Responsive image
博碩士論文 etd-0723118-125308 詳細資訊
Title page for etd-0723118-125308
論文名稱
Title
植基於側鏈之動態區塊鏈儲存機制
Dynamic Blockchain Storage Scheme Based on Sidechains
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
43
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2018-07-13
繳交日期
Date of Submission
2018-08-23
關鍵字
Keywords
變色龍雜湊函數、去中心化、側鏈、區塊鏈、雲端儲存、公開稽核機制
Decentralization, Chameleon-Hash, Blockchain, Cloud Storage, Sidechain, Public Auditing
統計
Statistics
本論文已被瀏覽 5677 次,被下載 0
The thesis/dissertation has been browsed 5677 times, has been downloaded 0 times.
中文摘要
近年來,隨著網路科技的不斷發展,雲端儲存機制越來越流行。傳統的物理存儲不但設備昂貴,能夠使用的空間也有限。然而只要使用雲端儲存,就能以較低的價格租到足夠的空間,而且出門在外要使用資料時也方便很多。不過,有著中心控管的雲端,卻有諸多弊端。一是中心的權利過大,可以對用戶的資料動手腳,而用戶卻沒有辦法阻止。二是將所有資料集中儲存,也有很大的安全隱患。一旦中心的服務器受到影響,所有的資料都將處在危險之中。考慮到區塊鏈的去中心化和安全性,現在越來越多的雲端使用區塊鏈來做資料的儲存。然而這中間還有一個重要的問題。一般來說,一個完整的資料庫至少需要新增、刪除和修改功能。但是由於不可篡改性,區塊鏈的資料庫無法做到刪除和修改功能。因此我們提出使用側鏈的方式,來彌補這個缺陷。在我們的機制中,用戶可以將自己用不到的空間拿來出租獲得報酬。而資料擁有者也可以以較低的佣金租到足夠的空間。同時,為了減少維護成本,我們還用到變色龍雜湊函數來回收過期的側鏈。此外,我們也將一個公開稽核機制修改成了去中心化的版本,以檢查存放在雲端上資料的完整性。
Abstract
Due to the development of network technique, the cloud storages become more and more popular. Traditional physical memories are expansive, and with limited usable storage space. If the cloud storages are adopted, one can rent large storage space in a lower price. However, centralized cloud has a number of risks. First, the right of the cloud center is over-large, and it means the cloud center can modify or delete data as it wants without being detected. Secondly, once the central services are compromised, all the data are also disclosed. Due to propertied decentralized immutability, more and more cloud storages adopt blockchain technology to store data. Traditionally, a complete database has at least three functions: Creation, Modification, and Deletion. However, since a blockchain is immutable, Deletion and Modification functions are difficult to be realized. Hence, we propose a storage architecture based on blockchain with sidechains to overcome the above limitations. In our scheme, users are able to provide spare storages to gain rewards. Meanwhile, we adopt a Chameleon-Hash function to reclaim the expired sidechains to reduce maintenance cost. Besides, we also proposed a public decentralized auditing scheme to verify the integrity in blockchain.
目次 Table of Contents
論文審定書 i
Acknowledgments iv
摘要 v
Abstract vi
List of Figures viii
List of Tables ix
Chapter 1 Introduction 1
1.1 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 2 Preliminaries 5
2.1 Bitcoin blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Sidechain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Chameleon-Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.4 Public Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 3 System Model 9
3.1 Parentchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Sidechain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3 Downloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Chapter 4 Our Scheme 13
4.1 Parentchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2 Sidechain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.3 Downloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 5 Discussion 19
5.1 Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.2 Block-Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.3 Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Chapter 6 Security Analysis 24
6.1 Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.1 Malicious O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.2 Malicious Miner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.1.3 Malicious SP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.1.4 Malicious U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.2 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.2.1 Against Malicious O . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.2.2 Against Malicious Miner . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.2.3 Against Malicious SP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.2.4 Against Malicious U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Chapter 7 Comparison 28
Chapter 8 Conclusion 30
Bibliography 31
參考文獻 References
[1] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
[2] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem,” ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, pp. 382–401, 1982.
[3] H. Li, F. Zhang, J. He, and H. Tian, “A searchable symmetric encryption scheme using blockchain,” arXiv preprintrXiv:1711.01030, 2017.
[4] A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller, A. Poelstra, J. Timón, and P. Wuille, “Enabling blockchain innovations with pegged sidechains,” [Online] Available: http://www. opensciencereview. com/papers/123/enablingblockchaininnovations-with-pegged-sidechains, 2014.
[5] J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin, and D. Slamanig, “Chameleonhashes with ephemeral trapdoors,” in IACR International Workshop on Public Key Cryptography, pp. 152–182, Springer, 2017.
[6] B. Wang, B. Li, H. Li, and F. Li, “Certificateless public auditing for data integrity in the cloud,” in Communications and Network Security (CNS), 2013 IEEE Conference on, pp. 136–144, IEEE, 2013.
[7] G. block, “Datacoin: A distributed cryptocurrency with integrated data storage.” [Online] Available:https://datacoin.info/. Accessed August 14, 2017.
[8] P. Labs, “Filecoin: A decentralized storage network.” [online]Available:https://news.ycombinator.com/. Accessed August 14, 2017.
[9] H. Krawczyk and T. Rabin, “Chameleon signatures.,” in NDSS, 2000.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code