Please use this identifier to cite or link to this item:
標題: 一個可限定次數之雲端資料共享的機制
A Data Sharing Access Scheme with Limited Number of Times in Cloud Storage Servers
作者: 蘇旻姿
Min-Tzu Su
關鍵字: 雲端儲存
Cloud Storage
Data Sharing
Times-Limited Access
Data Privacy Protect
引用: [1] D. Chen and H. Zhao, “Data security and privacy protection issues in cloud computing, “International Conference on Computer Science and Electronics Engineering, IEEE, vol. 1, pp. 647–651. 2012. [2] K.Y. Huang, G. H. Luo, and S. M. Yuan, “SSTreasury+: A Secure and Elastic Cloud Data Encryption System,” Genetic and Evolutionary Computing (ICGEC), IEEE, pp. 25-28, Aug. 2012. [3] B. Yasmina and R. Rahal, “Secure data storage in the cloud with homomorphic encryption,” Cloud Computing Technologies and Applications (CloudTech), IEEE, pp. 24-26, May. 2016. [4] W. Luo and G. Bai, “Ensuring the data integrity in cloud data storage,” Cloud Computing and Intelligence Systems (CCIS), IEEE, pp. 15-17, Sep. 2011. [5] R. Sravan Kumar and A. Saxena, “Data Integrity Proofs in Cloud Storage,” Communication Systems and Networks (COMSNETS), IEEE, pp. 4-8, Jan. 2011. [6] X. F. Liu, Y. Q. Zhang, B. Y. Wang, and J. B. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions on Parallel and Distributed Systems, pp. 1182-1191, Dec. 2012. [7] W. Li, K. P. Xue, and Y. J. Xue, “TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, pp. 1484-1496, Jan. 2015. [8] D. X. Liu, H. W. Li, Y. Yi, and H. M. Yang, “Achieving Multi-Authority Access Control with Efficient Attribute Revocation in Smart Grid,” Communications (ICC), IEEE, pp.10-14, Jun. 2014. [9] N. Vannchig, W. Chen, and Z. G. Qin, “Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System,” Advanced Cloud and Big Data (CBD), IEEE, pp. 13-16, Aug. 2016. [10] G. Imad El, B. Rachid, and M. Fatiha, “FP2E: Flexible, effective and privacy preserving cloud data sharing scheme,” Cloud Computing Technologies and Applications, IEEE, pp. 24-26, May. 2016. [11] N. Koblitz, “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, pp. 203-209, 1987. [12] V. Miller, “Use of elliptic curves in cryptography,” Advances in cryptology---CRYPTO 85, Springer Lecture Notes in Computer Science, vol. 218, 1985. [13] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” Proc. 21st Annu. Int. Cryptology Conf. Adv. Cryptology, pp. 213–229, 2001. [14] D. Johnson and A. Menezes, “The elliptic curve digital signature algorithm (ECDSA)”, Technical report CORR-34, Dept. of C&O, University of Waterloo, 1999. [15] L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, vol. 24, pp. 770-772, 1981. [16] S. Kamara and K. Lauter, “Cryptographic cloud storage,” Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010. [17] J. Yuan and S. Yu, “Public integrity auditing for dynamic data sharing with multi-user modification,” IEEE Trans. Inf. Forensics Secure, pp. 1717–1726, 2015 [18] Y. J. Yang and Y. C. Zhang, “A generic scheme for secure data sharing in Cloud,” 40th International Conference on Parallel Processing Workshops (ICPPW), pp. 145–153, 2011. [19] S. K. Yang, “A Lightweight Anonymous Authentication Scheme,” master’s thesis of NCHU, 2016. [20] C. K. Chu, S. M. Chow, and W. G. Tzeng, “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, pp. 468-477, April. 2013. [21] V. Biksham and D. Vasumathi, “Query based computations on encrypted data through homomorphic encryption in cloud computing security,” Electrical, Electronics, and Optimization Techniques (ICEEOT), IEEE, pp. 3-5, Mar. 2016. [22] G. J. Wang, Q. Liu, and J. Wu, “Achieving fine-grained access control for secure data sharing on cloud servers,” Concurrency and Computation: Practice and Experience, Feb. 2011. [23] H. Wang, “Privacy-Preserving Data Sharing in Cloud Computing,” Journal of Computer Science and Technology, vol. 25, pp. 401–414, 2010. [24] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, “An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,” Proc. 19th Eur. Symp. Res. Comput. Secur. (ESORICS), vol. 8712, pp. 257-272, Sep. 2014.
摘要: 隨著大數據的時代來臨,雲端資料儲存與計算變得越來越盛行,利用雲端儲存空間分享資料的使用者也逐漸增加,生活上的便利相對的也帶來了一些安全的挑戰。有心人士可能透過上傳的檔案得知一些使用者的資訊,因此對於雲端資料共享的安全議題備受重視。本篇論文將探討近年來對於雲端資料共享的相關議題,並針對於資料共享的平台(如有需要檔案購買的需求下),資料查詢的認證方法。因應此種環境,本論文將提出一種具有限制次數授權於使用者的機制,使得在公開的雲端伺服器中共享資料,也能運用於十分重要的檔案內容。
With the advent of big data generation, cloud data storage and computing have become more and more popular. Users using cloud storage to do data sharing are increasing. However, convenient life also brings in some security challenges. Someone with evil intention might get some users’ information via uploaded files. Hence, the security of data sharing in cloud storage has gained attention recently. In this thesis, we survey the related issue of data sharing within a public cloud and propose a filing the purchase of the request in need, data query and authentication scheme. We provide an authenticated access with a limited number of times to the users. Our scheme allows users to share the confidential files in public cloud storage servers.
文章公開時間: 2019-02-07
Appears in Collections:資訊科學與工程學系所



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.