Enabling Public Verification of Provable Data Possession with Lightweight Computations

碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is...

Full description

Bibliographic Details
Main Authors: Fu-Sheng Chen, 陳福聖
Other Authors: Chin-Laung Lei
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/28843664970111391619
id ndltd-TW-100NTU05442026
record_format oai_dc
spelling ndltd-TW-100NTU054420262015-10-13T21:45:45Z http://ndltd.ncl.edu.tw/handle/28843664970111391619 Enabling Public Verification of Provable Data Possession with Lightweight Computations 輕量化運算之雲端資料完整性公開驗證方法 Fu-Sheng Chen 陳福聖 碩士 國立臺灣大學 電機工程學研究所 100 Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures. Chin-Laung Lei 雷欽隆 2012 學位論文 ; thesis 42 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures.
author2 Chin-Laung Lei
author_facet Chin-Laung Lei
Fu-Sheng Chen
陳福聖
author Fu-Sheng Chen
陳福聖
spellingShingle Fu-Sheng Chen
陳福聖
Enabling Public Verification of Provable Data Possession with Lightweight Computations
author_sort Fu-Sheng Chen
title Enabling Public Verification of Provable Data Possession with Lightweight Computations
title_short Enabling Public Verification of Provable Data Possession with Lightweight Computations
title_full Enabling Public Verification of Provable Data Possession with Lightweight Computations
title_fullStr Enabling Public Verification of Provable Data Possession with Lightweight Computations
title_full_unstemmed Enabling Public Verification of Provable Data Possession with Lightweight Computations
title_sort enabling public verification of provable data possession with lightweight computations
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/28843664970111391619
work_keys_str_mv AT fushengchen enablingpublicverificationofprovabledatapossessionwithlightweightcomputations
AT chénfúshèng enablingpublicverificationofprovabledatapossessionwithlightweightcomputations
AT fushengchen qīngliànghuàyùnsuànzhīyúnduānzīliàowánzhěngxìnggōngkāiyànzhèngfāngfǎ
AT chénfúshèng qīngliànghuàyùnsuànzhīyúnduānzīliàowánzhěngxìnggōngkāiyànzhèngfāngfǎ
_version_ 1718068303684960256