透過您的圖書館登入
IP:3.139.80.15
  • 學位論文

適用於雲端運算環境之智慧型手機資訊隱藏系統

An information hiding system for smartphone on cloud computing environment

指導教授 : 游源惠
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本研究提出一個適用於雲端運算環境的智慧型手機資訊隱藏系統,藉由智慧型手機將機密資料或檔案傳送至雲端Server做HTML標籤屬性排列順序的資訊隱藏。本研究方法使用兩張網頁做為嵌入的偽裝網頁,並利用雲端環境的運算能力將兩個HTML檔間的相對標籤之屬性做配對,達成快速且高隱藏量的機密資料安全保護目的;另外,在智慧型手機端與雲端Server間傳輸的機密資料已事先加密,增加機密資料在傳輸時的安全性。本系統的雲端運算環境架構比單機環境執行速度要來的快速,藉由大量佈署Cloud Server,亦可以增加本系統的處理速度及藏密量。

並列摘要


This study proposes a confidential information hiding system for smartphones operating in cloud computing environments. Confidential information or files are transferred to cloud servers to be processed for information hiding by altering the sorting sequence of HTML tag attributes. In this study, two web pages are used as secret-embedded camouflage pages. We use the cloud environment computing capabilities to pair the relative tag attributes between two HTML files to achieve the fast and high-hiding capacity confidential data security protection. In addition, transmission of confidential information between smartphone clients and cloud servers is encrypted to improve data security during transmission. Designed using cloud computing environment architecture, this system performs faster than single-computer-based systems. The increase of the cloud server deployment also increases the processing speed and the secret hiding volume capacity of this system.

參考文獻


(1) B. Pfitzmann, “Information Hiding Terminology,” Proc. First Workshop of Information Hiding Proceedings, vol. 1174, pp. 347-350, 1996.
(2) F.A.P.Petitcolas, R.J.Anderson and M.G.Kuhn,”Information Hiding – A Survey,” Proceeding of the IEEE, Vol.87, No.7, pp. 1062-1078, 1999.
(3) G. Delac, M. Silic, and J. Krolo, “Emerging security threats for mobile platforms,” MIPRO 2011, pp. 1468-1473, Zagreb, Croatia, May 2011.
(4) H. Huang, S. Zhong, and X. Sun, “An algorithm of webpage information hiding based on attributes permutation,” Intelligent Information Hiding and Multimedia Signal Processing, pp. 257-260, Harbin, China, Aug 2008.
(5) H. Hwang, G. Jung, K. Sohn and S. Par, “A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP,” Information Science and Security, pp. 164 - 170, Seoul, Korea, Jan 2008.

延伸閱讀