簡易檢索 / 詳目顯示

研究生: 林彥余
Lin, Yan-Yu
論文名稱: 一個具有非集中性與安全性機制的個案資料管理雲端平台
A Cloud Platform with Decentralized and Secure Mechanisms for Managing Individual Files
指導教授: 侯廷偉
Hou, Ting-Wei
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 56
中文關鍵詞: 復健資料雲端儲存非集中式隱私保護存取控制
外文關鍵詞: Rehabilitation Data, Cloud Storage, Decentralized, Privacy Preserving, Access Control
相關次數: 點閱:113下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 有鑑於需要復健治療的病患人數逐年增加,如何有效管理、儲存和運用復健個案的復健資料如骨架資訊、彩色圖像和影像串流等,是醫療照護領域中非常重要的問題。雲端計算是一直以來被熱烈討論的議題,其中雲端儲存技術亦被廣泛應用在不同的領域中。此篇研究利用雲端儲存技術具有高擴充性、高可靠性和便利等特性,搭配密碼學領域的相關技術,開發出一個具有驗證管理、隱私保護、存取控制等特性的復健管理雲端平台,以增加欲保存資料的計算安全。除此之外,我們提出的隱私保護和存取控制機制是非集中式的,有別於其他的集中式雲端管理機制。
    我們在雲端儲存服務方面採用Microsoft Azure Services和Amazon S3,在檔案保護與存取控制管理方面同時使用了對稱式與非對稱式加密演算法,而在操作方面我們採用了MVC的架構來開發雲端復健管理雲端平台,讓使用者能透過瀏覽器執行WEB應用程式來使用服務。依據測試檔案大小區分,我們分別測試了系統的上傳加密效率和解密下載效率。

    As to the number of patients who need rehabilitation treatments grows rapidly, the issues on properly managing, storing and utilizing the generated rehabilitation data such as skeleton information, color images and video streams are important in the field of medical care. Cloud computing is widely discussed as an important issue recently, and the technology of cloud storage is also applied widely in various fields. In this work, cloud storage which has the features of high scalability, high reliability and convenience is concerned and the technologies of cryptography are adopted to develop a rehab managing cloud platform which possess the features of identity managing, privacy preserving and access control mechanism. On top of such a platform, the level of computational security for the protected files can be enhanced. Moreover, proposed privacy preserving and access control mechanism are decentralized and robust, unlike other managing schemes which are centralized, designed for clouds commonly.
    Both Microsoft Azure Services and Amazon S3 are adopted as the solutions of cloud storage in this work, on the issue of privacy preserving and access control, both the asymmetric and asymmetric encryption algorithms are adopted also. Besides, the MVC framework is used as the base for developing the rehab managing cloud platform. The users can utilize the services provided via common browsers, and the efficiency of uploading and downloading files via the proposed system are measured.

    Table of Contents 摘要-----------------------------------------------------I Abstract------------------------------------------------II Table of Contents---------------------------------------IV List of Tables------------------------------------------V List of Figures-----------------------------------------VI Chapter 1 – Introduction--------------------------------1 1.1 Motivation--------------------------------------1 1.2 Thesis Overview-------------------------------------4 Chapter 2 – Background and Related Works----------------5 2.1 RESTful Web Service---------------------------------5 2.2 Cloud Computing-------------------------------------6 2.3 Cloud Storage---------------------------------------9 2.4 Technology of Cryptography--------------------------12 2.5 File Encryption and Privacy Preserving on the Cloud-15 2.6 Access Control on the Cloud-------------------------17 2.7 Brief Discussion------------------------------------19 Chapter 3 - Proposed System-----------------------------22 3.1 Requirement-----------------------------------------22 3.2 Design Decisions------------------------------------22 3.3 System Overview-------------------------------------26 3.4 System Architecture---------------------------------28 3.5 System Process--------------------------------------32 Chapter 4 – Implementation------------------------------36 4.1 Development Environment-----------------------------36 4.2 System Implementation-------------------------------39 4.3 Demonstration---------------------------------------42 4.4 System Evaluation-----------------------------------45 4.5 Comparison------------------------------------------48 Chapter 5 – Conclusions and Future Works----------------51 5.1 Conclusions-----------------------------------------51 5.2 Future Works----------------------------------------52 References----------------------------------------------53 List of Tables Table 2-1 Brief Comparison of Cloud Provider----10 Table 2-2 Cloud Storage Related Attacks---------20 Table 4-1 Hardware Setup of Web Server----------46 Table 4-2 System Evaluation of Uploading--------46 Table 4-3 System Evaluation of Downloading------46 Table 4-4 Comparison of Related Works-----------48 List of Figures Figure 2-1 The hierarchy of cloud computing------------7 Figure 2-2 Diagram of Enciphering and Deciphering------12 Figure 3-1 General Use Cases---------------------------27 Figure 3-2 System Overview-----------------------------28 Figure 3-3 General System Architecture-----------------29 Figure 3-4 Transmission Diagram of the Model-View-Controller -30 Figure 3-5 Sequence Diagram of Files Transmission-------32 Figure 3-6 Design of Encrypting Process-----------------33 Figure 3-7 Design of Decrypting Process-----------------34 Figure 4-1 Azure Cloud Storage Account------------------38 Figure 4-2 Configuration Overview-----------------------39 Figure 4-3 View Page of Case Managing-------------------42 Figure 4-4 View Page of Uploading Service---------------43 Figure 4-5 Encrypted Files Stored on the AmazonS3-------44 Figure 4-6 Encrypted CEKs Stored on the Azure-----------44 Figure 4-7 Encrypted Files Stored on the Azure----------45 Figure 4-8 Encrypted CEKs Stored on the AmazonS3--------45

    References

    [1] N. R. Yang, “Intelligent Medical Forum - Construction of Cloud Medical
    Environment”, 2011[Online].Available:
    http://www.digitimes.com.tw/tw/b2b/Seminar/shwnws_new.asp?CnlID=18&cat=99&pro
    duct_id=051A00331&id=0000226522_6K542IZU3EPDAO157GEOX
    [Accessed: 22-June-2016]

    [2] DIGITIMES Inc., “Import IOT、Big Data Analysis and Cloud Computing into
    Medical 4.0”, 2015[Online].Available:
    http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&packageid=9876&id=0000
    448066_YVALVGJY76SXVF57KI3PS&cat=30&ct=1 [Accessed: 22-June-2016]

    [3] Dropbox Inc., “Dropbox security”, [Online].Available: https://www.dropbox.com/security [Accessed: 22-June-2016]

    [4] R. T. Fielding, Architecture Styles and the Design of Network-based Software Architecture, PhD dissertation, Department of Information and Computer Science, University of California, Irvine, USA, 2000.

    [5] A. Rodriguez, “RESTful Web Services: The basics", IBM developer Works, 2008. [Online].Available: http://www.ibm.com/developerworks/webservices/library/ws-restful/
    [Accessed:22-June-2016]

    [6] Hyuck Han, Shingyu Kim and Hyungsoo Jung, “A RESTful Approach to the Management of Cloud Infrastructure,” IEEE International Conference on Cloud Computing, Bangalore, India, pp.139-142, Sept. 2009

    [7] NIST, “The NIST Definition of Cloud Computing” [Online].Available:
    http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. [Accessed: 22-June-2016]

    [8] “Cloud Computing Thinktank – The revealing of cloud storage” [Online].Available: http://www.runpc.com.tw/content/cloud_content.aspx?id=105324 [Accessed: 22-June-2016]

    [9] Anup Mathew, “Survey Paper on Security & Privacy Issues in Cloud Storage Systems”, The Institute for Computing, Information and Cognitive Systems (ICICS), University of British Columbia, Term Survey Paper, pp.1-13, Apr. 2012

    [10] William Stallings, “Cryptography and Network Security” Four Edition, Pearson Press, Taiwan, 2007

    [11] AICPA/CICA, “Privacy Maturity Model” [Online].Available: https://www.kscpa.org/writable/files/AICPADocuments/10-229_aicpa_cica_privacy_ maturity_model_finalebook.pdf [Accessed: 22-June-2016]

    [12] NIST, “NIST Cloud Computing Standards Roadmap” [Online]. Available: http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Version-2_2013_June18_ FINAL.pdf [Accessed: 22-June-2016]

    [13] Arun Kumar. K, Gnanadeepa. S, H. John and Janani. G. K, “Survey on security and privacy preserving public auditing for content storage in cloud environment,” 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, India, 2015, pp. 1-4.

    [14] L. Arockiam and S. Monikandan, “Efficient cloud storage confidentiality to ensure data security,” 2014 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2014, pp. 1-5.

    [15] C. S. Pawar, P. R. Patil and S. V. Chaudhari, “Providing security and integrity for data stored in cloud storage,” 2014 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, USA, 2014, pp. 1-5.

    [16] A. Michalas and R. Dowsley, “Towards Trusted eHealth Services in the Cloud,” 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 2015, pp. 618-623

    [17] F. S. Alamri and K. D. Lee, “Secure sharing of health data over cloud,” 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, Saudi Arabia, 2015, pp. 1-5.

    [18] K. Rohloff and Y. Polyakov, “An end-to-end security architecture to collect, process and share wearable medical device data,” 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), Boston, USA, 2015, pp. 615-620.

    [19] K. S. Chung and C. Keum, "Access control management of the cloud service platform," 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Korea, 2014, pp. 621-625.

    [20] R. C. Chioreanu, M. Crişan-Vida, L. Stoicu-Tivadar and V. Stoicu-Tivadar, "Implementing and securing a hybrid cloud for a healthcare information system," 2014 11th International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania, 2014, pp. 1-4.

    [21] A. Alabdulatif, I. Khalil and V. Mai, “Protection of electronic health records (EHRs) in cloud,” 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, Japan, 2013, pp. 4191-4194.

    [22] L. Zhou, V. Varadharajan and M. Hitchens, “Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1947-1960, Dec. 2013

    [23] Disha H. Parekh and R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,” International Journal of Advanced Computer Science and Applications, pp.38-46, Feb.2013

    [24] M. D. Karad and M. B. Vaidya, “Anonymous user authentication with secured storage and sharing of data on cloud,” 2015 International Conference on Information Processing (ICIP), Pune, India, 2015, pp. 201-205.

    [25] S. Ruj, M. Stojmenovic and A. Nayak, “Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 384-394, Feb. 2014.

    [26] G. Garkoti, S. K. Peddoju and R. Balasubramanian, “Detection of Insider Attacks in Cloud Based e-Healthcare Environment,” 2014 International Conference on Information Technology (ICIT), Bhubaneswar, India, 2014, pp. 195-200.

    [27] C. Bansal1, K. Bhargavan, A. Delignat-Lavaud and S. Maffeis, “Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage” 2nd Conference on Principles of Security and Trust (POST 2013), 2013, Rome, Italy, pp.126-146, 2013

    [28] R. Wang, D. Gu and F. Tao, "A study on the construction and management of cloud-based patients accessible hospital information systems," 2015 International Conference on Computer and Computational Sciences (ICCCS), Noida, India, 2015, pp. 198-202.

    [29] Scott Allen, “ASP.NET MVC 5 Fundamentals”, [Online].Available: https://www.pluralsight.com/courses/aspdotnet-mvc5-fundamentals
    [Accessed: 22-June-2016]

    [30] M. Z. Zhu, “Windows Azure Technical Manual”, GOTOP Press, Taiwan, 2010

    [31] “AWS SDK for .NET Developer Guide”, [Online].Available: http://docs.aws.amazon.com/AWSSdkDocsNET/V3/DeveloperGuide/welcome.html [Accessed: 22-June-2016]

    [32] Prerna Mahajan and Abhishek Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security”, in Global Journal of Computer Science and Technology Network, Web and Security, vol. 13, issue 15, version 1.0 , pp.15-22, 2013

    下載圖示 校內:立即公開
    校外:立即公開
    QR CODE