Basic Search / Detailed Display

Author: 莊哲偉
Che-Wei Chuang
Thesis Title: 在雲端環境下一個安全且提供資料完整性驗證的群組資料存取協定
A Secure Group Data Access Protocol with Provable Data Possession for Cloud Environment
Advisor: 羅乃維
Nai-Wei Lo
Committee: 吳宗成
Tzong-Chen Wu
左瑞麟
Ray-Lin Tso
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2014
Graduation Academic Year: 102
Language: 英文
Pages: 30
Reference times: Clicks: 373Downloads: 4
Share:
School Collection Retrieve National Library Collection Retrieve Error Report

  • 中文摘要 I Abstract II 誌謝 III CONTENTS IV List of Figures V List of Tables VI Chapter 1 Introduction 1 Chapter 2 Related work 4 Chapter 3 The proposed protocol 12 3.1 Description and Assumption 12 3.2 Notations 14 3.3 Storing procedure 15 3.4 Querying procedure 16 3.5 Data integrity verification 17 Chapter 4 Security Analysis 20 Chapter 5 Conclusions 26 References 27

    [1]Armbrust, Michael, et al. "A view of cloud computing." Communications of the ACM 53.4 (2010): 50-58.
    [2]Ren, Kui, Cong Wang, and Qian Wang. "Security challenges for the public cloud." IEEE Internet Computing 16.1 (2012): 69-73.
    [3]Song, Dawn, et al. "Cloud data protection for the masses." IEEE Computer 45.1 (2012): 39-45.
    [4]Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digi-tal signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
    [5]The MD5 Message-Digest Algorithm (RFC1321). [Online]. Available: https://tools.ietf.org/html/rfc1321
    [6]G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in Proceedings of ACM CCS’07, 2007, pp. 598–610.
    [7]Shacham, Hovav, and Brent Waters. "Compact proofs of retrievability." Advanc-es in Cryptology-ASIACRYPT 2008. Springer Berlin Heidelberg, 2008. 90-107.
    [8]Erway, Chris, et al. "Dynamic provable data possession." Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009.
    [9]Wang, Qian, et al. "Enabling public verifiability and data dynamics for storage security in cloud computing." Computer Security–ESORICS 2009. Springer Ber-lin Heidelberg, 2009. 355-370.

    [10]Azhad, Syed, and Mr Srinivas Rao. "Ensuring Data Storage Security in Cloud Computing." 310.
    [11]Chen, Bo, et al. "Remote data checking for network coding-based distributed storage systems." Proceedings of the 2010 ACM workshop on Cloud computing security workshop. ACM, 2010.
    [12]Zhu, Yan, et al. "Dynamic audit services for integrity verification of outsourced storages in clouds." Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, 2011.
    [13]Cao, Ning, et al. "Lt codes-based secure and reliable cloud storage service." IN-FOCOM, 2012 Proceedings IEEE. IEEE, 2012.
    [14]Shah, Mehul A., et al. "Auditing to Keep Online Storage Services Honest." Ho-tOS. 2007.
    [15]Shah, Mehul A., Ram Swaminathan, and Mary Baker. "Privacy-Preserving Audit and Extraction of Digital Contents." IACR Cryptology ePrint Archive 2008 (2008): 186.
    [16]Deswarte, Yves, Jean-Jacques Quisquater, and Ayda Saidane. "Remote integrity checking." Integrity and Internal Control in Information Systems VI. Springer US, 2004. 1-11.
    [17]Bairavasundaram, Lakshmi N., et al. "An analysis of latent sector errors in disk drives." ACM SIGMETRICS Performance Evaluation Review. Vol. 35. No. 1. ACM, 2007.

    [18]Bairavasundaram, Lakshmi N., et al. "An analysis of data corruption in the stor-age stack." ACM Transactions on Storage (TOS) 4.3 (2008): 8.
    [19]Juels, Ari, and Burton S. Kaliski Jr. "PORs: Proofs of retrievability for large files." Proceedings of the 14th ACM conference on Computer and communica-tions security. ACM, 2007.
    [20]Zhang, Fangguo, Reihaneh Safavi-Naini, and Willy Susilo. "An efficient signa-ture scheme from bilinear pairings and its applications." Public Key Cryptog-raphy–PKC 2004. Springer Berlin Heidelberg, 2004. 277-290.
    [21]Awasthi, Amit K., and Sunder Lal. "ID-based ring signature and proxy ring sig-nature schemes from bilinear pairings." arXiv preprint cs/0504097 (2005).
    [22]Chen, Liqun, and Caroline Kudla. "Identity based authenticated key agreement protocols from pairings." Computer Security Foundations Workshop, 2003. Pro-ceedings. 16th IEEE. IEEE, 2003.
    [23]Holbl, Marko, Tatjana Welzer, and Boštjan Brumen. "Two proposed identi-ty-based three-party authenticated key agreement protocols from pairings." Computers & Security 29.2 (2010): 244-252.
    [24]Tseng, Yuh-Min. "A resource-constrained group key agreement protocol for im-balanced wireless networks." Computers & Security 26.4 (2007): 331-337.
    [25]Lee, Cheng-Chi, Tsung-Hung Lin, and Chwei-Shyong Tsai. "A new authenticat-ed group key agreement in a mobile environment." annals of telecommunica-tions-annales des telecommunications 64.11-12 (2009): 735-744.
    [26]Diffie, Whitfield, and Martin E. Hellman. "New directions in cryptography." In-formation Theory, IEEE Transactions on 22.6 (1976): 644-654.
    [27]Tsai, Jia-Lun. "A novel authenticated group key agreement protocol for mobile environment." annals of telecommunications-annales des telecommunications 66.11-12 (2011): 663-669.
    [28]A. F. Barsoum and M. A. Hasan, “Provable possession and replication of data over cloud servers,” Centre For Applied Cryptographic Research (CACR), Uni-versity of Waterloo, Report 2010/32, 2010.

    QR CODE