2011 IEEE 15th International Symposium on Consumer Electronics

advertisement
2011 IEEE 15th International Symposium on Consumer Electronics
Sue-Chen Hsueh*1, Jing-Yan Lin1, and Ming-Yen Lin2
1Dept. of Information Management, Chaoyang University of Technology, Taiwan (R.O.C.)
2Dept. of Information Engineering and Computer Science, Feng Chia University, Taiwan (R.O.C.)
{schsueh, s9914632} @cyut.edu.tw; linmy@fcu.edu.tw
指導老師:葉禾田
學生:碩研資傳一甲MA1F0101鄭明君
目錄

ABSTRACT

INTRODUCTION

RELATED WORK

THE PROPOSED METHOD

SECURITY ANALYSIS

CONCLUSION
ABSTRACT


The importance of the data stored in the smart phones is increased as more
applications are deployed and executed. Once the smart phone is damaged or
lost, the valuable information treasured in the device is lost altogether. If cloud
storage can be integrated with cloud services for periodical data backup of a
mobile client, the risk of data lost can be minimized.
智慧型手機存儲數據的重要性增強,隨著越來越多應用程序的
發展和執行。一旦智慧型手機損壞或遺失,全部重要的資訊,
因儲存在此設備中而一同遺失掉。如果雲端存儲能夠與雲端服
務合併,且週期性的對手機客戶端做資料庫備份,那麼數據遺
失的風險將最小化。
ABSTRACT




However, the important data might be uncovered by a malicious third party during retrieval
or transmission of information using wireless cloud storage without proper authentication
and protection. Therefore, in this paper, we design an archive mechanism that integrates
cloud storage, hybrid cryptography, and digital signatures to provide security requirements
for data storage of mobile phones.
然而,重要的數據可能無掩護的,被蓄意的第三者在檢索或發送資訊
的期間,使用無線雲端存儲資訊,這之中並沒有正確的身分驗證和保
護。因此本研究中,我們設計一個資料庫架構,合併雲端存儲、搭配
加密技術和數位簽章,提供智慧型手機資料庫存儲的安全需求。
Our mechanism not only can avoid malicious attackers from illegal access but also can
share desired information with targeted friends by distinct access rights.
我們的結構,不僅可避免不合法的惡意攻擊者,並且可以要求分享資
訊,針對朋友區別出不同的訪問權限。
INTRODUCTION




Though this is not a new technology, it is a new concept: the main purpose of the original
cloud is that “users can use the service anytime, anywhere through the Internet, directly
through the browser.”
雖然它不是一個新的技術,它是一個新的概念:最初雲端的主要目
的是“使用者可以透過網路,在任何時間、地方直接通過電腦瀏覽
器使用該服務“。
A huge operation procedure is automatically split into several smaller operation
procedures, processed by a number of extensive systems of the server, and the output
finally goes through the search and operations to return to the user. This approach can
handle thousands of processes like a “supercomputer.” In fact, “cloud” refers to the
“network,” that is, the network of operational capability.
一個使用計算工作的擴大軟體分散式,一個龐大的自動化過程,分
成幾個較小的操作程序,其過程是由一個大規模數量系統的伺服器,
以及最後經過搜索和操作,輸出返回至使用者。事實上,“雲端”
指的是“電腦網絡”,也就是電腦網絡操作上的能力。
INTRODUCTION


The alternative is to install software or replace the data stored on the computer;
because the cloud can use the desired browser for service, the data can be
stored in virtual space. The user only needs to enter simple commands to use
network services. In the future, smart phones and mobile devices would also be
able to use cloud computing for more services.
另一種選擇,是安裝軟體或取代電腦中的資料庫存儲;因為雲
端可針對瀏覽器對伺服器的要求,將該資料數據存儲在虛擬的
空間中。使用者只需要輸入簡單的指令來使用電腦網絡服務。
在未來,智慧型手機和移動式設備,也可以使用雲端計算做更
多的服務。
INTRODUCTION


Clouds need security too, but they are a new concept, so no safety standard has actually
been developed; each company is developing its own standards. Data security issues
include data stored in a server; servers can be accessed through browsers to obtain
internal information. If a hacker attacks many servers to steal information, data stored in
the server’s security is a concern.
雲端也需要安全性,但它們是一個新的概念,所以沒有實際上安全的
完善標準,發展中的每家公司都有屬於他們自己的一套標準。數據安
全的問題包括:數據存儲在伺服器中;伺服器可通過瀏覽器得到內部
的資訊。如果駭客攻擊許多伺服器以竊取資訊,數據存儲在伺服器中
的安全性,就是值得關心的事。
INTRODUCTION






Management reliability refers to cloud security mechanisms to prevent security
breaches. Protecting user privacy in clouds is the most important issue in the
industry.
管理的可信賴性,指的是雲端安全機制,防止遭到破壞的行為。
對企業而言,在雲端中保護使用者隱私是最為重要的問題。
Clouds have the feature of enabling user access anywhere at any time.
雲端具有授予使用者權力的特色,讓他們隨時隨地都能存取資
料。
the user only needs browsers connected to the network with the required
capabilities. Compared to before, traditional applications are expensive and
complicated for both hardware and software.
使用者僅需擁有連接網絡瀏覽器的必須能力。相較於之前,傳
統的應用是較昂貴和複雜的硬體、軟體。
INTRODUCTION


Mobile phones have become an integral part of life; mobile users store personal
data on phones, such as contact lists, text messages, photos, and programs.
Smart phones can perform many of the programs detailed above. Business
owners keep schedules in the phone; although the information may not be
important to other mobile users, it is important to the owner of the phone.
手機已成為生活中不可缺的部分;手機使用者在手機上存儲個
人數據,像是聯絡人列表、簡訊、照片和程序設計。智慧型手
機可以執行很多複雜的程序,業主存放日程安排表在手機中;
雖然對其他手機使用者而言,此資訊不是那麼重要的,但是這
對於業主而言是重要的。
INTRODUCTION




If the phone is lost or damaged, or phone numbers are changed, the issue
comes up of what to do with the data stored in the phone.
如果手機遺失或損壞,或者是電話號碼更改了,那麼帶來了一
個問題,即是為何要將數據存儲在手機中。
the data are backed up despite actions, but this procedure is not very convenient:
there is no means to update the data in real time. Remote backup is convenient
to business owners; by referring to the phone number, they can plan their
schedules and save important documents, which many people may find too
complicated to back up on a computer.
儘管數據有備份的功能,但此程序並不方便:在沒有辦法即時
更新數據,對於業主而言,遠距的備份是很方便的;對於查詢
電話號碼,他們可以計畫自己的時間表,並儲存重要的文件,
很多人可能會發現去做電腦的備份太複雜。
INTRODUCTION


if a phone is damaged or suddenly no longer working, there is no way to get data from
other places. Clouds have to be accessible over the network. However, with the constant
threats of attacks and tampering on the Internet, clouds do not have the best security
protection, so users do not want to store data there owing to concerns over tampering of
transmissions of personal data. In addition to these issues, there have been information
security incidents in the past as well as incidents of conspiracies to attack enterprises,
which involve the loss of a lot more data than general attacks.
如果手機被損壞或突然不再運作,那麼是否有辦法可以從其他地方取
得數據。雲端可透過網絡進入,然而隨著網路上不停的威脅攻擊和損
害、竄改,雲端不具最好的安全保護,所以使用者不想要傳送存儲數
據到雲端,擔憂屬於自己的數據遭到竄改。除了這些問題,過去已有
資訊安全事件,是企業遭受到陰謀攻擊,此攻擊比一般攻擊,還要牽
涉到更大量的數據損失。
INTRODUCTION


Simply by using clouds, users can store personal data and back up actions. The
cloud can also be used simply for personal data management and real-time
updates. It can be used anytime and anywhere by users with mobile phones as a
carrier. The biggest issue with mobile users keeping personal data in the cloud is
security of the personal data.
透過簡單的使用雲端,使用者能夠存儲個人數據和做備份的動
作。雲端也可以簡單的使用於個人數據管理和即時的更新。它
可以讓手機使用者,隨時隨地使用作為載體。手機使用者最大
的問題,是在雲端中保持個人數據的安全性。
INTRODUCTION

In this study, a method was developed by which mobile users register and share
in a stage through the certification center to verify the signature of legitimate
sources. Mobile users generate a random number that is passed along to
telecommunication. The telecommunication returns random values to verify
the transmission of the user registration information. The transmission
process uses the hash function to verify whether the transmission was
tampered with. If any tampering is found, the transmission is not performed.
本文的研究中,發展出一個對於手機使用者註冊和分享的階段
方式:
-透過認證中心證明簽名的合法來源
-手機使用者產生出亂數的一組數字傳遞給電信
-電信回報亂數來證明使用者所傳送的註冊資訊
-傳輸的過程中使用雜湊函數來證明,是否發送途中遭到竄改,
如果發現任何篡改,發送不會完成執行。

INTRODUCTION

Trust is important among mobile users, telecommunication, and clouds, so the
method generates a secret value that is only known to the three parties. If any
party receives a message with no secret value, then no action is performed. In
the telecommunication database, storage of personal data is encrypted,
which also prevents attacks and internal staff theft. The use of encryption
methods, digital signature, hash function, random number, and secret value is to
let users have peace of mind in a cloud environment.

手機使用者之間的信任是很重要的,電信和雲端,應該產生只
有此三方所知道的秘密值,如果任何一方收到沒有秘密值的訊
息,則不用執行動作。在電信數據庫中,加密個人數據的存儲,
這也可以防止攻擊和內部人員盜竊數據。使用的加密方法:數
位簽章、雜湊函數、亂數和秘密值,讓使用者對雲端的環境感
到安心。
RELATED WORK

Google Storage [4] for Developers offers a rich set of features and capabilities. The basic
operations are as follows: (1) store and access data from anywhere on the Internet; (2)
Range determination for large objects; and (3) manage metadata. Security and sharing
have the following features: (1) user authentication using secret keys or a Google account;
(2) authenticated downloads from a Web browser for Google account holders; (3) secure
access using SSL; (4) easy and powerful sharing and collaboration via ACLs for
individuals and groups.
Google存儲[4]為開發者提供一套豐富的特色和功能,基本操作如下:
-(1)在任何地方透過網際網路存儲和進入數據。
-(2)範圍確定為大量的對象。
-(3)管理元數據,安全和分享有以下特色:
1. 使用者身分驗證使用的密鑰或Google的帳戶。
2. Google帳戶持有者,從網絡瀏覽器下載驗證。
3. 安全的使用SSL 。
4. 給予個人和團體,經由存取控制安全機制,簡單且強大的共享和合
作。

RELATED WORK

Performance and scalability have the following features: (1) strong data consistency (readafter-write consistency for all uploads and deletes operations); (2) name space for the
user domain (only the user can create bucket URIs containing the domain name); and (3)
data replicated in multiple data centers across the USA and within the same data center.
Finally, the tools include (1) a Web-based storage manager; (2) GSUtil, which is an opensource command line tool; and (3) compatibility with many existing cloud storage tools
and libraries.
性能和可擴展性,具有以下特色:
-(1)強大數據的一致性(讀寫之後,所有上傳和刪除操作的一致
性)。
-(2)區域使用者的名字空間(只有使用者能夠創建bucket URI控制的
的區域名字)。
-(3)並聯數據中心透過美國和內部相同的數據中心,做數據的複製。
最後,這些工具包括:
1. 一個基礎網站存儲的負責人。
2. Google Storage的工具GSUtil,這是一個命令方式的工具來源。
3. 與許多現有的雲端存儲工具和圖書館查詢系統做相容。

RELATED WORK

With respect to functionality, Amazon S3 is intentionally built with a minimal feature set. It
has the following features. (1) Write, read, and delete objects containing 1 byte to 5
terabytes of data each; the number of objects that can be stored is unlimited. (2) Each
object is stored in a bucket and retrieved via a unique developer assigned key. (3) A
bucket can be stored in one of several regions. The user chooses a region to optimize
latency, minimize costs, or address regulatory requirements. Amazon S3 is currently
available in the US Standard, EU (Ireland), US West (Northern California), Asia Pacific
(Singapore), and Asia Pacific (Tokyo) regions. The US Standard region automatically
routes requests to facilities in northern Virginia or the Pacific Northwest by using network
maps.
關於功能的部分,Amazon S3是有意建立一個極微的特色安裝。它
具有以下特色:
-(1)寫入、讀出並刪除目標,目標包含1byte到5TB的數據;它能夠
存儲的包含數量是無限制的。
-(2)每個目標都存儲在一個bucket和檢索、擷取資訊,經由唯一的開
發者指定鑰匙。
-(3)一個能夠大量存儲的幾個地區,使用者選擇一個地區有效的進
行潛在因素、降低成本或滿足管理的需求。Amazon S3是目前美國
有效的標準,歐盟(愛爾蘭島)、美西(北加州)、亞洲太平洋(新
加坡)和亞洲太平洋(東京)地區。美國的標準地區,自動路由要求
北邊的美國維吉尼亞州或西北太平洋,使用網絡地圖的設施。

RELATED WORK

(4) Objects stored in a region never leave the region unless transferred out by the user.
For example, objects stored in the EU (Ireland) region never leave the EU. (5)
Authentication mechanisms are provided to ensure that data are kept secure from
unauthorized access. Objects can be made private or public, and rights can be granted to
specific users. (6) Standards-based REST and SOAP interfaces are designed to work with
any Internet development toolkit.
-(4)目標存儲在一個地區就絕對不會離開這個地區,除非使用者自
行轉換出該地區。例如,在歐盟(愛爾蘭)地區存儲的目標永就遠不
會離開歐盟。
-(5)提供認證機制,以擔保數據維持著安全,且未授權者不得已進
入為條件。對象可以是私人或公眾的,以及能夠授予特定的用戶。
-(6)基於標準的表徵狀態轉移和簡單物件存取協定的連繫裝置,設
計與任何網路開發成套工具的工作。
RELATED WORK

(7) It has flexibility so that a protocol or functional layers can be added easily. The
default download protocol is HTTP. A BitTorrent™ protocol interface is provided
to lower costs for high-scale distribution. (8) Amazon S3 is reliable and is backed
with the Amazon S3 Service Level Agreement.
-(7)它是具有彈性的,電腦之間通信與資料傳送所遵守的規
則或機能層能夠額外的容易。HTTP是系統默認值的下載擬訂。
一個BitTorrent™擬訂連繫裝置為條件,以降低成本為高規模
分佈。
- (8)Amazon S3是可信賴的,且Amazon S3有財力支持的服
務公平協議。
RELATED WORK

補充:BitTorrent客戶端
RELATED WORK
Amazon S3
- Amazon S3,全名為亞馬遜簡易儲存服
務(Amazon Simple Storage Service),
由亞馬遜公司,利用他們的亞馬遜網路
服務系統所提供的網路線上儲存服務。
經由Web服務界面,包括REST, SOAP,
與BitTorrent,提供用戶能夠輕易把檔案
儲存到網路伺服器上。

RELATED WORK


With respect to data protection, Amazon S3 provides a highly durable storage
infrastructure designed for mission critical and primary data storage. Amazon S3
PUT and COPY operations synchronously store data across multiple facilities
before returning SUCCESS. Once stored, Amazon S3 maintains the durability of
objects by quickly detecting and repairing any lost redundancy.
重視數據保護方面,Amazon S3提供了一個設計好的高耐用
的存儲基礎架構,專為存儲作戰任務和主要數據。Amazon
S3寫上和複製運算同步的存儲數據,成功的回報之前會穿過
並聯的設施。一旦儲存,Amazon S3保持耐久性的目標,藉
由快速察覺和修理任何遺失的冗位。

Amazon S3 also regularly verifies the integrity of data stored using checksums. If
corruption is detected, it is repaired by using redundant data.

Amazon S3也定期核對完整的數據存儲,使用一種依據封包
內容計算出來的值。如果檢測到損壞時,它是藉由使用多餘的
數據修復。
RELATED WORK

Amazon S3 [5] provides further protection via Versioning. Versioning can be used
to preserve, retrieve, and restore every version of every object stored in an
Amazon S3 bucket. This allows a user to easily recover from both unintended
actions and application failures.

Amazon S3[5]經由軟件版本提供進一步的保護,軟件版本能
夠使用於保存、檢索和恢復,對於每個版本中每個目標存儲在
Amazon S3中的bucket,這允許使用者可以簡單的恢復非故
意的行動和應用故障兩者。
RELATED WORK


Reduced redundancy storage (RRS) is a new storage option within Amazon S3 that
enables customers to reduce their costs by storing noncritical, reproducible data at lower
levels of redundancy than Amazon S3’s standard storage. It provides a cost-effective,
highly available solution for distributing or sharing content that is durably stored elsewhere
or for storing thumbnails, transcoded media, or other processed data that can be easily
reproduced.
減少冗餘的存儲(RRS),在Amazon S3中是一種新的選擇,能夠
讓使用者減少他們的費用,藉由非關鍵的貯存,比起 Amazon S3’s
的標準存儲,冗餘的低水平數據可再生。它提供了具有成本效益、高
度可用的解決方式,分類和分享滿足,它用於在別處持久的存儲,是
極小的存儲、中間的轉碼,或其他能夠簡單被複製的數據過程。
THE PROPOSED METHOD

3.1 Overall Framework

Data storage in the cloud is designed so that users can use mobile phones as a platform
to upload, download, share, and synchronize information through cloud computing
anywhere at any time. Security uses a combination of TPM chips in the mobile phones to
protect the identity of mobile users as well as security technology to protect data
transmissions from malicious attacks and tampering for data integrity.

3.1整體的架構
在雲端中的數據存儲設計,以便使用者能夠使用手機作為一個平台,
用來上傳、下載、分享和同步資訊,在任何地方和任何時間,通過雲
端使用電腦。在手機中安全性的使用,結合可信平台模塊的晶片,以
保護手機使用者的身分,不但是安全的技術,也是保護數據的傳送,
避免遭受到惡意的攻擊和數據完整性的損壞。


可信平台模塊(TPM, Trusted Platform Module)是一種使微控制器
能控存儲安全數據的規格,也是這種規格的應用。該規格由可信計算
組(Trusted Computing Group)來制定。
THE PROPOSED METHOD




For registration, synchronization, and sharing, the identity of mobile users is also
protected through third-party certification. A certification center confirms the
source of a signature; the user must confirm the legality of the source operation.
After legal user authentication, the center allows data transmission to the
destination.
對於註冊、同步化和分享,手機使用者的身分,也是透過第三
方受法律保護的認證,一個認證中心證實簽名的來源,使用者
必須證實操作來源的合法性,證實合法的使用者之後,中心允
許傳送數據到目的地。
The system architecture consists of mobile users, an authentication center,
telecommunication, and cloud form. The tasks are divided into registration,
upload, download, sharing, and synchronization processes. The roles of the
components for the main tasks are presented in Table 1.
該系統結構的組成,包括手機使用者、認證中心、電信和雲端
形式。任務被分割為註冊、上傳、下載、分享和同步化的過程。
構成的要素作用,其現在主要的任務於Table 1.。
THE PROPOSED METHOD
作用
任務
手機使用者
上傳、下載、分享、同步
憑證依據
驗證來源
電信
產生雲端密碼、存儲使用者
資訊的動作
雲端
存儲手機使用者個人資訊
THE PROPOSED METHOD
cloud password
THE PROPOSED METHOD

3.2 Five Stages of the Method

For mobile users to use the cloud, the process can be divided into five steps:
registration, upload, download, sync, and sharing. Next, the procedure for each
of these steps is detailed. Table 2 lists the notations used in the paper.

3.2五個階段的方法
對於手機使用者在雲端的使用,能夠被分割為五個階段的步驟:
註冊、上傳、下載、同步和分享,接著,對於每一個詳細的步
驟,本文的Table 2.會列出符號來作為使用。

THE PROPOSED METHOD
符號
敘述
MUx
手機使用者
NOx
電話號碼
TE
電信
CA
憑證授權
Un
亂數
CPW
雲端服務密碼
SV
秘密值
TK
隨機電話號碼&雲端服務密碼
h(k)
雜湊函數
Sx(k)
x ‘s 的簽名
PKx
x ‘s 的公開金鑰
SKx
x ‘s 的祕密金鑰
SEK
對稱金鑰
THE PROPOSED METHOD
• 註冊階段(Fig. 2)
• 步驟一:手機使用者發送資訊給予認證中心。
• 手機使用者→憑證授權
傳送資訊包含手機使用者名字、號碼和利用私人簽名的密碼,其中包含雜湊函數,使
用者認證中心使用簽名確定合法性的動作,在申請之後傳送註冊訊息,接著使用雜湊
函數證明手機使用者的身份。
THE PROPOSED METHOD
• 步驟二:認證中心收到電信傳送的資訊
• 憑證授權→電信
使用者收到認證動作的資訊,首先要考慮的,是否要開啟證實的資訊數據,雜湊
函數是用於驗證的,如果它是正確的,為認證中心的私人簽名,那麼識別是合法
且有效的資訊,數據會接著從電信,傳送到受信任的第三方那。
THE PROPOSED METHOD
• 步驟三:電信收到註冊資訊產生雲端
服務密碼
• 電信
電信收到註冊資訊後產生雲端服務密碼,
註冊的資訊用於隨機電話號碼與雲端服
務密碼中,將憑證授權譯成密碼,存儲
在電信的數據庫,除了雲端服務密碼,
數據庫也存儲著確認後的使用者動作名
稱,實行後,電信收到驗證過的註冊訊
息,接著回覆且傳遞資訊給手機使用者,
它也通過手機使用者的公開金鑰加密,
包括手機使用者的名字、號碼,手機使
用者具有雜湊函數,此資訊證明手機使
用者對雲端服務密碼,使用隨機電話號
碼與雲端服務密碼加密。
THE PROPOSED METHOD
• 步驟四:認證中心轉換傳遞給手機使用者
• 憑證授權→手機使用者
• 步驟五:使用者完成註冊動作,收到訊息包括手機使用者、電話號碼和雲端服務
密碼
收到的訊息包括手機使用者、電話號碼和雲端服務密碼。電信接收到被送回的資
訊給手機使用者,SIM card會存儲名字、號碼和雲端服務密碼,雲端服務密碼提
供使用者可信平台模塊的公共金鑰加密,可傳遞手機號碼在可信平台模塊的晶片。
THE PROPOSED METHOD
• 步驟六:存儲在手機記憶體
資訊存儲在手機記憶體中的可信平台模塊,自手機使用者使用雲端以來,密碼
從簡單的從記憶體取出,然後通過可信平台模塊晶片的使用來解密碼。
THE PROPOSED METHOD
THE PROPOSED METHOD
• 上傳階段(Fig 3.)
• 步驟一:手機使用者上傳數據
• 手機使用者→雲端
一則訊息包括雲端服務密碼、名字和上傳數據,是將發送的上傳數據譯成密碼
加上對稱金鑰。手機使用者使用他們自己私鑰簽名,從雲端中獲取資訊,這證
實資訊來源的正確性,和數據存儲在雲端的有效性。
THE PROPOSED METHOD
• 下載階段(Fig 4.)
• 步驟一:手機使用者發送下載資訊包括雲端服務密碼、手機使用者、雜湊函數
資訊包含雲端服務密碼和手機使用者名字,這也包括雜湊函數。以這種方式,雲端
能夠證實手機使用者的來源是否正確,以及傳送的過程是否遭到竄改。
• 步驟二:在雲端報告使用者個人數據
如果是非有效的資訊來源,和正確的一樣且發現被竄改,雲端會回報手機使用者個
人數據。
THE PROPOSED METHOD
•同步階段(Fig 5.)
• 步驟一:手機使用者使用手機A上傳數據
• 步驟二:手機使用者使用手機B進入雲端
手機使用者使用手機B進入雲端,手機使用者的名字和隨機電話號碼與雲端服務
密碼,使用於被使用者簽名,以及秘密值雜湊函數,證明手機使用者的身份。
• 步驟三:雲端傳遞訊息給電信
• 雲端→電信
雲端收到從手機使用者使用手機B和證實手機使用著雜湊函數訊息,如果正確,
雲端依照來自使用者的名字為行動,名字和隨機電話號碼與雲端服務密碼,傳
遞給電信,接著將名字和隨機電話號碼與雲端服務密碼,通過雲端服務密碼給
手機使用者。
THE PROPOSED METHOD
• 步驟四:電信傳遞雲端服務密碼給手機使用者
• 電信→手機使用者
電信使用隨機電話號碼與雲端服務密碼,在雲端服務密碼資料庫暗語前,使雲
端開啟現存的手機使用者。手機使用者的公開金鑰,是接著傳遞給手機使用者,
去允許他們簡單的進入雲端。
• 步驟五:手機使用者收到雲端服務密碼和貯存雲端服務密碼,手機使用者和
雜湊函數在手機B的記憶體,並且再一次進入雲端。
• 步驟六:允許進入雲端和雲端檢察雲端服務密碼
THE PROPOSED METHOD
THE PROPOSED METHOD
• 分享階段(Fig 6.)
• 步驟一:手機使用者B分享數據的必要條件
手機使用者B想要手機使用著A的個人數據,B發送一個訊息給A,訊息必須包含
手機使用者B的名字和號碼,以便手機使用者A知道對方是誰,亂數和認證中心通
過私人的簽名,去允許兩名手機使用者,相信第三方傳送這個紀錄,給予聯合的
分享行動。
• 步驟二:憑證授權驗證簽名
憑證授權驗證手機使用者B,以及是否數據在運輸期間遭竄改,如果沒有,認證
中心採用他們的私人簽名鑰匙,將資訊傳遞給手機使用者A。
THE PROPOSED METHOD
• 步驟三:手機使用者A去證明手機使用者B的身份驗證
手機使用者A通過訊息給認證中心,如果手機使用者B是已知的,手機使用者A的
名字、號碼、對稱金鑰和雲端服務密碼,都將運用亂數一起傳遞給手機使用者B,
B證實此行動是由A發送過來的。
• 步驟四:傳輸完整無缺的認證中心
• 步驟五:手機使用者B進入雲端
手機使用者B收到手機使用者A的訊息,並使用該簽名、雲端服務密碼的私有密鑰,
和手機使用者A的名字、號碼,去拜訪雲端。然而,在這個階段中,手機使用者B
不能下載手機使用者A的個人行動數據。
THE PROPOSED METHOD
SECURITY ANALYSIS




Conspiracy:
A conspiracy between enterprises in order to earn more interest would violate the moral
conscience. A member of the database may sell information to other companies to earn fees.
Collusion between two companies may occur: the members leak information and jointly
deceive users, who are unaware of what is happening. To prevent this, in the proposed
method, the authentication center, telecommunication, and cloud do not store too much
personal information. Instead, the information is stored in the enterprise and encryption
technology is used for ciphertext, which lets businesses transmit information only to real
members, as all ciphertext is protected.
陰謀:
一個陰謀資料庫的成員可能將資訊賣給其他公司去賺取賞金。兩個公
司之間的勾結可能發生:成員洩漏資訊和聯合欺騙使用者,誰都不知
道發生了什麼事情,為了防止這些事情的發生,被提議的方法,認證
中心、電信和雲端不要存儲太多的個人資訊,反而資訊用密文來做公
司存儲和加密技術,只有真正的成員可以傳送生意資訊,因為所有密
文是受到保護的。在公司之間,為了賺取更多利益,將違反道德上的
良心。
SECURITY ANALYSIS




Not credible:
Irrespective of the circumstances, when a message or mail is received, the credibility of
the source will be doubted with a security breach. In the method, a certified center is used
to confirm the identity of the source in addition to multi-layer protection as well as achieve
non-repudiation. Digital signature technology can confirm the identity. This way, only digital
signatures from the sender using the receiver’s public key can be used to open a message.
Without the sender’s private key, the message cannot be opened.
不可信的:
不管在何種情況下,當訊息或郵件是被承認的,它的來源可信度將會
因為安全破壞而受到懷疑。在方法中,認證中心使用證實身份來源,
除了多層保護之外,也完成不可否認性,數位簽章技術能夠證實身份,
這種方式只有從寄件人的數位簽章,使用收件人的公開金鑰能夠習慣
開啟訊息,如果沒有寄件人的私有密鑰,這個訊息是打不開的。
SECURITY ANALYSIS


Attack:
In the Internet, users can be attacked everywhere. As long as the Internet is accessed to
send a message, the message transmission is subject to attack. In the method, the
existence of personal data in the cloud must be through the Internet. An attacker may be
present, but in this method, the transmission is encrypted asymmetrically. The transfer
also includes one-way hash functions that are encrypted and cannot be decrypted by
only an action without verification.


攻擊:
在網路上,使用者的攻擊能夠無所不在,只要進入網路發送一個訊
息,訊息傳送成為攻擊的對象。在方法中,個人數據必須透過網路
存在於雲端,攻擊者可能存在,但是在這個方法中,傳送是將非對
稱譯成密碼,傳送也包括單向雜湊函數,僅由動作無法證明此譯成
密碼和不能解的密碼。
CONCLUSION




In the study, we used some very simple security technology. During transmission, each
character is recognized by using the hash function to determine whether the transfer was
deliberately tampered with during the process.
在本研究中,我們使用非常簡單的安全技術。在傳送的期間,每個
性質是透過使用雜湊函數做識別的決定,在轉移期間的過程,慎重
於是否竄改。
Communication between mobile users uses a random number, so that parties can be
recognized. A message for mobile users is verified by a trusted thirdparty certificate
authority. Messages can be transmitted with more layers of protection. If a user does not
admit to sending or receiving messages, the recovery of information can be checked at
the certification center.
通信在手機使用者之間使用亂數,以便當事人能夠識別,一則訊息
對於手機使用者是已證實的,透過信任的第三方憑證授權,訊息能
夠和更多的保護層傳送,如果使用者不承認發送或接收到訊息,資
訊的獲得能夠從認證中心來檢查。
CONCLUSION




The digital signature can also be used to recognize legal status. In each role, data are not
stored to the database, as internal staff may take it for illegal purposes. Not storing the
data also reduces the opportunities for internal attackers. To handle external attackers,
the encryption method is asymmetric.
數位簽章也能夠使用於識別合法的身份,在每個角色中,數據不能
夠存儲在數據庫中,內部的人員可能拿它用於非法的目的,不能貯
存數據也減少內部攻擊者的機會,要處理外部攻擊者,加密方法是
不對稱的。
Personal data are stored into the clouds so that the text is stored in secret with the hash
function used for validation. A disposable lost session key is encrypted into the cloud. This
is different for every upload, so it is difficult for an attacker to break.
個人數據存儲進到雲端,以便機密的文本存儲與確認雜湊函數的使
用,可自由使用遺失的對稱金鑰,進行加密到雲端中,每一個上傳
都是不同的,所以對於攻擊者而言是難以打破的。
Download