Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing

碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing...

Full description

Bibliographic Details
Main Authors: Jia-Bin Lai, 賴家斌
Other Authors: Ching-Nung Yang
Format: Others
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/29509807894056924048
id ndltd-TW-101NDHU5392046
record_format oai_dc
spelling ndltd-TW-101NDHU53920462015-10-13T22:40:50Z http://ndltd.ncl.edu.tw/handle/29509807894056924048 Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing 植基於秘密分享的雲端資料安全保護機制 Jia-Bin Lai 賴家斌 碩士 國立東華大學 資訊工程學系 101 Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we design a cloud security method to prevent unauthorized user access the information in the cloud that including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based on secret sharing, so we propose the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing. Ching-Nung Yang 楊慶隆 2013 學位論文 ; thesis 34
collection NDLTD
format Others
sources NDLTD
description 碩士 === 國立東華大學 === 資訊工程學系 === 101 === Cloud computing is an Internet-based computing, and it is one of the foundations of the next generation of computing. In cloud computing, the service is fully served by the provider and the client needs nothing but a personal device and Internet access. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this thesis, we design a cloud security method to prevent unauthorized user access the information in the cloud that including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based on secret sharing, so we propose the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing.
author2 Ching-Nung Yang
author_facet Ching-Nung Yang
Jia-Bin Lai
賴家斌
author Jia-Bin Lai
賴家斌
spellingShingle Jia-Bin Lai
賴家斌
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
author_sort Jia-Bin Lai
title Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
title_short Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
title_full Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
title_fullStr Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
title_full_unstemmed Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
title_sort protecting data privacy and security for cloud computing based on secret sharing
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/29509807894056924048
work_keys_str_mv AT jiabinlai protectingdataprivacyandsecurityforcloudcomputingbasedonsecretsharing
AT làijiābīn protectingdataprivacyandsecurityforcloudcomputingbasedonsecretsharing
AT jiabinlai zhíjīyúmìmìfēnxiǎngdeyúnduānzīliàoānquánbǎohùjīzhì
AT làijiābīn zhíjīyúmìmìfēnxiǎngdeyúnduānzīliàoānquánbǎohùjīzhì
_version_ 1718080210924994560