Author: |
莊哲偉 Che-Wei Chuang |
---|---|
Thesis Title: |
在雲端環境下一個安全且提供資料完整性驗證的群組資料存取協定 A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment |
Advisor: |
羅乃維
Nai-Wei Lo |
Committee: |
吳宗成
Tzong-Chen Wu 左瑞麟 Ray-Lin Tso |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2014 |
Graduation Academic Year: | 102 |
Language: | 英文 |
Pages: | 30 |
Reference times: | Clicks: 373 Downloads: 4 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
[1]Armbrust, Michael, et al. "A view of cloud computing." Communications of the ACM 53.4 (2010): 50-58.
[2]Ren, Kui, Cong Wang, and Qian Wang. "Security challenges for the public cloud." IEEE Internet Computing 16.1 (2012): 69-73.
[3]Song, Dawn, et al. "Cloud data protection for the masses." IEEE Computer 45.1 (2012): 39-45.
[4]Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digi-tal signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
[5]The MD5 Message-Digest Algorithm (RFC1321). [Online]. Available: https://tools.ietf.org/html/rfc1321
[6]G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in Proceedings of ACM CCS’07, 2007, pp. 598–610.
[7]Shacham, Hovav, and Brent Waters. "Compact proofs of retrievability." Advanc-es in Cryptology-ASIACRYPT 2008. Springer Berlin Heidelberg, 2008. 90-107.
[8]Erway, Chris, et al. "Dynamic provable data possession." Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009.
[9]Wang, Qian, et al. "Enabling public verifiability and data dynamics for storage security in cloud computing." Computer Security–ESORICS 2009. Springer Ber-lin Heidelberg, 2009. 355-370.
[10]Azhad, Syed, and Mr Srinivas Rao. "Ensuring Data Storage Security in Cloud Computing." 310.
[11]Chen, Bo, et al. "Remote data checking for network coding-based distributed storage systems." Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010.
[12]Zhu, Yan, et al. "Dynamic audit services for integrity verification of outsourced storages in clouds." Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, 2011.
[13]Cao, Ning, et al. "Lt codes-based secure and reliable cloud storage service." IN-FOCOM, 2012 Proceedings IEEE. IEEE, 2012.
[14]Shah, Mehul A., et al. "Auditing to Keep Online Storage Services Honest." Ho-tOS. 2007.
[15]Shah, Mehul A., Ram Swaminathan, and Mary Baker. "Privacy-Preserving Audit and Extraction of Digital Contents." IACR Cryptology ePrint Archive 2008 (2008): 186.
[16]Deswarte, Yves, Jean-Jacques Quisquater, and Ayda Saidane. "Remote integrity checking." Integrity and Internal Control in Information Systems VI. Springer US, 2004. 1-11.
[17]Bairavasundaram, Lakshmi N., et al. "An analysis of latent sector errors in disk drives." ACM SIGMETRICS Performance Evaluation Review. Vol. 35. No. 1. ACM, 2007.
[18]Bairavasundaram, Lakshmi N., et al. "An analysis of data corruption in the stor-age stack." ACM Transactions on Storage (TOS) 4.3 (2008): 8.
[19]Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." Proceedings of the 14th ACM conference on Computer and communica-tions security. ACM, 2007.
[20]Zhang, Fangguo, Reihaneh Safavi-Naini, and Willy Susilo. "An efficient signa-ture scheme from bilinear pairings and its applications." Public Key Cryptog-raphy–PKC 2004. Springer Berlin Heidelberg, 2004. 277-290.
[21]Awasthi, Amit K., and Sunder Lal. "ID-based ring signature and proxy ring sig-nature schemes from bilinear pairings." arXiv preprint cs/0504097 (2005).
[22]Chen, Liqun, and Caroline Kudla. "Identity based authenticated key agreement protocols from pairings." Computer Security Foundations Workshop, 2003. Pro-ceedings. 16th IEEE. IEEE, 2003.
[23]Holbl, Marko, Tatjana Welzer, and Boštjan Brumen. "Two proposed identi-ty-based three-party authenticated key agreement protocols from pairings." Computers & Security 29.2 (2010): 244-252.
[24]Tseng, Yuh-Min. "A resource-constrained group key agreement protocol for im-balanced wireless networks." Computers & Security 26.4 (2007): 331-337.
[25]Lee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "A new authenticat-ed group key agreement in a mobile environment." annals of telecommunica-tions-annales des telecommunications 64.11-12 (2009): 735-744.
[26]Diffie, Whitfield, and Martin E. Hellman. "New directions in cryptography." In-formation Theory, IEEE Transactions on 22.6 (1976): 644-654.
[27]Tsai, Jia-Lun. "A novel authenticated group key agreement protocol for mobile environment." annals of telecommunications-annales des telecommunications 66.11-12 (2011): 663-669.
[28]A. F. Barsoum and M. A. Hasan, “Provable possession and replication of data over cloud servers,” Centre For Applied Cryptographic Research (CACR), Uni-versity of Waterloo, Report 2010/32, 2010.