論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available
論文名稱 Title |
基於秘密分享之雲端儲存系統 A Secret-Sharing-Based Method for Cloud Storage System |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
38 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2015-08-19 |
繳交日期 Date of Submission |
2015-09-02 |
關鍵字 Keywords |
隨機亂數、邏輯異或運算、雲端儲存系統、秘密分享、雲端運算系統 exclusive-or operation, random number, cloud computing system, secret sharing, cloud storage system |
||
統計 Statistics |
本論文已被瀏覽 5753 次,被下載 668 次 The thesis/dissertation has been browsed 5753 times, has been downloaded 668 times. |
中文摘要 |
近年來,在資訊網路爆炸的時代,雲端運算系統被人們廣泛的使用著,然而其 中隱含了不少資訊安全的議題。其中,秘密分享的技術被應用在處理雲端系統關於資 訊隱私性、資料完整性以及資料運算速度的問題。然而,由Shamir所提出的秘密分享 隱含著一些缺陷,當我們將許多檔案使用秘密分享的方式進行上傳時,由每一份秘密 所產生出來欲放置雲端伺服器上的資料量之大小會與檔案大小一樣大,將造成占用許 多雲端上的儲存空間的問題,另外,當計算秘密分享所需要儲存於雲端伺服器資料的 時候,將會耗費許多計算量。 因此,為了解決這兩大由Shamir秘密分享的問題,本文提出一個透過使用者提供 之金鑰,進而產生虛擬亂數的方式,來達到減少雲端儲存空間的方法,並僅採用邏輯 異或的運算方式,來降低生產欲放置雲端伺服器資料之計算量。 |
Abstract |
In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many information security issues. The technical of secret sharing is applied to solve these problem include data privacy, data integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to cloud storage system, there are two fetal problems. When we upload the file to the cloud storage system, the size of each share equals to the file such that it waste amount of storage to save these shares; furthermore, a heavy computational cost is required to make shares which is going to be saved in the cloud servers. Therefore, we then proposed a secret-sharing-based method by generating pseudo-random number to replace the real shares such that it reduces the storage cost; in addition, we use just EXCLUSIVE-OR (XOR) operation to reduce the computational cost when computing the shares for each cloud servers. |
目次 Table of Contents |
Acknowledgments iii 摘要iv Abstract v Chapter 1 Introduction 1 1.1 Motivation and Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2 Preliminary 5 2.1 Notations and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Shamir Secret Sharing Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Lagrange Polynomial Interpolation . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 Ramp Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Chapter 3 New threshold secret sharing scheme 9 3.1 Satoshi at el.’s Threshold Scheme . . . . . . . . . . . . . . . . . . . . . . . . 10 3.2 Jun Kurihara.at el.’s Threshold Scheme . . . . . . . . . . . . . . . . . . . . . . 11 3.3 Extend Jun Kurihara et al.’s Method to Ramp Scheme . . . . . . . . . . . . . . 15 3.4 Example of Jun Kurihara.at el.’s Threshold Scheme . . . . . . . . . . . . . . . 16 Chapter 4 A Secret-Sharing-Based Method for Cloud Storage System 20 4.1 Notations and Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 4.2 Our Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.3 Evaluation of Capacity and Efficiency . . . . . . . . . . . . . . . . . . . . . . 25 Chapter 5 Conclusion and Future Works 27 Bibliography 28 |
參考文獻 References |
[1] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, Nov. 1979. [2] G. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the 1979 AFIPS National Computer Conference, (Monval, NJ, USA), pp. 313–317, AFIPS Press, 1979. [3] G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Proceedings of CRYPTO 84 on Advances in Cryptology, (New York, NY, USA), pp. 242–268, Springer-Verlag New York, Inc., 1985. [4] H. Yamamoto, “Secret sharing system using (k, l, n) threshold scheme,” Electronics and Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 46–54, 1986. [5] H. Krawczyk, “Secret sharing made short,” in Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’93, (London, UK, UK), pp. 136–146, Springer-Verlag, 1994. [6] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A fast (3,n)-threshold secret sharing scheme using exclusive-or operations,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E91-A, pp. 127–138, Jan. 2008. [7] H. Yamamoto, “Secret sharing system using (k, l, n) threshold scheme,” Electronics and Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 46–54, 1986. [8] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “On a fast (k,n)-threshold secret sharing scheme,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E91-A, pp. 2365–2378, Sept. 2008. [9] R. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, “On the size of shares for secret sharing schemes,” Journal of Cryptology, vol. 6, no. 3, pp. 157–167, 1993. [10] M. Van Dijk, “On the information rate of perfect secret sharing schemes,” Designs, Codes and Cryptography, vol. 6, no. 2, pp. 143–169, 1995. [11] D. Stinson, “Decomposition constructions for secret-sharing schemes,” Information Theory, IEEE Transactions on, vol. 40, pp. 118–125, Jan 1994. [12] Y. Fujii, M. Tada, N. Hosaka, K. Tochikubo, and T. Kato, “A fast (2; n)-threshold scheme and its application,” in Proc. CSS2005, (Japanese), pp. 631–636, 2005. [13] N. Hosaka, K. Tochikubo, Y. Fujii, M. Tada, and T. Kato, “(2; n)-threshold secret sharing systems based on binary matrices,” in Proc. SCIS2007, (Japanese), pp. 2D1–4, 2007. [14] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A new (k,n)-threshold secret sharing scheme and its extension,” in Proceedings of the 11th International Conference on Information Security, ISC ’08, (Berlin, Heidelberg), pp. 455–470, Springer-Verlag, 2008. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:校內校外完全公開 unrestricted 開放時間 Available: 校內 Campus: 已公開 available 校外 Off-campus: 已公開 available |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 已公開 available |
QR Code |