The Study of Secure and Efficient Data and Privacy Protection Mechanisms in Cloud Computing

碩士 === 國立高雄第一科技大學 === 資訊管理研究所 === 101 === In cloud computing environments, service providers provide more and more cloud services. Users can use these convenient cloud services in daily life. The major data of the user is maintained by the service providers except that some personal privacy data is...

Full description

Bibliographic Details
Main Authors: Pei-chun Lu, 盧佩君
Other Authors: Wen-Shenq Juang
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/27065841577029443387
Description
Summary:碩士 === 國立高雄第一科技大學 === 資訊管理研究所 === 101 === In cloud computing environments, service providers provide more and more cloud services. Users can use these convenient cloud services in daily life. The major data of the user is maintained by the service providers except that some personal privacy data is stored at the client device. An attacker may try to invade the systems, and it will cause the damage of users and service providers. Also, users may lose their mobile devices and then it may cause the data disclosure problem. As a result, the data and privacy protection of users becomes an important issue in these environments. Besides, since many mobile devices are used in these environments, secure authentication and data protection methods must be efficient in these low resource environments. In this thesis, we propose a scheme that users can verify the valid cloud service servers and the cloud service servers can ensure the legal users. Our proposed method uses the secure encryption/decryption keys and achieves the user authentication using the elliptic curve cryptosystems and the message authentication codes. Since the key delegation center of the third party has the robust security protection, our proposed scheme stores the encryption/decryption keys in the key delegation center of the third party. This approach not only can reduce the storage space of the user devices, but also can recover the encryption/decryption keys in the key delegation center when a user loses her/his devices for solving the device losing problem.