透過您的圖書館登入
IP:3.140.242.165
  • 學位論文

安全資料庫之高使用度網頁使用者介面設計與儲存資料完整性檢測實作

Secure Database Design and Implementation for Integrity Verification and High Usability User Interface

指導教授 : 曾文貴

摘要


我們提出一個醫療資料庫系統的雛型-SDEMR (Secure Distributed EMR),以MIT開發的CryptDB元件為基礎,採用洋蔥加密法確保儲存醫療資料的私密性,同時支援常見資料庫的操作,如:新增、刪除、修改、排序、整數相加、比對查詢等。而在此系統之中,我們提供了資料完整性檢測的機制,將PDP(provable data possession)完整性檢測系統修改、融入我們的系統;此機制可檢測儲存在雲端的醫療資料是否正確無誤,為醫師看診時所參考的醫療資料,多做一層把關。另外,為了可以讓使用者更直覺地操作本系統,我們參照高使用度使用者介面的設計原則、方法,設計網頁使用者介面取代指令命令模式,降低使用者操作的門檻。我們也參照行政院衛生福利部推動的電子病歷管理系統中的單張基本格式,建立表單、生成醫療資料,用以模擬我們建置的系統功能。

並列摘要


In our research, we design a medical database prototype-SDEMR (Secure Distributed EMR). We use CryptDB, an encrypted database developed by MIT as our basic component. It applies onion encryption to confirm the data stored on it and supports common MySQL operations such as EQUAL SELECT, ORDER, ADD etc. In our system, we apply PDP(provable data possession) protocol to verify integrity of EMRs stored in our system. Besides, to make a friendly interface, we design the user interface by referencing the principles of high usability of a user interface. We also make a mini medical database to simulate our system. We followed the suggested standards from the EMRs Standard Management System of the Ministry of Health and Welfare of Executive Yuan to build the records, tables etc.

參考文獻


[3] J. Nielsen. “Usability 101: Introduction to Usability.” January, 2012.
[11] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.” IEEE Transactions on Parallel and Distributed Systems, volume 22, issue 5, pages 847-859, May 2011.
[12] Q. Wang, C. Wang, J. Li, K. Ren, W. Lou. ”Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.” Computer Security – ESORICS 2009, The 14th European Symposium on Research in Computer Security, pages 355-370, September 2009.
[13] Y. Ren, J. Xu, J. Wang and J.-Uk Kim “Designated-Verifier Provable Data Possession in Public Cloud Storage.” International Journal of Security and Its Applications, volume 7, No.6 (2013), pages 11-20, July 2013.
[17] G. Lindgaard and C. Dudek. “What is this evasive beast we call user satisfaction?” Interacting with Computers, volume 15, issue 3, pages 429-452, June 2003.

延伸閱讀