簡易檢索 / 詳目顯示

研究生: 張峻榕
Chang, Chun-Jung
論文名稱: 於對等服務網路中提供高可用性雲端服務
High-Availability Cloud Services in a Secure Peer-Servicing Network
指導教授: 鄭憲宗
Cheng, Sheng-Tzong
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 55
中文關鍵詞: 海量資料RSA加密演算法P2P網路賭徒理論可用性
外文關鍵詞: Big Data, RSA cryptosystem, P2P network, Availability
相關次數: 點閱:107下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今人們大量使用網站所提供的網路服務用來與朋友互動以增進感情,透過秀出自己目前動態、觀察別人動態和利用文字訊息做即時交流。大多數網站所提供的網路服務必須在使用前先註冊帳號並填上個人基本資料,這會產生某些不肖業者盜賣用戶基本資料,類似事件層出不窮。另外這些使用者透過網站所提供的訊息交換系統(類似聊天室),與朋友進行即時通訊,而這些訊息都儲存在社群網站的伺服器當中,此種儲存方式容易被有心人士監聽,甚至被政府所監視。而個人動態、文字訊息儲存在中央伺服器中也具有另一種風險,例如當中央伺服器因某些因素而造成當機,會使得個人動態、文字訊息等資料遺失,更嚴重可能使整個系統無法運作,這會讓使用者對系統失去信心進而產生大量的顧客流失率。
    這些個人動態、文字訊息的資料量隨著時間和網站使用人數的增加而遞增,使資訊科技業進入下一個時代”海量資料”。在海量資料的時代裡,一個系統可能具有數億或數十億筆紀錄、數千到數萬個使用者和Petabytes/ Exabyte的資料量。此篇論文提出一套系統,利用RSA加密演算法的方法將個人動態或文字訊息給特定人士以增加個人隱私性和資料安全性。此外我們將此系統建立在P2P網路上以提升系統之可用性,防止單一伺服器失效而造成系統無法使用的情形。另外我們透過賭徒理論計算每筆記錄的備份數量使每項紀錄都可達到使用者所設定之可用性。
    關鍵字:網路服務、海量資料、RSA加密演算法、P2P、賭徒理論、可用性

    Nowadays, websites supply people with web service to express their own feelings and promote the relationship between themselves and their friends. The web service includes showing people’s current status, observing someone’s status and instant messaging online. Before users use the web service, they need to fill in their personal information for registration and this may cause user’s private information being stolen and sold by some unscrupulous traders. Besides, when users are using message exchange service provided by the website to communicate with their friends, these message records may be spied by a person with some purposes or monitored by government because all the text is stored in center server insecurely. Storing current status of users and message records in center serve will also trigger another problem; for example, center server may be crashed due to some unknown factors which will cause the loss of user’s current status or messages, and if all servers are crashed and the system is out of function, the churn occurs.
    The numbers of users’ current status and message data will increase over time and numbers of register; Information Technology has ushered in a new era called “Big Data”. In Big Data, there may be thousands of users which will generate millions of records and copy Petabytes or Exabyte of replicas in big data era. This thesis proposes a system that uses RSA to encrypt users’ current status or messages and send to specific people. This system enhances users’ privacy and security; moreover, we build this system on P2P network in order to improve system availability and to avoid system crush caused by single user offline. Eventually, we use Gambler's Ruin to calculate the number of replica for each record to achieve data availability which is set by users.
    Keywords: Web Service, Big Data, RSA, P2P, Gambler’s Ruin, Data Availability

    摘 要 i Abstract ii ACKNOWLEDGEMENT iii TABLE OF CONTENTS iv LIST OF TABLES vi LIST OF FIGURES vii Chapter 1. Introduction 1 Chapter 2. Related Work 4 2.1. Security 4 2.1.1. PeerPage 5 2.1.2. RSA Encryption and Decryption 7 2.2. Node Availability 8 2.3. Reed-Solomon codes 11 Chapter 3. System Model 14 3.1. The Number of Replicas 14 3.2. Markov Chains 16 3.2.1. Use Markov Chains for Replica 16 3.2.2. Use Markov Chains for Reed-Solomon codes 18 3.3. Gambler's Ruin 20 3.4. System Architecture and Flow Chart 24 Chapter 4. Simulation and Result 34 4.1. Simulator 34 4.1.1. OMNet++ 35 4.1.2. INET 36 4.1.3. OverSim 37 4.2. Environment and Parameters of Oversim 38 4.2.1. The Modules in OverSim 38 4.2.2. The Parameters in OverSim 41 4.3. Performance Evaluation 43 4.3.1. Replication Mechanism 43 4.3.2. Reed-Solomon Mechanism 47 Chapter 5. Conclusions and Future Work 52 References 53

    [1] R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. Voelker, “Total recall: System support for automated availability management,” In Proceedings of NSDI, 2004.
    [2] C. Blake and R. Rodrigues, “High availability, scalable storage, dynamic peer networks: Pick two,” In Proceedings of HotOS, 2003.
    [3] Rodrigo Rodrigues and Barbara Liskov, “High availability in DHTs: Erasure coding vs. replication,” In Proceedings of IPTPS, 2005.
    [4] H. Weatherspoon and J. Kubiatowicz, “Erasure coding vs. replication: A quantitative comparison,” In Proceedings of IPTPS, 2002.
    [5] Guoxi Wang and Jianfeng Tang, “The NoSQL Principles and Basic Application of Cassandra Model,” In Proceedings of International Conference on Computer Science and Service Syste, 2012.
    [6] Sriram Ramabhadran and Joseph Pasquale, “Analysis of Long-Running Replicated Systems,” 2006.
    [7] Hongxing Li and Guihai Chen, “Data Persistence in Structured P2P Networks with Redundancy Schemes,” In Proceedings of the sixth International Conference on Grid and Cooperative Computing, 2007.
    [8] Bitmessage Wiki
    https://bitmessage.org/wiki/Main_Page
    [9] Dr Clifford Cocks CB, Bristol University, 2011.
    [10] Rivest Ronald L., Shamir Adi, Adleman; Leonard M., “The Original RSA Patent as filed with the U.S. Patent Office,” Patent 4,405,829. Dec. 14th, 1977.
    [11] Reed, Irving S. and Solomon, Gustave, “Polynomial Codes over Certain Finite Field,” In Proceedings of Journal of the Society for Industrial and Applied Mathematics (SIAM), 1960.
    [12] Naicken S, Basu A, Livingston B, “A survey of peer-to-peer network simulators,” In Proceedings of the seventh annual postgraduate symposium, U K Liverpool, 2006.
    [13] OMNeT++ official website
    http://www.omnetpp.org/
    [14] INET official website
    http://inet.omnetpp.org/
    [15] OverSim official website
    http://www.oversim.org/
    [16] Ingmar Baumgart, Bernhard Heep, and Stephan Krause, “OverSim: A Flexible Overlay Network Simulation Framework,” In Proceedings of IEEE Global Internet Symposium, pp. 79-84, 2007.
    [17] M. Merzbacher and D. Patterson, “Measuring end-user availability on the web: Practical experience,” In Proceedings of IPDS, 2002.
    [18] Fan Wu, Tongqing Qiu, Yuequan Chen and Guihai Chen, “Redundancy schemes for high availability in DHTs,” In Proceedings of ISPA, 2005. Journal version will appear in Journal of Supercomputing, 2007.
    [19] Chih-Hung Hsu and Ching-Lung Chang, “Design of Reed-Solomon Decoder and Implement on FPGA,” National Yunlin University of Science and Technology, June 2007.
    [20] Simo Sibakov, “Simulating a Mobile Peer-to-Peer Network,” Networking Laboratory, Department of Communications and Networking, HELSINKI UNIVERSITY OF TECHNOLOGY.
    [21] Pierfrancesco Bellini, Paolo Nesi, Fabio Pazzaglia, “Exploiting P2P scalability for grant authorization in digital rights management solutions,” Distributed Systems and Internet Technology Lab, Dipartimento di Sistemi e Informatica, Università degli Studi di Firenze.
    [22] John Sebastian Gilmore, “A State Management and Persistency Architecture for Peer-to-Peer Massively Multi-user Virtual Environments,” Faculty of Engineering, Stellenbosch University.
    [23] Deya Mwembya Mutombo, “A PERFORMANCE EVALUATION OF PEER-TO-PEER STORAGE SYSTEMS,” School of Computer Science, the Faculty of Science, University of the Witwatersrand.
    [24] Juan Pedro Mu˜noz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Antonio M. Martinez-Rojo, “Simulation of a P2P Application Using OverSim,” In Proceedings of First International Conference on Advances in Future Internet, 2009.
    [25] Ingmar Baumgart, Bernhard Heep, Stephan Krause, “OverSim: A Flexible Overlay Network Simulation Framework,” Institute of Telematics, Universit¨at Karlsruhe (TH), Germany.
    [26] Vaibhav Shankar, Graduate Student, Indiana University Bloomington, “Cassandra DHT-based storage system,” Indiana University, Indianapolis, Indian

    下載圖示 校內:2018-08-20公開
    校外:2018-08-20公開
    QR CODE