文化大學機構典藏 CCUR:Item 987654321/23809
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47249/51115 (92%)
Visitors : 14318260      Online Users : 681
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/23809


    Title: 基於雙時間及秘密分享之雲端資料儲存安全機制
    Authors: 施姵含
    Contributors: 資訊安全產業研發碩士專班
    Keywords: 雲端運算
    cloud computing
    RAID
    雙時間資料庫
    Bitemporal Database
    秘密分享
    secret sharing
    Date: 2012
    Issue Date: 2012-11-27 10:27:06 (UTC+8)
    Abstract: 雲端運算技術是近來資訊產業最受青睞之議題,透過網際網路分享龐大的運算資源,讓資訊科技與應用發展技術有無限遐想的空間更造就了人類生活型態的重大改變,然雲端之安全性及隱私問題仍是使用者最大之顧慮。本研究主要探討雲端資料儲存的安全議題,並提出一個包含身份鑑別與資料儲存的安全架構。
    本架構分成兩個部分設計,第一部分為利用雙時間資料庫之概念的交易時間及有效時間做存取控制,以及稽核使用者之身份,達到保護使用者之帳戶以及加強資料的安全性。第二部分為資料儲存的安全方面,將檔案在儲存到資料庫之前,先切割並運用RAID 5概念結合秘密分享技術,讓資料就算遭到竊取與遺失,對方也無法得到原始檔案的內容。

    In recent years, cloud computing is not only a technical issue but also a popular commercial issue. It supplies services as well as resources through the Internet. Though cloud computing brings a lot of convenience, some people have doubt about its security.
    This study focuses on data and accounts protection on the cloud. We proposed security mechanisms to improve confidentiality, integrity, authentication, access control and audit in the cloud. The proposed security mechanisms are divided into two parts. The first part is for security of data storage, which combines the concept of RAID 5 with secret sharing. The second part is for account protection, which stores two time dimensions to make use of bitemporal databases.
    Before being uploaded, data are split using of the first part mechanisms. Even if someone steals some data, he couldn’t read and use them. The first part mechanisms will achieve confidentiality and integrity.
    When consumers perform some actions on cloud bitemporal databases, corresponding transaction times will be recorded and checked with their valid times. Thus we can audit consumers’ transactions. Herewith the second part mechanisms will achieve authentication, access control and auditing. Therefore, the security mechanisms can secure data and protect accounts.
    Appears in Collections:[Department of Computer Science and Information Engineering] thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML626View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback