Outline Overview of this paper Motivation and Initialization

Slides:



Advertisements
Similar presentations
Chapter 2 Combinatorial Analysis 主講人 : 虞台文. Content Basic Procedure for Probability Calculation Counting – Ordered Samples with Replacement – Ordered.
Advertisements

高等医科院校计算机基础教学 的改革与实践 上海中医药大学 计算机教学中心 张昌林 周 强 车立娟.
变革中的教师教育 Teacher education in transformation
云计算辅助教学风云录 黎加厚 上海师范大学教育技术系 2010年8月9日.
研究生大進擊 盧永豐
2014 年上学期 湖南长郡卫星远程学校 制作 13 Getting news from the Internet.
信息技术在教学中的应用 信息技术应用于教学的整体观、系统观 信息技术应用于教学的整体观、系统观 对信息技术整合的理解——教师的视角
揭开移动社交游戏运营的面纱 何书勉 博士 北京聚逸锐合网络科技有限公司.
從研究生指導經驗談 研究生如何管理論文研究
Business English Reading
应如何将神的话语大声读出来会众才能真正的听见!
简化 IT,促进创新 — 为现代企业带来新生机
“Internet+” Business Innovation
4.3 可持续发展的基本内涵 永嘉二中 钱凯俊.
英语语法之 复合句 讲课者:苏建玉.
電子戶籍謄本申辦及驗證實務作業與問題討論
BRIEF GUIDELINE FOR AUTHOR PREPARING PAPER FOR PUBLICATION
Subversion (SVN) Presented by 李明璋 R /2/21
院公共选修课 Leisure English 黄瑛瑛.
Semantic-Synaptic Web Mining: A Novel Model for Improving the Web Mining 報告者:陳宜樺 報告日期:2015/9/25.
深層學習 暑期訓練 (2017).
Homework 4 an innovative design process model TEAM 7
What are the shirts made of?
Thinking of Instrumentation Survivability Under Severe Accident
Indiana State Tax Return
優質教育基金研究計劃研討會: 經驗分享 - 透過Web 2.0推動高小程度 探究式專題研習的協作教學模式
IGMP Snooping / Proxy / Server
顏色yán sè COLORS 紅色 藍色 綠色 黃色 紫色 白色 黑色 咖啡色 bái sè hēi sè hóng sè lǜ sè
创建型设计模式.
网站优化—— 让每个网页都带来潜在客户 Make each page of your website bring prospects
pptfans.cn _ Free PowerPoint Templates, Diagrams and Charts
第4章(1) 空间数据库 —数据库理论基础 北京建筑工程学院 王文宇.
2017 添加标题.
农村居民的信息需求与获取渠道研究 ——以云南省腾冲县为个案
“Think it over...” 仔細地想一想… Click your mouse to see the slides...
pptfans.cn _ Free PowerPoint Templates, Diagrams and Charts
A SMALL TRUTH TO MAKE LIFE 100%
2013年工作总结及14年计划 人力资源部 二〇一三年十二月.
介面使用說明 飛資得知識服務.
高性能计算与天文技术联合实验室 智能与计算学部 天津大学
UNIT 3.
OF YOUR PRESENTATION HERE
Guide to a successful PowerPoint design – simple is best
OF YOUR PRESENTATION HERE
Mailto: 9 eB 中的金流問題 國立中央大學.資訊管理系 范錚強 Tel: (03) mailto: Updated
The story about the tiny frogs….
FREE PPT TEMPLATES Insert LOGO INSERT THE TITLE
中国科学技术大学计算机系 陈香兰 2013Fall 第七讲 存储器管理 中国科学技术大学计算机系 陈香兰 2013Fall.
虚 拟 仪 器 virtual instrument
中央社新聞— <LTTC:台灣學生英語聽說提升 讀寫相對下降>
Chapter 3 What Is Money?.
浅析云计算中的密码技术 马春光 哈尔滨工程大学 教授、博导
NASA雜談+電腦網路簡介 Prof. Michael Tsai 2015/03/02.
An Efficient MSB Prediction-based Method for High-capacity Reversible Data Hiding in Encrypted Images 基于有效MSB预测的加密图像大容量可逆数据隐藏方法。 本文目的: 做到既有较高的藏量(1bpp),
李宏毅專題 Track A, B, C 的時間、地點開學前通知
Efficient Query Relaxation for Complex Relationship Search on Graph Data 李舒馨
TinyDB資料庫 靜宜大學資管系 楊子青.
Prepare for Cozy & Lazy HOME Life
第 18 章 雲端計算.
11 Overview Cloud Computing 2012 NTHU. CS Che-Rung Lee
無悔今生.
Introduction to Computer Security and Cryptography
Computer Security and Cryptography
之前都是分类的蒸馏很简单。然后从分类到分割也是一样,下一篇是检测的蒸馏
Experimental Analysis of Distributed Graph Systems
《现代密码学》导入内容 方贤进
Gaussian Process Ruohua Shi Meeting
國際理事的角色 講師: 年指派理事 G L T 地 區 領 導 人 江達隆 博士.
When using opening and closing presentation slides, use the masterbrand logo at the correct size and in the right position. This slide meets both needs.
Presentation transcript:

Privacy –Preserving Public Auditing for Data Security in Cloud Computing

Outline Overview of this paper Motivation and Initialization Detailed Mechanism Some Comments Reference

Overview of this paper

Overview of this paper In one sentence, Ensure your data authentication in cloud? Properties of cloud storage Users always have availabe and scalable space  →Need not worry about running out of space Users need not have real physical storage media  →Need not spend money on equipments Data is not near your hand  →Data not accessible when network failure →How to make sure the data authentication?

Overview of this paper Some instances threatening your data in cloud Cloud Storage Provider deletes your data that you seldom access Cloud Storage Provider hides data loss incidnets Internal communication error in clusters of computers in Cloud(Amazon 2008,June 20)

Overview of this paper The solution is: A third party checks you data authentication (Self-checking is too tiring) Requirements: Checks authentication while preserving privacy [Exclusive]First model able to support scalable and efficient auditing [Exclusive]Security justified by concrete experiments [Mice.]No local copy of data, no more burden to users Mice. -> 做一次跟做n次的差異

Motivation and Initialization

Motivation and Initilization Check the authentication of data Nonmenclature Explanation(1): TPA:Third Party Auditor User:… CSP:Cloud Storage Provider 鑑識官 鄉民 Amazon

Motivation and Initilization Nonmenclature Explanation(2) Public key: (封裝) keys for locking a box Private key: (開箱) keys for unlocking a box MAC: (檢查碼) message authentication code. Each piece of data has a MAC code, derived from its content 簡單舉例(MD5) MD5("The quick brown fox jumps over the lazy dog") 9e107d9d372bb6826bd81d3542a419d6 MD5("The quick brown fox jumps over the lazy dog.") e4d909c290d0fb1ca068ffaddf22cbd0

Motivation and Initilization Phase Nonmenclature: User KeyGen: generate the key SigGen: gengerate the verification of meta data(MAC) CSP:Cloud Storage Provider GenProof: generate proof of data correctness TPA:Third Party Auditor VerifyProof:Audit proof from CSP(Amazon)

Have a little break...

Motivation and Initilization Example One: Privacy Leaking 鄉民: 生成一把鑰匙,丟給鑑識官 製造MAC,丟給Amazon 上傳檔案給Amazon 鄉民刪除在自己硬碟上的檔案 檢查方式 鑑識官向Amazon要檔案(檔案外洩啦…) 鑑識官自行生成MAC,檢查檔案

Motivation and Initilization Example Two: Finitely many checking times 鄉民: 生成N把鑰匙,丟給鑑識官 製造N種鑰匙的MAC,丟給鑑識官 上傳檔案給Amazon 鄉民刪除在自己硬碟上的檔案 檢查方式 鑑識官給Amazon鑰匙,並要求回傳對應MAC值 Amazon回傳對應的MAC值給鑑識官 鑑識官生成一次檢查碼,跟Amazon上的MAC做比對

Motivation and Initilization Item Example 1 Example 2 Number of keys 1 N Key is given to 鑑識官 Mac is stored by … Amazon File is transferred to… Amazon and 鑑識官 優缺點分析: Example1 鑑識官:擁有鑰匙,所以可以無限次檢查檔案的完整與否 Amazon:必須上傳檔案給鑑識官,暴露隱私,也增加工作量 Example2 鑑識官保護了使用者隱私 因為MAC是有限的,所以可以偽造答案 下一步,我們要分析: 如先兼顧使用者隱私的同時,也讓鑑識官能無限次檢查檔案?

Detailed Mechanism(?) 這份投影片,我採取的策略: 以定性敘述,取代定量分析

Detailed Mechanism(?) Algebra: Essential Parts: Group Theory Michael Artin Algebra Essential Parts: Group Theory Link: Here

Detailed Mechanism(?) Cryptography: Essential Parts: ??? Link: Here Oded Goldreich Foundations of Cryptography Essential Parts: ??? Link: Here

Detailed Mechanism(?) User Initilization 鄉民: 檢查方式 鑑識官向Amazon要求檢查部分的檔案 生成解密鑰匙,丟給鑑識官 生成公開參數,丟給Amazon 生成驗證碼丟給Amazon 鄉民刪除在自己硬碟上的檔案 檢查方式 鑑識官向Amazon要求檢查部分的檔案 Amazon利用混合的公開參數,對原始檔案Hash Amazon回傳Hash值、驗證碼 鑑識官由解密鑰匙解密Hash,與驗證碼做比對

Detailed Mechanism(?) 我很難相信你聽得懂 = =

Detailed Mechanism(?) 白話文解釋: 抽樣檔案 驗證碼 (stored in amazon) Amazon回傳的Hash Code 關鍵在於: 單獨 兩者的對應關係,沒有人清楚(亂數生成) 但是整體 正確對應關係,只有鑑識官知道(只有他有private key)

Detailed Mechanism(?) 其他保證的性質: Low Burden on Amazon: Constant large sending block(mathematical analysis…) Theoretically, if amazon misses 1% data, TPA only needs to audit for 460, 300 samples with probability more than 99%, 95% Support for Batch Auditing Mathematical Analysis

Detailed Mechanism(?) Mathematical Analysis: Storage Correctness: Amazon can not generate valid response toward TPA without faithfully storing the data Privacy Perserving Guarantee: TPA can not derive users’data conent from the information collected during the auditing porcess

Detailed Mechanism(?) Performance Analysis(Real Expriments) Compared with old method(+Privacy) Batch Processing

Some Comments

Some Comments 只能偵測到問題,無法修復 99%偵錯率夠嗎? 美中不足(雞蛋裡挑骨頭?) 過於理想化: TPA既不偏坦CSP也不偏袒使用者 對於動態資料未清楚說明: (可以套用[8]的結果) 只能偵測到問題,無法修復 99%偵錯率夠嗎?

Reference

Reference Wikipedia: Algebra: Michael Artin, 2nd Edition Foundations of Cryptography: Oded Goldreich Some slides from 陳君明老師 Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing(including some reference)

Q & A?