Effective architecture design on network files access security improvement

碩士 === 國立交通大學 === 資訊學院資訊學程 === 102 === With the rapid development in technology, the network technology has transformed from the early one way Cable to the current ADSL system. The broadband speed also follows an explosive growth path along with the newest innovation. Internet consist plenty of info...

Full description

Bibliographic Details
Main Authors: Chi, Te-Yu, 戚得郁
Other Authors: Huang, Jiun-Long
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/50306907133308155595
id ndltd-TW-102NCTU5392009
record_format oai_dc
spelling ndltd-TW-102NCTU53920092015-10-14T00:18:22Z http://ndltd.ncl.edu.tw/handle/50306907133308155595 Effective architecture design on network files access security improvement 有效改善網路檔案儲存安全性之架構設計 Chi, Te-Yu 戚得郁 碩士 國立交通大學 資訊學院資訊學程 102 With the rapid development in technology, the network technology has transformed from the early one way Cable to the current ADSL system. The broadband speed also follows an explosive growth path along with the newest innovation. Internet consist plenty of information exchange. As the hardware standard improved, more functions and services can be easily performed. As a result, the applications on these technology are everywhere in our daily life. Accessing data through internet become a necessary function on digital devices. Many software providers also started developed such products to provide cloud service. However, the information safety issues arise while people enjoy the convenient services provided by internet technology. The current internet safety focuses on the file encryption by the user to avoid other users or hackers to access personal data. However, users often neglect the easy access to data from the service providers. Taking Instagram as an example, Instagram declared the edited term of use which allows them to use client’s photo for commercial purposes without notice. The focus of this study is to prevent such unwitting events from the users. This study started from users’ data security and further discusses the prevention on illegal use of data by the service providers. Using different type of data saving module along with appropriate encrypted algorithm to test out the most efficient and privacy-preserving one. The result of this research shows that the architecture of data warehouse with synchronous encryption algorithm AES Rijndael, DES can significantly improve data security and privacy and avoid the risk of data leakage, furthermore, to lower the possibility of administrator accessing users’ file information. Huang, Jiun-Long 黃俊龍 2014 學位論文 ; thesis 31 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊學院資訊學程 === 102 === With the rapid development in technology, the network technology has transformed from the early one way Cable to the current ADSL system. The broadband speed also follows an explosive growth path along with the newest innovation. Internet consist plenty of information exchange. As the hardware standard improved, more functions and services can be easily performed. As a result, the applications on these technology are everywhere in our daily life. Accessing data through internet become a necessary function on digital devices. Many software providers also started developed such products to provide cloud service. However, the information safety issues arise while people enjoy the convenient services provided by internet technology. The current internet safety focuses on the file encryption by the user to avoid other users or hackers to access personal data. However, users often neglect the easy access to data from the service providers. Taking Instagram as an example, Instagram declared the edited term of use which allows them to use client’s photo for commercial purposes without notice. The focus of this study is to prevent such unwitting events from the users. This study started from users’ data security and further discusses the prevention on illegal use of data by the service providers. Using different type of data saving module along with appropriate encrypted algorithm to test out the most efficient and privacy-preserving one. The result of this research shows that the architecture of data warehouse with synchronous encryption algorithm AES Rijndael, DES can significantly improve data security and privacy and avoid the risk of data leakage, furthermore, to lower the possibility of administrator accessing users’ file information.
author2 Huang, Jiun-Long
author_facet Huang, Jiun-Long
Chi, Te-Yu
戚得郁
author Chi, Te-Yu
戚得郁
spellingShingle Chi, Te-Yu
戚得郁
Effective architecture design on network files access security improvement
author_sort Chi, Te-Yu
title Effective architecture design on network files access security improvement
title_short Effective architecture design on network files access security improvement
title_full Effective architecture design on network files access security improvement
title_fullStr Effective architecture design on network files access security improvement
title_full_unstemmed Effective architecture design on network files access security improvement
title_sort effective architecture design on network files access security improvement
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/50306907133308155595
work_keys_str_mv AT chiteyu effectivearchitecturedesignonnetworkfilesaccesssecurityimprovement
AT qīdéyù effectivearchitecturedesignonnetworkfilesaccesssecurityimprovement
AT chiteyu yǒuxiàogǎishànwǎnglùdàngànchǔcúnānquánxìngzhījiàgòushèjì
AT qīdéyù yǒuxiàogǎishànwǎnglùdàngànchǔcúnānquánxìngzhījiàgòushèjì
_version_ 1718088691301220352