| 研究生: |
張峻榕 Chang, Chun-Jung |
|---|---|
| 論文名稱: |
於對等服務網路中提供高可用性雲端服務 High-Availability Cloud Services in a Secure Peer-Servicing Network |
| 指導教授: |
鄭憲宗
Cheng, Sheng-Tzong |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 英文 |
| 論文頁數: | 55 |
| 中文關鍵詞: | 海量資料 、RSA加密演算法 、P2P網路 、賭徒理論 、可用性 |
| 外文關鍵詞: | Big Data, RSA cryptosystem, P2P network, Availability |
| 相關次數: | 點閱:107 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
現今人們大量使用網站所提供的網路服務用來與朋友互動以增進感情,透過秀出自己目前動態、觀察別人動態和利用文字訊息做即時交流。大多數網站所提供的網路服務必須在使用前先註冊帳號並填上個人基本資料,這會產生某些不肖業者盜賣用戶基本資料,類似事件層出不窮。另外這些使用者透過網站所提供的訊息交換系統(類似聊天室),與朋友進行即時通訊,而這些訊息都儲存在社群網站的伺服器當中,此種儲存方式容易被有心人士監聽,甚至被政府所監視。而個人動態、文字訊息儲存在中央伺服器中也具有另一種風險,例如當中央伺服器因某些因素而造成當機,會使得個人動態、文字訊息等資料遺失,更嚴重可能使整個系統無法運作,這會讓使用者對系統失去信心進而產生大量的顧客流失率。
這些個人動態、文字訊息的資料量隨著時間和網站使用人數的增加而遞增,使資訊科技業進入下一個時代”海量資料”。在海量資料的時代裡,一個系統可能具有數億或數十億筆紀錄、數千到數萬個使用者和Petabytes/ Exabyte的資料量。此篇論文提出一套系統,利用RSA加密演算法的方法將個人動態或文字訊息給特定人士以增加個人隱私性和資料安全性。此外我們將此系統建立在P2P網路上以提升系統之可用性,防止單一伺服器失效而造成系統無法使用的情形。另外我們透過賭徒理論計算每筆記錄的備份數量使每項紀錄都可達到使用者所設定之可用性。
關鍵字:網路服務、海量資料、RSA加密演算法、P2P、賭徒理論、可用性
Nowadays, websites supply people with web service to express their own feelings and promote the relationship between themselves and their friends. The web service includes showing people’s current status, observing someone’s status and instant messaging online. Before users use the web service, they need to fill in their personal information for registration and this may cause user’s private information being stolen and sold by some unscrupulous traders. Besides, when users are using message exchange service provided by the website to communicate with their friends, these message records may be spied by a person with some purposes or monitored by government because all the text is stored in center server insecurely. Storing current status of users and message records in center serve will also trigger another problem; for example, center server may be crashed due to some unknown factors which will cause the loss of user’s current status or messages, and if all servers are crashed and the system is out of function, the churn occurs.
The numbers of users’ current status and message data will increase over time and numbers of register; Information Technology has ushered in a new era called “Big Data”. In Big Data, there may be thousands of users which will generate millions of records and copy Petabytes or Exabyte of replicas in big data era. This thesis proposes a system that uses RSA to encrypt users’ current status or messages and send to specific people. This system enhances users’ privacy and security; moreover, we build this system on P2P network in order to improve system availability and to avoid system crush caused by single user offline. Eventually, we use Gambler's Ruin to calculate the number of replica for each record to achieve data availability which is set by users.
Keywords: Web Service, Big Data, RSA, P2P, Gambler’s Ruin, Data Availability
[1] R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. Voelker, “Total recall: System support for automated availability management,” In Proceedings of NSDI, 2004.
[2] C. Blake and R. Rodrigues, “High availability, scalable storage, dynamic peer networks: Pick two,” In Proceedings of HotOS, 2003.
[3] Rodrigo Rodrigues and Barbara Liskov, “High availability in DHTs: Erasure coding vs. replication,” In Proceedings of IPTPS, 2005.
[4] H. Weatherspoon and J. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” In Proceedings of IPTPS, 2002.
[5] Guoxi Wang and Jianfeng Tang, “The NoSQL Principles and Basic Application of Cassandra Model,” In Proceedings of International Conference on Computer Science and Service Syste, 2012.
[6] Sriram Ramabhadran and Joseph Pasquale, “Analysis of Long-Running Replicated Systems,” 2006.
[7] Hongxing Li and Guihai Chen, “Data Persistence in Structured P2P Networks with Redundancy Schemes,” In Proceedings of the sixth International Conference on Grid and Cooperative Computing, 2007.
[8] Bitmessage Wiki
https://bitmessage.org/wiki/Main_Page
[9] Dr Clifford Cocks CB, Bristol University, 2011.
[10] Rivest Ronald L., Shamir Adi, Adleman; Leonard M., “The Original RSA Patent as filed with the U.S. Patent Office,” Patent 4,405,829. Dec. 14th, 1977.
[11] Reed, Irving S. and Solomon, Gustave, “Polynomial Codes over Certain Finite Field,” In Proceedings of Journal of the Society for Industrial and Applied Mathematics (SIAM), 1960.
[12] Naicken S, Basu A, Livingston B, “A survey of peer-to-peer network simulators,” In Proceedings of the seventh annual postgraduate symposium, U K Liverpool, 2006.
[13] OMNeT++ official website
http://www.omnetpp.org/
[14] INET official website
http://inet.omnetpp.org/
[15] OverSim official website
http://www.oversim.org/
[16] Ingmar Baumgart, Bernhard Heep, and Stephan Krause, “OverSim: A Flexible Overlay Network Simulation Framework,” In Proceedings of IEEE Global Internet Symposium, pp. 79-84, 2007.
[17] M. Merzbacher and D. Patterson, “Measuring end-user availability on the web: Practical experience,” In Proceedings of IPDS, 2002.
[18] Fan Wu, Tongqing Qiu, Yuequan Chen and Guihai Chen, “Redundancy schemes for high availability in DHTs,” In Proceedings of ISPA, 2005. Journal version will appear in Journal of Supercomputing, 2007.
[19] Chih-Hung Hsu and Ching-Lung Chang, “Design of Reed-Solomon Decoder and Implement on FPGA,” National Yunlin University of Science and Technology, June 2007.
[20] Simo Sibakov, “Simulating a Mobile Peer-to-Peer Network,” Networking Laboratory, Department of Communications and Networking, HELSINKI UNIVERSITY OF TECHNOLOGY.
[21] Pierfrancesco Bellini, Paolo Nesi, Fabio Pazzaglia, “Exploiting P2P scalability for grant authorization in digital rights management solutions,” Distributed Systems and Internet Technology Lab, Dipartimento di Sistemi e Informatica, Università degli Studi di Firenze.
[22] John Sebastian Gilmore, “A State Management and Persistency Architecture for Peer-to-Peer Massively Multi-user Virtual Environments,” Faculty of Engineering, Stellenbosch University.
[23] Deya Mwembya Mutombo, “A PERFORMANCE EVALUATION OF PEER-TO-PEER STORAGE SYSTEMS,” School of Computer Science, the Faculty of Science, University of the Witwatersrand.
[24] Juan Pedro Mu˜noz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Antonio M. Martinez-Rojo, “Simulation of a P2P Application Using OverSim,” In Proceedings of First International Conference on Advances in Future Internet, 2009.
[25] Ingmar Baumgart, Bernhard Heep, Stephan Krause, “OverSim: A Flexible Overlay Network Simulation Framework,” Institute of Telematics, Universit¨at Karlsruhe (TH), Germany.
[26] Vaibhav Shankar, Graduate Student, Indiana University Bloomington, “Cassandra DHT-based storage system,” Indiana University, Indianapolis, Indian