簡易檢索 / 詳目顯示

研究生: 王峙中
Wang, Chieh-Chung
論文名稱: 結合權限控管於數位文件保護系統之設計與實現
An Implementation of Digital Document Protection System with Right Management
指導教授: 王明習
Wang, Ming-Si
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2008
畢業學年度: 96
語文別: 中文
論文頁數: 58
中文關鍵詞: 權限控管AES加密文件保護
外文關鍵詞: AES Encryption, Right Management, Document Protection
相關次數: 點閱:53下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著資訊技術的發達以及目前硬體科技快速發展,台灣產業型態走向知識產業型態時,競爭力主要來自於「資訊」的價值,不管是市場調查、產品分析、專利發明以及顧客資訊等,幾乎都是以數位資訊方式存在於公司的資訊設備中。於是如何確實保護資料與文件檔案,又能解決數位資訊在企業內部廣泛流通又不怕資訊被不當使用而致使資訊資產受到傷害等問題,都成為當今最需思考解決與最關切的議題。
    本論文利用Java Swing技術實作出可在瀏覽器介面執行之數位文件保護系統,在主從架構的環境下應用AES加密演算法將數位文件加密逕行傳輸後集中保管,且在設計上採用群組權限控管以及線上瀏覽機制相互配合,可讓數位文件在受到保護的前提下易於控管與方便協同作業。

    Along with the prosperity of information technique and the rapidly development of IT hardware, most of the industries of Taiwan have been transferred to the knowledge orientation. Under this environment the main competitiveness comes from the value of “information”. Almost all of the information is stored in the information facilities via any digital forms. Documents in digital form are easily to be duplicated and distributed. How to protect these digital documents and archiving them securely is a serious issue to be faced.
    In this study, the technique of Java Swing is applied to develop a digital document protect system which can be viewed under web browser. The system is under client-server architecture and the documents stored in the server are encrypted via AES technique for increasing its security. The group authorized mechanism and on-line review capabilities can provide easily using and controlling of the digital documents.

    中文摘要................................................................................................................................i Abstract................................................................................................................................ii 誌謝.....................................................................................................................................iii 目錄.....................................................................................................................................iv 表目錄.................................................................................................................................vi 圖目錄................................................................................................................................vii 第1章 緒論.........................................................................................................................1 1.1 研究背景................................................................................................................1 1.2 研究動機與目的....................................................................................................3 1.3 論文架構................................................................................................................5 第2章 文件管理系統基本架構.........................................................................................6 2.1資料外洩與資料防護.............................................................................................6 2.1.1 資料外洩方式.............................................................................................7 2.1.2 資料防護.....................................................................................................9 2.2 密碼學...................................................................................................................11 2.2.1 對稱式與公開金鑰加密系統...................................................................12 2.2.2 資料加解密演算法...................................................................................15 2.2.2.1 3DES加密演算法...........................................................................15 2.2.2.2 AES加密演算法..............................................................................16 2.3 權限控管機制......................................................................................................17 第3章 系統設計與實現...................................................................................................19 3.1 系統架構..............................................................................................................19 3.2 系統保護機制......................................................................................................24 3.2.1 加解密模組...............................................................................................24 3.2.2 線上閱覽機制...........................................................................................27 3.2.3可攜式離線文件........................................................................................29 3.3 權限控管機制......................................................................................................30 第4章 系統實作與成果...................................................................................................32 4.1 實作環境與軟硬體設備......................................................................................32 4.2 文件加密系統伺服器端......................................................................................35 4.3 文件加密系統用戶端..........................................................................................40 4.4 文件加密後之成果..............................................................................................43 4.5 線上閱覽保護機制..............................................................................................45 4.6 可攜式離線文件..................................................................................................50 第5章 結論與未來展望...................................................................................................53 5.1 結論......................................................................................................................53 5.2 未來展望..............................................................................................................54 參考文獻.............................................................................................................................55 自述....................................................................................................................................58

    [1] 2007 CSI/FBI Computer Crime and Security Survey, http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.pdf
    [2] J.Z. Huang, C.S. Xie and B. Cai, "Research and Implement of an Encrypted File System Used to NAS," Security in Storage Workshop 2003, 31-31 Oct, 2003.
    [3] P. Roman and C. Christian, "Cryptographic Security for a High-Performance Distributed File System, "MSST 2007. 24th IEEE Conference , 24-27 Sept, 2007.
    [4] A. Nadeem and M. Y. Javed, "A Performance Comparison of Data Encryption Algorithms," International Conference on Information & Communication Technology 2005, 27-28 Aug. 2005.
    [5] C.F. Lu, Y.S. Kao, H. L. Chiang and C.H. Yang, "Fast Implementation of AES Cryptographic Algorithms in Smart Cards," IEEE 37th Annual 2003 International Carnahan Conference, 14-16 Oct, 2003.
    [6] 數位商業資訊EZ-Lock文件加密保護系統,http://tw.securitysoft.net
    [7] 弈飛資訊FileGuard文件加密工具, http://i-freelancer.net/Freeware/FileGuard.htm
    [8] 陳軒正, "結合IC卡之校園安全網頁系統的設計與實現, "國立高雄師範大學資訊教育研究所碩士論文,2004.
    [9] 眾智國際CIS Center, http://www.omniwise.com.tw
    56
    [10] P.B. Schneck, "Persistent access control to prevent piracy of digital information, "Proceedings of the IEEE, Vol. 87, pp. 1239 – 1250, July 1999.
    [11] A. Torrubia, F. Mora and L. Marti, "Cryptography Regulations for E-commerce and Digital Rights Management, " Computers & Security , Vol.20, No.8, pp.724-738, 2001.
    [12] 張伯任, "應用於多媒體數位內容之數位版權管理機制設計研究," 國立中正大學資訊工程研究所碩士論文,2002.
    [13] Robert Eckstein, Marc Loy and Dave Wood, JavaTM Swing 2nd Edition 基礎篇: O’REILLY,2002.
    [14] Robert Eckstein, James Elliott, Brian cole, Marc Loy and Dave Wood, JavaTM Swing 2nd Edition進階篇: O’REILLY,2004.
    [15] Jonathan Knudsen , Java密碼學: O’REILLY,1999.
    [16] Eclipse IDE for Java Developers, http://www.eclipse.org
    [17] Java RunTime Environment , http://www.java.com/zh_TW/
    [18] 賴溪松, 葉育斌, 資訊安全入門:全華 臺北市, 2004.
    [19] 王旭正, 高大宇, 資訊安全: 博碩文化股份有限公司, 2003.
    [20] 賴溪松, 韓亮, 張真誠, 近代密碼學及其應用:松崗 台北市,2004.
    [21] 賴溪松, 林祝興, 盧而輝, 張克章, 電子簽章應用與實習:旗標出版股份有限公司, 2004.
    57
    [22] 高級加密標準(Advanced Encryption Standard,AES), http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
    [23] Imagemagick, http://www.imagemagick.org

    下載圖示 校內:2010-08-19公開
    校外:2011-08-19公開
    QR CODE