• 沒有找到結果。

結論

在文檔中 雲端聯盟之違約證明 (頁 39-43)

在本篇論文中,我們將 POV 的技術應用到雲端聯盟上,並以醫療系統為背 景,來說明可能會遇到的問題,並假設 Cloud 是不可信任的,改良原本 POV 的

技術,讓 POV 技術能順利運行在雲端聯盟上。

我們提出了一個可以確保醫療系統上數據的完整性,利用改良過的 POV 技 術在操做醫療系統上讓使用者以及服務提供者雙方留下證據,在下次動作前做

稽核,來確保每次動作的正確性,以及責任的歸屬。

我們在實驗的部分計算了,在一個雲端下實際運行的時間,也計算了在多 個雲端下要運行的時間,並且大概估算人口數對應到 TTP 所需要的成本,在理

論部分,利用 Double Hash 技術避免了,之前 POV 會遇到的問題,並且考慮到

許多可能會遇到的攻擊,利用文章中的協定以及技術來避免掉。利用密碼學的

基礎,發展出更多保障雲端環境的應用。

在未來,我們希望可以將 POV 的技術應用在更多的實際情形中,在醫療系 統下,整個系統的正確、安全是我們首要的考量,時間並不是我們主要的考量

因素,但在更多應用中,時間可能才是主要需要考慮的,這些都是 POV 技術需

要在雲端聯盟下有更多發展才能解決。我們希望可以利用 POV 的技術套用到所

有雲端聯盟的應用,使得整體雲端環境更為安全、可靠。

33

參考著作

[1] Kamara, Seny, and Kristin Lauter. “Cryptographic cloud storage,” Financial

Cryptography and Data Security. Springer Berlin Heidelberg, 2010. 136-149.

[2] “Google Drive,” https://www.google.com/intl/en/drive/.

[3] “Dropbox,” https://www.dropbox.com/.

[4] “OneDrive,” https://onedrive.live.com/about/en/

[5] “iCloud,” https://www.icloud.com/.

[6] “SugarSync,” https://www.sugarsync.com/.

[7] “Box,” https://www.box.com/.

[8] Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li

Zhuang. “Enabling Security in Cloud Storage SLAs with CloudProof,” USENIX Annual Technical Conference. Vol. 242. 2011.

[9] Jun Feng, Yu Chen, Douglas Summerville, Wei-Shinn Ku, Zhou Su. “Enhancing

cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol,” Consumer Communications and Networking Conference (CCNC), 2011 IEEE. IEEE, 2011.

[10] Gwan-Hwan Hwang, Jenn-Zjone Peng, and Wei-Sian Huang. “A mutual

nonrepudiation protocol for cloud storage with interchangeable accesses of a

single account from multiple devices,” 2013 12th IEEE International Conference

34

on Trust, Security and Privacy in Computing and Communications. IEEE, 2013.

[11] Gwan-Hwan Hwang, and Yi-Ling Yuan. “Proof of violation for response time auditing in cloud systems,” The Journal of Supercomputing (2015): 1-12.

[12] Gwan-Hwan Hwang, Wei-Sian Huang, and Jenn-Zjone Peng. “Real-time proof of violation for cloud storage,” Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on. IEEE, 2014.

[13] Kremer, Steve, Olivier Markowitch, and Jianying Zhou. “An intensive survey of fair non-repudiation protocols,” Computer communications 25.17 (2002): 1606-1621.

[14] “台北市政府民政局” http://ca.gov.taipei/

[15] “中華民國醫師公會全國聯合會” http://www.tma.tw/stats/stater.asp

[16] Gwan-Hwan Hwang, and H.-F. Chen. “Efficient Real-time Auditing and Proof of

Violation for Cloud Storage Systems,” in 9th IEEE International Conference on

Cloud Computing, San Francisco, USA, 2016.

[17] Gwan-Hwan Hwang, Yi-Ling Yuan, and Chi Wu-Lee. “Cryptographic

Accountability for Cloud-based Service-oriented Architecture Systems,”

Submitted to journal for publication (in revision)

[18] “Checkpoint,” http://blog.checkpoint.com/2016/06/07/facebook-maliciouschat/

[19] Kurze, Tobias, David Bermbach, Alexander Lenk, Marcel Kunze. “Cloud

35

federation,” CLOUD COMPUTING 2011 (2011): 32-38.

[20] Chang-Ji Wang, Xi-Lei Xu, Dong-Yuan Shi, Wen-Long Lin. “An Efficient

Cloud-Based Personal Health Records System Using Attribute-Based Encryption and Anonymous Multi-receiver Identity-Based Encryption,” P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference

on. IEEE, 2014.

[21] Andreas K. Triantafyllidis, Vassilis G. Koutkias, Ioanna Chouvarda, Nicos

Maglaveras. “A pervasive health system integrating patient monitoring, status logging, and social sharing,” Biomedical and Health Informatics, IEEE Journal of 17.1 (2013): 30-37.

[22] Wan-Young Chung, Ee May Fong. “Seamless personal health information system in cloud computing,” Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE. IEEE, 2014.

[23] Yeong-Tae Song, Sungchul Hong, and Jinie Pak. “Empowering patients using cloud based personal health record system,” Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2015 16th

IEEE/ACIS International Conference on. IEEE, 2015.

[24] Fatma Zubaydi, Ayat Saleh, Fadi Aloul, Assim Sagahyroon. “Security of mobile health (mHealth) systems,” Bioinformatics and Bioengineering (BIBE), 2015

36

IEEE 15th International Conference on. IEEE, 2015.

[25] Wan, Au Thien, and Sriram Sankaranarayanan. “Development of a Health Information System in the Mobile Cloud Environment,” High Performance Computing and Communications & 2013 IEEE International Conference on

Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th

International Conference on. IEEE, 2013.

[26] Zhang, Xin, and Tingting Zhang. “Achieving scalability in a distributed electronic health record system,” Science and Information Conference (SAI), 2013. IEEE, 2013.

[27] Gwan-Hwan Hwang, Jenn-Zjone Peng, and Wei-Sian Huang. “A mutual

nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices,” Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on.

IEEE, 2013.

在文檔中 雲端聯盟之違約證明 (頁 39-43)

相關文件