Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing

碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing...

Full description

Bibliographic Details
Main Authors: Jia-Bin Lai, 賴家斌
Other Authors: Ching-Nung Yang
Format: Others
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/29509807894056924048
Description
Summary:碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we design a cloud security method to prevent unauthorized user access the information in the cloud that including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based on secret sharing, so we propose the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing.