透過您的圖書館登入
IP:18.189.182.96
  • 學位論文

基於Antiquity儲存系統之存取控制架構

Using Key Rotation and TPMs for Encrypted File System Access Control – Based on Antiquity Storage System

指導教授 : 曹礎承

摘要


隨著行動電子設備愈來愈發達、網路愈來愈普及,網路儲存系統儼然成為了一個熱門的話題以及研究方向,如Microsoft 日前推出的SkyDrive以及Google一直炒熱的網路硬碟服務話題,都顯示是網路儲存服務未來的重要性。在學術研究方面,許多的網路儲存系統研究皆愈趨成熟,然而,其背後亦衍生出許多的安全議題及效率問題,而這個議題也深深的影響到了網路儲存服務的普遍性以及實用性。特別是在於資料分享上面依然有許多可以加以研究之處,包括了使用者的存取控制以及資料分享時的鑰匙傳遞,目前大多的解決方式都是用極複雜的演算法,試圖讓資料分享者可以在分享資料的同時將鑰匙資料散播的可能性減少到最小。但因此也增加了效率上、以及實用上的問題。 有鑒於此,本研究提出了由鑰匙鏈來加密不同版本的資料,鑰匙鏈的加解密速度不但可以改善資料加解密的速度,由於鑰匙鏈是一連串相關性的密鑰,亦可使得儲存系統以及使用者大量的減少鑰匙的儲存量。另外,為了增加減化加解密造成的安全性問題,本研究使用了信賴運算團體Trusted Computing Group (TCG)所發展出來的TPM可信任安全平台模組來保護傳送中的密鑰,並隱藏部分鑰匙的資訊,讓使用者在得到分享資料時,可以由TPM做解密的動作,但卻無法得知任何鑰匙的資訊,亦無法在未授權的情況下分享鑰匙給他人。本研究將安全等級分為四個層級來討論,用上述方法為不同層級提供解決方案,有效的證明,在相同安全層級裡提供了較快速的方法。

並列摘要


Abstract. In this thesis, we address the problem of low-efficiency and high-cost access revocation in a distributed storage system. The design of our security model is based on two concepts. First, to reduce the amount of re-encryption, we assume our system is based on lazy revocation. Second, we show how to enhance the security of access control by implementing the current Trusted Platform Module TPM 1.2 technology without any assumption of trust in the BIOS, CPU, or OS of the client. We use a version-based archival storage system called Antiquity, which stores each version of a data object in a permanent, read-only form. In addition, we explain how to use key chains (key rotation) for file version control in a distributed storage system based on the concept of ‘one key per new version.’ To strengthen the servers trust in the client, we use the trusted hardware of the TPM (Trusted Platform Module) technology for network access control and hide a portion of the key information from users. We evaluate the performance of the implementation using the Antiquity Storage on an IBM laptop embedded with a TPM 1.2 chip, and demonstrate how access revocation security can be enhanced by using trusted computing technology.

參考文獻


[4] X. Zou, "Secure group communications and hierarchical access control," University of Nebraska, Lincoln, 2000.
[6] Y. Sun and K. J. R. Liu, "Scalable hierarchical access control in secure group communications," INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 2, 2004.
[7] L. Seitz, J. M. Pierson, and L. Brunie, "Key management for encrypted data storage in distributed systems," IEEE Security in Storage Workshop, pp. 20–30.
[8] D. Maziores, M. Kaminsky, M. F. Kaashoek, and E. Witchel, "Separating key management from file system security."
[9] K. Fu, M. F. Kaashoek, and D. Mazieres, "Fast and secure distributed read-only file system."

延伸閱讀