研究生: |
黃聖翰 Huang, Sheng-Han |
---|---|
論文名稱: |
物聯網之快速稽核與違約證明架構 Fast Audit and Proof-of-Violation Architecture for Internet of Things |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2018 |
畢業學年度: | 106 |
語文別: | 中文 |
論文頁數: | 38 |
中文關鍵詞: | 雲端儲存 、物聯網 、資料稽核 、證明違約 |
DOI URL: | http://doi.org/10.6345/THE.NTNU.DCSIE.011.2018.B02 |
論文種類: | 學術論文 |
相關次數: | 點閱:110 下載:9 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在這個進入到萬物皆可聯網的時代,隨時隨地都有大量的感測器在傳遞資料等待分析處理,而蒐集這些資料的組織為了節省存放感測器資料的空間,降低建構與維護的成本,會選擇租用雲端儲存供應商的儲存空間,目前現有的雲端儲存服務不外乎為雲端儲存與雲端資料庫,但由於儲存供應商存在內部意外或外部惡意攻擊的風險,進而導致資料安全上的隱憂,且目前實際商業用的合約也沒有針對租用者上傳的資料做出保障,而過往理論上的作法雖然對於保障資料安全與完整性上實現了可供稽核的架構,但在面對大量的物聯網感測器不斷傳送巨量細碎且需要累計的資料時,不管是針對雲端檔案儲存或雲端資料庫的稽核架構,都會是一個在效率上的大問題,而對於雲端儲存服務要以何種方式保存這些持續累計的物聯網裝置資料,值得我們深入探討。
[1] Cloud storage. from https://aws.amazon.com/tw/what-is-cloud-file-storage/
[2] Cloud database. from http://en.wikipedia.org/wiki/Cloud_database
[3] Google Drive. from https://www.google.com/drive/
[4] iCloud. from https://www.icloud.com
[5] OneDrive. from https://www.onedrive.com
[6] SQL. from http://en.wikipedia.org/wiki/SQL
[7] NoSQL. from http://en.wikipedia.org/wiki/NoSQL
[8] IoT. from https://en.wikipedia.org/wiki/Internet_of_things
[9] Service Level Agreement. from https://en.wikipedia.org/wiki/Service-level_agreement
[10] Seny Kamara and Kristin Lauter. (2010). Cryptographic Cloud Storage. Financial Cryptography Workshops, pp. 136-149.
[11] J. Feng, Y. Chen, D. Summerville, W.S. Ku, and Z. Su. (2011). Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. IEEE Consumer Communications and Networking Conference (CCNC), pp.521-522
[12] Gwan-Hwan Hwang, Jenn-Zjone Peng, and Wei-Sian Huang. (2013). A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2013).
[13] Gwan-Hwan Hwang, Hung-Fu Chen. (2016). Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems. 9th IEEE International Conference on Cloud Computing.
[14] Swaleha Shaikh, Vidya Chitre. (2017). Healthcare Monitoring System Using IoT. International Conference on Trends in Electronics and Informatics (ICEI).
[15] K. Jaiswal,S. Sobhanayak,B.K. Mohanta,D. Jena (2017). IoT-Cloud based framework for patient’s data collection in smart healthcare system using Raspberry-pi. International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[16] G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. (2007). Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security, pp. 598–609
[17] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik. (2008). Scalable and efficient provable data possession. Proceedings of the International Conference on Security and Privacy in Communication Netowrks, pp. 1–10
[18] Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Yang Xiang. (2015). Verifiable Auditing for Outsourced Database in Cloud Computing. IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 11
[19] Merkle hash tree. from https://en.wikipedia.org/wiki/Merkle_tree
[20] Bloom filter. from https://en.wikipedia.org/wiki/Bloom_filter