跳到主要內容

簡易檢索 / 詳目顯示

研究生: 闕居樞
Ju-Shu Chueh
論文名稱: Design and Implementation of Security System for Cloud Storage
指導教授: 孫敏德
Min-Te Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2017
畢業學年度: 105
語文別: 法文
論文頁數: 56
中文關鍵詞: 網路安全雲端儲存金鑰管理AES加密演算法
外文關鍵詞: Network Security, Cloud Storage, Key Management, AES
相關次數: 點閱:12下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 雲端運算提供了各種服務以及儲存空間給使用者,這也幫助業者減少
    管理以及維護儲存伺服器上的成本。但這種新型態的資料儲存服務的興起
    也隨之帶來了資料安全上的疑慮,因為使用者無法全權控制儲存在雲端的
    資料。目前提出的架構以及方法無法有效率的解決資訊安全上的問題且仍
    然存在著其他隱憂。因此本篇論文中首先利用第三認證機制來設計出一個
    三方架構以及提出了一套認證方式,再提出了一套加密金鑰管理系統以及
    針對系統設計的資料結構來提升整體效率,此外本架構中也利用有效率的
    加解密演算法來降低使用者端的運算時間,最後利用模擬以及分析結果來
    驗證本架構的安全性以及系統整體效率。


    Cloud storage system provides storage to enterprises and
    end users, and it helps to reduce the cost of server maintenance. Unfortunately, this new type of data storage service also brings new security challenges as data owners do not have full control of their data. The existing research works can not completely resolve these security issues efficiently or may cause other security problems. In this thesis, a framework with
    the third party auditor is first proposed. Based on our system model, a key management scheme and an authentication process are proposed which can ensure the security of cloud storage. In addition, two types of key loading methods are proposed to improve the performance of key management. In order to create a system with balanced load, AES encryption algorithm is adopted to reduce the computation load on the user side. Through analyses and simulations, we have shown that the proposed system achieves both security and good overall
    performance.

    1 Introduction 1 2 Related Work 4 2.1 Ensuring Security via Cryptographic Techniques 4 2.2 Ensuring Security via Framework or Protocol 6 3 Preliminary 8 3.1 B-tree 8 3.2 Advanced Encryption Standard 9 3.3 Secure Hash Algorithm . . . . . . . . . . . . . . . . . . . . 10 3.4 Password-Based Key Derivation Function 2 . . . . . . . . . 11 4 Proposed Scheme 13 4.1 Problem Analysis . . . . . . . . . . . . . . . . . . . . . . . 13 4.1.1 Issues of Cloud Storage . . . . . . . . . . . . . . . . 13 4.1.2 Design Goal . . . . . . . . . . . . . . . . . . . . . . 16 4.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.3 Data Structure for Key Management . . . . . . . . . . . . 18 4.4 Authentication Process . . . . . . . . . . . . . . . . . . . . 22 4.5 Cryptographic Techniques and Key Management . . . . . . 24 4.6 Encryption/Decryption Process . . . . . . . . . . . . . . . 27 iii 5 Performance and Evaluation 30 5.1 Qualitative Analysis . . . . . . . . . . . . . . . . . . . . . 30 5.1.1 Security Analysis . . . . . . . . . . . . . . . . . . . 30 5.2 Quantitative Analysis . . . . . . . . . . . . . . . . . . . . . 33 5.2.1 Performance of Searching . . . . . . . . . . . . . . . 33 5.2.2 Computational Load . . . . . . . . . . . . . . . . . 34 5.2.3 File Encryption and Decryption . . . . . . . . . . . 38 6 Conclusions 41 Reference 43

    [1] Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced Encryption Standard/.
    [2] Secure hash algorithm. http://en.wikipedia.org/wiki/Secure Hash Algorithm.
    [3] Gary Anthes. Security in the cloud. Communications of the ACM,
    53:16–18, 2010.
    [4] Zhang Jing ; Wang Jinsu ; Zheng Zhuangfeng ; Zhao Chongan. Cloud
    storage encryption security analysis. In Cloud Computing and Big
    Data Analysis (ICCCBDA), 2016.
    [5] Akshita Bhandari ; Ashutosh Gupta ; Debasis Das. A framework for
    data security and storage incloud computing. In International Con
    ference on Computational Techniques in Information and Communi
    cation Technologies (ICCTIC), 2016.
    [6] Nivedita Shimbre ; Priya Deshpande. Enhancing distributed data
    storage security for cloud computing using tpa and aes algorithm.
    In Computing Communication Control and Automation (ICCUBEA),
    2015.
    [7] Ali Azougaghe ; Zaid Kartit ; Mustapha Hedabou ; Mostafa Belkasmi ;
    Mohamed El Marraki. An efficient algorithm for data security in cloud
    storage. In Intelligent Systems Design and Applications (ISDA), 2015.
    43
    [8] L. Arockiam ; S. Monikandan. Efficient cloud storage confidentiality
    to ensure data security. In International Conference on Computer
    Communication and Informatics (ICCCI), 2014.
    [9] Information Technology Laboratory National Institute of Standards
    and Technology. Federal information processing standards publication
    secure hash standard (shs).
    [10] Bin Feng ; Xinzhu Ma ; Cheng Guo ; Hui Shi ; Zhangjie Fu ; Tie
    Qiu. An efficient protocol with bidirectional verification for storage
    security in cloud computing. IEEE Access, 4:7899 – 7911, 2016.
    [11] Pradnyesh Bhisikar;Amit Sahu. Security in data storage and transmis
    sionin cloud computing. International Journal of Advanced Research
    in Computer Science and Software Engineering (IJARCSSE), 3, 2013.
    [12] Sakinah Ali Pitchay ; Wail Abdo Ali Alhiagem ; Farida Ridzuan ;
    Madihah Mohd Saudi. A proposed system concept on enhancing the
    encryption and decryption method for cloud computing. In Modelling
    and Simulation (UKSim), 2015.
    [13] Jian Li ; Sicong Chen ; Danjie Song. Security structure of cloud storage
    based on homomorphic encryption scheme. In Cloud Computing and
    Intelligent Systems (CCIS), 2012.
    44
    [14] Jun Feng ; Yu Chen ; Douglas Summerville ; Wei-Shinn Ku ; Zhou
    Su. Enhancing cloud storage security against roll-back attacks with a
    new fair multi-party non-repudiation protocol. In Consumer Commu
    nications and Networking Conference, 2011.
    [15] Alfred J. Menezes;Paul C. van Oorschot;Scott A. Vanstone. Handbook
    of Applied Cryptography. 2001.
    [16] Deepak Singh ; Harsh K Verma. A new framework for cloud stor
    age confidentiality to ensure information security. In Colossal Data
    Analysis and Networking (CDAN), 2016.
    [17] Neal R. Wagner. The Laws of Cryptography: Introduction to the Ad
    vanced Encryption Standard (AES). 2001.
    [18] Fara Yahya ; Robert J. Walters ; Gary B. Wills. Protecting data in
    personal cloud storage with security classifications. In Science and
    Information Conference (SAI), 2015.
    [19] Biaoshuai Tao ; Hongjun Wu. Improving the biclique cryptanalysis of
    aes. Lecture Notes in Computer Science, 9144:39–56, 2015.
    [20] Fei Chen ; Tao Xiang ; Yuanyuan Yang ; Cong Wang ; Shengyu
    Zhang. Secure cloud storage hits distributed string equality checking:
    45
    More efficient, conceptually simpler, and provably secure. In Computer
    Communications (INFOCOM), 2015.

    QR CODE
    :::