’ transactions. Herewith the second part mechanisms will achieve authentication, access control and auditing. Therefore, the security mechanisms can secure data and protect accounts.
    顯示於類別:[資訊工程學系] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML626檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋