Responsive image
博碩士論文 etd-0802115-161902 詳細資訊
Title page for etd-0802115-161902
論文名稱
Title
基於秘密分享之雲端儲存系統
A Secret-Sharing-Based Method for Cloud Storage System
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
38
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2015-08-19
繳交日期
Date of Submission
2015-09-02
關鍵字
Keywords
隨機亂數、邏輯異或運算、雲端儲存系統、秘密分享、雲端運算系統
exclusive-or operation, random number, cloud computing system, secret sharing, cloud storage system
統計
Statistics
本論文已被瀏覽 5753 次,被下載 668
The thesis/dissertation has been browsed 5753 times, has been downloaded 668 times.
中文摘要
近年來,在資訊網路爆炸的時代,雲端運算系統被人們廣泛的使用著,然而其
中隱含了不少資訊安全的議題。其中,秘密分享的技術被應用在處理雲端系統關於資
訊隱私性、資料完整性以及資料運算速度的問題。然而,由Shamir所提出的秘密分享
隱含著一些缺陷,當我們將許多檔案使用秘密分享的方式進行上傳時,由每一份秘密
所產生出來欲放置雲端伺服器上的資料量之大小會與檔案大小一樣大,將造成占用許
多雲端上的儲存空間的問題,另外,當計算秘密分享所需要儲存於雲端伺服器資料的
時候,將會耗費許多計算量。
因此,為了解決這兩大由Shamir秘密分享的問題,本文提出一個透過使用者提供
之金鑰,進而產生虛擬亂數的方式,來達到減少雲端儲存空間的方法,並僅採用邏輯
異或的運算方式,來降低生產欲放置雲端伺服器資料之計算量。
Abstract
In recent years, at an era of information explosion, cloud storage system is wide-spread
used in our daily life. However, cloud storage system include many information security issues.
The technical of secret sharing is applied to solve these problem include data privacy, data
integrity and computational cost. Nevertheless, applying Shamir’s secret sharing scheme to
cloud storage system, there are two fetal problems. When we upload the file to the cloud
storage system, the size of each share equals to the file such that it waste amount of storage to
save these shares; furthermore, a heavy computational cost is required to make shares which is
going to be saved in the cloud servers.
Therefore, we then proposed a secret-sharing-based method by generating pseudo-random
number to replace the real shares such that it reduces the storage cost; in addition, we use
just EXCLUSIVE-OR (XOR) operation to reduce the computational cost when computing the
shares for each cloud servers.
目次 Table of Contents
Acknowledgments iii
摘要iv
Abstract v
Chapter 1 Introduction 1
1.1 Motivation and Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2 Preliminary 5
2.1 Notations and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Shamir Secret Sharing Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.3 Lagrange Polynomial Interpolation . . . . . . . . . . . . . . . . . . . . . . . . 6
2.4 Ramp Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Chapter 3 New threshold secret sharing scheme 9
3.1 Satoshi at el.’s Threshold Scheme . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2 Jun Kurihara.at el.’s Threshold Scheme . . . . . . . . . . . . . . . . . . . . . . 11
3.3 Extend Jun Kurihara et al.’s Method to Ramp Scheme . . . . . . . . . . . . . . 15
3.4 Example of Jun Kurihara.at el.’s Threshold Scheme . . . . . . . . . . . . . . . 16
Chapter 4 A Secret-Sharing-Based Method for Cloud Storage System 20
4.1 Notations and Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.2 Our Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.3 Evaluation of Capacity and Efficiency . . . . . . . . . . . . . . . . . . . . . . 25
Chapter 5 Conclusion and Future Works 27
Bibliography 28
參考文獻 References
[1] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, pp. 612–613, Nov. 1979.
[2] G. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the 1979 AFIPS National
Computer Conference, (Monval, NJ, USA), pp. 313–317, AFIPS Press, 1979.
[3] G. R. Blakley and C. Meadows, “Security of ramp schemes,” in Proceedings of CRYPTO
84 on Advances in Cryptology, (New York, NY, USA), pp. 242–268, Springer-Verlag New
York, Inc., 1985.
[4] H. Yamamoto, “Secret sharing system using (k, l, n) threshold scheme,” Electronics and
Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 46–54, 1986.
[5] H. Krawczyk, “Secret sharing made short,” in Proceedings of the 13th Annual International
Cryptology Conference on Advances in Cryptology, CRYPTO ’93, (London, UK,
UK), pp. 136–146, Springer-Verlag, 1994.
[6] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A fast (3,n)-threshold secret
sharing scheme using exclusive-or operations,” IEICE Trans. Fundam. Electron. Commun.
Comput. Sci., vol. E91-A, pp. 127–138, Jan. 2008.
[7] H. Yamamoto, “Secret sharing system using (k, l, n) threshold scheme,” Electronics and
Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 46–54, 1986.
[8] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “On a fast (k,n)-threshold secret
sharing scheme,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E91-A,
pp. 2365–2378, Sept. 2008.
[9] R. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, “On the size of shares for secret
sharing schemes,” Journal of Cryptology, vol. 6, no. 3, pp. 157–167, 1993.
[10] M. Van Dijk, “On the information rate of perfect secret sharing schemes,” Designs, Codes
and Cryptography, vol. 6, no. 2, pp. 143–169, 1995.
[11] D. Stinson, “Decomposition constructions for secret-sharing schemes,” Information Theory,
IEEE Transactions on, vol. 40, pp. 118–125, Jan 1994.
[12] Y. Fujii, M. Tada, N. Hosaka, K. Tochikubo, and T. Kato, “A fast (2; n)-threshold scheme
and its application,” in Proc. CSS2005, (Japanese), pp. 631–636, 2005.
[13] N. Hosaka, K. Tochikubo, Y. Fujii, M. Tada, and T. Kato, “(2; n)-threshold secret sharing
systems based on binary matrices,” in Proc. SCIS2007, (Japanese), pp. 2D1–4, 2007.
[14] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “A new (k,n)-threshold secret
sharing scheme and its extension,” in Proceedings of the 11th International Conference
on Information Security, ISC ’08, (Berlin, Heidelberg), pp. 455–470, Springer-Verlag,
2008.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code