透過您的圖書館登入
IP:44.193.80.126
  • 學位論文

雲端儲存環境中公開批次稽核之研究

A Study of Public Batch Auditing in Cloud Storage

指導教授 : 黃仁俊

摘要


雲端外包儲存服務如雨後春筍般成立,該項雲端服務是越來越多的企業以及個人最常採用的雲端服務項目之一。這種託管模式,衍生許多新的安全議題,其中如何確保寄存放在雲端上的資料正確性是此應用服務非常重要的課題。在雲端儲存稽核中提供公開稽核機制(public auditing)委由第三方稽核者驗証檔案擁有者儲存在雲端上的資料,但同時須顧及擁有者資料之隱私保護是目前比較被接受之解決方案。過往學者為提升第三方稽核者驗証效率也進而提出批次稽核技術,但事實上大部分的做法無法達到真正的批次稽核且會使第三方稽核者在驗証過程中耗費大量的通訊成本及計算成本;同時,一旦批次稽核驗証有錯誤訊息時,過往相關研究成果需要重做稽核才能找出錯誤之檔案或是該研究成果並沒有說明如何進一步確認錯誤之檔案。有鑒於此,本論文提出新的批次稽核技術,雲端伺服器利用本論文提出稽核樹結構概念計算出一批次稽核証明值給第三方稽核者之餘,也在稽核驗証過程中同步藉由稽核樹暫存正在被批次驗証的檔案証明相關資訊,若批次稽核驗証有錯誤警示,雲端伺服器可以從稽核樹擷取資訊再次提供給第三方稽核者而無需重新運算,第三方稽核者透過再次資訊可以有效率且快速稽核出錯誤檔案。整體批次稽核及偵錯所需之通訊或計算成本都比目前的相關研究成果更為有效率。

並列摘要


The cloud storage services increase gradually, and the storage service is adopted by many companies and individuals. There are many new security issues in this hosted model. How to ensure the correctness of data stored is a very important issue in this application. One of more accepted solution is to authorize a third party auditor to audit the data of owner in cloud storage with privacy preserving. The batch auditing tries to enhance the efficiency of third party verification. Most of the batch auditing schemes still spend a lot of communication cost and computation for the verification process. Besides, once some wrong messages show in the batch auditing results, the past related researches need to audit each audited file again to find the error ones. It is not an efficient strategy in this case. This paper proposes a new batch audit techniques to enhance the efficiency of bath auditing. The cloud server computes a proof value for the third party auditor based on the proposed audit tree structure. At the same time, the server also uses the audit tree to store the file information temporarily on the batch audit process. If a wrong message show in the batch auditing results, the cloud server retrieves and sends auditing information from the audit tree to the third party auditor without regenerating auditing information again. Third-party auditor can efficiently and quickly audit error file through secondary information by the proposed scheme. The communication and computing costs of the proposed are more efficient than the current related researches.

參考文獻


[15] C. Wang,Q. Wang,K. Ren, and W. Lou,”Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,”Proc. IEEE INFOCOM,pp525-533,2010.
[18] Christof Paar,Jan Pelzl,Understanding Cryptography, first ed.,ch6,2009.
[2] Cloud Security Alliance, “Top Threats to Cloud Computing,” http://www. cloudsecurityalliance.org,2010.
[5] Q.Wang, C.Wang, K.Ren, W,Lou, and J.Li,”Enabling Public Auditability and Data Dynamic for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol.22,no.5,pp.847-859,May 2011.
[9] C. Wang, K.Ren, W.Lou, and J.Li,”Toward Publicly Auditable Secure Cloud data Storage Services,” IEEE Network,vol.24,no.4,pp.19-24,July/Aug.2010.

延伸閱讀