Enabling Public Verification of Provable Data Possession with Lightweight Computations
碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/28843664970111391619 |
id |
ndltd-TW-100NTU05442026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NTU054420262015-10-13T21:45:45Z http://ndltd.ncl.edu.tw/handle/28843664970111391619 Enabling Public Verification of Provable Data Possession with Lightweight Computations 輕量化運算之雲端資料完整性公開驗證方法 Fu-Sheng Chen 陳福聖 碩士 國立臺灣大學 電機工程學研究所 100 Cloud storage service provider, such as dropbox, let users accessing their data over the network without being limited in certain district. At first we upload our data onto the cloud. When we need the data, we download from the cloud and then notice the data is ruined. Thus, it is convenient for supporting a integrity-checking protocol without retrieving the entire data. In this thesis, we proposed an integrity-checking protocol without retrieving the entire file. This protocol is less time consuming in verification time, enabling public verification, and allowing the modification operation. On the other side, we also notice an attack, Changeling attack, that the service provider might be a chance to forge the integrity. Here, we also have the corresponding countermeasures. Chin-Laung Lei 雷欽隆 2012 學位論文 ; thesis 42 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === Cloud storage service provider, such as dropbox, let users accessing their
data over the network without being limited in certain district. At first we upload
our data onto the cloud. When we need the data, we download from the
cloud and then notice the data is ruined. Thus, it is convenient for supporting
a integrity-checking protocol without retrieving the entire data.
In this thesis, we proposed an integrity-checking protocol without retrieving
the entire file. This protocol is less time consuming in verification time,
enabling public verification, and allowing the modification operation. On
the other side, we also notice an attack, Changeling attack, that the service
provider might be a chance to forge the integrity. Here, we also have the
corresponding countermeasures.
|
author2 |
Chin-Laung Lei |
author_facet |
Chin-Laung Lei Fu-Sheng Chen 陳福聖 |
author |
Fu-Sheng Chen 陳福聖 |
spellingShingle |
Fu-Sheng Chen 陳福聖 Enabling Public Verification of Provable Data Possession with Lightweight Computations |
author_sort |
Fu-Sheng Chen |
title |
Enabling Public Verification of Provable Data Possession with Lightweight Computations |
title_short |
Enabling Public Verification of Provable Data Possession with Lightweight Computations |
title_full |
Enabling Public Verification of Provable Data Possession with Lightweight Computations |
title_fullStr |
Enabling Public Verification of Provable Data Possession with Lightweight Computations |
title_full_unstemmed |
Enabling Public Verification of Provable Data Possession with Lightweight Computations |
title_sort |
enabling public verification of provable data possession with lightweight computations |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/28843664970111391619 |
work_keys_str_mv |
AT fushengchen enablingpublicverificationofprovabledatapossessionwithlightweightcomputations AT chénfúshèng enablingpublicverificationofprovabledatapossessionwithlightweightcomputations AT fushengchen qīngliànghuàyùnsuànzhīyúnduānzīliàowánzhěngxìnggōngkāiyànzhèngfāngfǎ AT chénfúshèng qīngliànghuàyùnsuànzhīyúnduānzīliàowánzhěngxìnggōngkāiyànzhèngfāngfǎ |
_version_ |
1718068303684960256 |