| 研究生: |
黃鈺婷 Huang, Yu-Ting |
|---|---|
| 論文名稱: |
用於簡易秘密分享雲端儲存系統之服務層級協定感知資料散布方法 An SLA-aware Data Dispersion Method for Short-Secret-Sharing Cloud Storage System |
| 指導教授: |
郭耀煌
Kuo, Yau-Hwang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2013 |
| 畢業學年度: | 101 |
| 語文別: | 中文 |
| 論文頁數: | 43 |
| 中文關鍵詞: | 雲端儲存系統 、服務層級協定 、簡短秘密分享 |
| 外文關鍵詞: | cloud storage system, service level agreement (SLA), short secret sharing |
| 相關次數: | 點閱:113 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在這個資訊爆炸的年代,人們習慣透過網路分享各種訊息,而隨著所欲分享與儲存的資料量快速成長,資料維護的成本也隨之大幅增加。由於雲端儲存系統具備大量的儲存空間和傳輸頻寬,以及提供資料維護的服務,因此大幅降低了資料管理上的成本,所以,許多公司開始選擇將資料外包給雲端儲存系統做管理與維護。然而,因為使用者不再實際掌控資料,資料的安全性與可得性一直是雲端儲存系統上被關注的焦點,而如何在資料安全性、資料可得性、存取效能以及使用者成本上達成平衡則是本論文所要探討的議題。
由於現今雲端儲存系統的提供者僅提供使用者制式化的服務層級協定,使用者無法得到真正符合使用者需求的服務。因此本論文首先依據使用者的四大需求重新定義了相關的服務層級協定條款。根據使用者簽訂的客製化服務層級協定,
我們可以得知使用者真正的需求,並調整系統以完成服務。
在現有支援資料安全的雲端儲存系統中,基於簡短秘密分享的雲端儲存系統具備最小所需儲存空間、高執行效能以及支援金鑰管理機制的優點。藉由調整簡短秘密分享的參數(n, k),系統將能提供不同程度的安全性、可得性保護,但也面臨著不同程度的存取效能及客戶端成本。本篇論文將基於此類雲端儲存系統進一步探討如何在滿足使用者所簽訂的客製化服務層級協定下調整此系統之參數(n, k)以達到最佳化的儲存效果。
最後,透過分析數個虛擬情境,我們模擬不同使用者根據自身需求簽署不同的服務層級協定。最後,模擬了使用者在不同雲端服務提供者的環境中,系統所取得的最佳化結果。
In the era of information explosion, people usually share various kinds of information through networks. As more information is going to be shared and stored, the maintenance costs of data also increase. Since cloud storage systems have large storage space, high transmission bandwidth, and the supports of data maintenance, the management costs of clients can further be reduced, and therefore more companies would like to outsource their data into cloud storage systems. However, because of the lacks of physical controls of data, the data security and the data availability are always concerned. Hence, this thesis mainly focuses on proposing a method to leverage between the data security, the data availability, the access performance, and the client cost.
Nevertheless, clients often cannot be served with what they actually want because the Service Level Agreement (SLA) provided by existing cloud storage systems is not customized. Therefore, this thesis first defines the corresponding SLA elements according to the four major concerns of clients. Based on the customized SLA negotiated with clients, their actual requirements can be discovered and exploited to adjust the system parameters for completing services.
Among existing cloud storage systems with the data security support, Short-Secret-Sharing (SSS) cloud storage system has the characteristics including the smallest storage consumption, the highest performance and key management supports. By adjusting the parameters (n, k) of SSS, the cloud storage system can provide different levels of protection in the data security and the data availability whereas obtaining different access performance and client costs. This thesis would like to propose a method to obtain the optimal result by adjusting the parameters (n, k) based on the customized SLA of clients.
Finally, by analyzing several scenarios, the customized SLAs negotiated with different clients are obtained. Moreover, optimal results are presented when clients are served by different cloud storage systems.
[SIN11] Singh, Y. ; Kandah, F. ; Weiyi Zhang, “A secured cost-effective multi-cloud storage in cloud computing”, Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pp. 619 - 624
[KAN09] Kandukuri, B.R. ; Paturi, V.R. ; Rakshit, A., “Cloud Security Issues”, Services Computing, 2009. SCC '09. IEEE International Conference on, pp. 517- 520
[BES11] A. Bessani ; M. Correia ; B. Quaresma ; F. Andr´e ; P. Sousa, “DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds”, EuroSys '11 Proceedings of the sixth conference on Computer systems, April 10–13, 2011 ACM, pp. 31-46
[LIA10] Liangliang Xiao ; Yunqi Ye ; I-Ling Yen, Bastani, F., ”Evaluation and Comparisons of Dependable Distributed Storage Designs for Clouds”, High-Assurance Systems Engineering (HASE), 2010 IEEE 12th International Symposium on, pp. 152- 161
[ZHI09] Zhiqian Xu ; Hai Jiang, ” HASS Highly Available, Scalable and Secure Distributed Data Storage Systems”, Computational Science and Engineering, 2009. CSE '09. International Conference on, pp. 772- 780
[SHA79] Adi Shamir, “How to share a secret,” Communications of the ACM, v.22 n.11, Nov. 1979, pp.612-613,
[JEF04] Jeffrey Dean and Sanjay Ghemawat, ” MapReduce Simplified Data Processing on Large Clusters”, OSDI ’04: 6th Symposium on Operating Systems Design and Implementation, Google, Inc.
[KRA94] Hugo Krawczyk, ” Secret Sharing Made Short”, CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag London, UK ©1994, pp. 136-146
[SAN10] Sanka, S. ; Hota, C. ; Rajarajan, M., ” Secure data access in cloud computing”, Internet Multimedia Services Architecture and Application(IMSAA), 2010 IEEE 4th International Conference on, pp. 1 - 6
[JEH07] Jehangir, Assed ; de Groot, S.M.H., ” Securing inter-cluster communication in Personal Networks”, Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007. Fourth Annual International Conference on, pp. 1- 6
[SHV10] Shvachko, K. ; Hairong Kuang ; Radia, S. ; Chansler, R., ” The Hadoop Distributed File System”, Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on, pp. 1- 10
[MEX11] MEXT, Institute of Mathematics for Industry, ” workshop-Secret Sharing and Cloud Computing”, Kyushu University, Institute of Mathematics for Industry, June 7 (Tue), 2011
[JAY01] Jay J. Wylie, Mehmet Bakkaloglu, Vijay Pandurangan, Michael W. Bigrigg, Semih Oguz, Ken Tew, Cory Williams, Gregory R. Ganger, Pradeep K. Khosla, ” Selecting the Right Data Distribution Scheme for a Survivable Storage System”, CMU-CS-01-120, May 2001
[AGU05] Aguilera, M.K. ; Janakiraman, R. ; Lihao Xu, ” Using Erasure Codes Efficiently for Storagein a Distributed System”, Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, pp. 336- 345
校內:2018-08-29公開