Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/29509807894056924048 |
id |
ndltd-TW-101NDHU5392046 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NDHU53920462015-10-13T22:40:50Z http://ndltd.ncl.edu.tw/handle/29509807894056924048 Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing 植基於秘密分享的雲端資料安全保護機制 Jia-Bin Lai 賴家斌 碩士 國立東華大學 資訊工程學系 101 Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we design a cloud security method to prevent unauthorized user access the information in the cloud that including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based on secret sharing, so we propose the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing. Ching-Nung Yang 楊慶隆 2013 學位論文 ; thesis 34 |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees.
In this thesis, we design a cloud security method to prevent unauthorized user access the information in the cloud that including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based on secret sharing, so we propose the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing.
|
author2 |
Ching-Nung Yang |
author_facet |
Ching-Nung Yang Jia-Bin Lai 賴家斌 |
author |
Jia-Bin Lai 賴家斌 |
spellingShingle |
Jia-Bin Lai 賴家斌 Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
author_sort |
Jia-Bin Lai |
title |
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
title_short |
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
title_full |
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
title_fullStr |
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
title_full_unstemmed |
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing |
title_sort |
protecting data privacy and security for cloud computing based on secret sharing |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/29509807894056924048 |
work_keys_str_mv |
AT jiabinlai protectingdataprivacyandsecurityforcloudcomputingbasedonsecretsharing AT làijiābīn protectingdataprivacyandsecurityforcloudcomputingbasedonsecretsharing AT jiabinlai zhíjīyúmìmìfēnxiǎngdeyúnduānzīliàoānquánbǎohùjīzhì AT làijiābīn zhíjīyúmìmìfēnxiǎngdeyúnduānzīliàoānquánbǎohùjīzhì |
_version_ |
1718080210924994560 |