WEKO3
アイテム
{"_buckets": {"deposit": "4e4160a3-5a0e-45ac-bcb4-49f08df8002a"}, "_deposit": {"created_by": 15, "id": "18515", "owners": [15], "pid": {"revision_id": 0, "type": "depid", "value": "18515"}, "status": "published"}, "_oai": {"id": "oai:sucra.repo.nii.ac.jp:00018515", "sets": ["925"]}, "author_link": ["29503"], "item_113_alternative_title_1": {"attribute_name": "タイトル(別言語)", "attribute_value_mlt": [{"subitem_alternative_title": "クラウドストレージにおける多重グループデータの安全な重複除外について"}]}, "item_113_biblio_info_9": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2018", "bibliographicIssueDateType": "Issued"}}]}, "item_113_date_35": {"attribute_name": "作成日", "attribute_value_mlt": [{"subitem_date_issued_datetime": "2019-02-08", "subitem_date_issued_type": "Created"}]}, "item_113_date_granted_20": {"attribute_name": "学位授与年月日", "attribute_value_mlt": [{"subitem_dategranted": "2018-03-23"}]}, "item_113_degree_grantor_22": {"attribute_name": "学位授与機関", "attribute_value_mlt": [{"subitem_degreegrantor": [{"subitem_degreegrantor_name": "埼玉大学"}], "subitem_degreegrantor_identifier": [{"subitem_degreegrantor_identifier_name": "12401", "subitem_degreegrantor_identifier_scheme": "kakenhi"}]}]}, "item_113_degree_name_21": {"attribute_name": "学位名", "attribute_value_mlt": [{"subitem_degreename": "博士(学術)"}]}, "item_113_description_13": {"attribute_name": "形態", "attribute_value_mlt": [{"subitem_description": "xvii, 112 p.", "subitem_description_type": "Other"}]}, "item_113_description_23": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "With the tremendous growth of available digital data, the use of Cloud Service Providers are gaining much popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, cloud storage providers often employ data deduplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users’ privacy concerns, as these techniques typically require full access to data.\n\nIn this thesis, we propose solutions for two secure multiple group setting data deduplication in cloud environments. Firstly, we propose a new framework DDUP-MUG (deduplication for the multiplegroup signature scheme) that allows one or more groups to access a file such that the cloud storage server can avoid duplicates according to the ownership of the file. The main goal of the primitive red is allowing individual management to multiple groups. We propose the group managers mainly manage the new entities and produce revocation lists for clients and the server respectively. We use Message-Locked Encryption (MLE) as an ingredient for deduplication and we provide new three protocols, namely UPL-Dup (for uploading a new message), EDT-Dup (for editing the existing message) and DEL-Dup(for eliminating the existing message) in the DDUP-MUG framework.\n\nFurthermore, we propose a new primitive group signcryption for deduplication called verifiable hash convergent group signcryption (VHCGS) by adding the properties of group signcryption and the verification facilities for the storage server(third party). An interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better performance than the traditional signature-then-encryption approach. According to the deduplication, we propose a new method for a group of users that can eliminate redundant encrypted data owned by different users.", "subitem_description_type": "Abstract"}]}, "item_113_description_24": {"attribute_name": "目次", "attribute_value_mlt": [{"subitem_description": "Abstract i\nAcknowledgments iii\nList of figures v\nList of tables vi\nPublications vii\nAbbreviations x\nNotations xii\n1 Introduction 1\n1.1 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2\n1.2 Motivating applications . . . . . . . . . . . . . . . . . . . . . . . . . 7\n1.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n1.4 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 11\n1.5 Structure of this Thesis . . . . . . . . . . . . . . . . . . . . . . . . . 13\n2 Cryptographic Mechanism 14\n2.1 Public Key Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 14\n2.2 Hash Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15\n2.3 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16\n2.4 Group Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n2.5 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n2.6 Computational Primitives . . . . . . . . . . . . . . . . . . . . . . . 19\n2.6.1 Integer Factorization . . . . . . . . . . . . . . . . . . . . . . 19\n2.6.2 Discrete-Logarithm . . . . . . . . . . . . . . . . . . . . . . . 20\n2.7 Security Notions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22\n2.7.1 Steps to Achieving Provable Security . . . . . . . . . . . . . 22\n2.7.2 Confidentiality Notion . . . . . . . . . . . . . . . . . . . . . 22\n2.7.3 Unforgeability Notion . . . . . . . . . . . . . . . . . . . . . . 26\n2.7.4 Random Oracle Model . . . . . . . . . . . . . . . . . . . . . 28\n3 Cloud Computing 30\n3.1 Cryptographic Mechanisms of the Cloud . . . . . . . . . . . . . . . 32\n3.1.1 Searchable Encryption . . . . . . . . . . . . . . . . . . . . . 33\n3.1.2 Homomorphic Encryption . . . . . . . . . . . . . . . . . . . 33\n3.1.3 Computing Aggregates over Encrypted Data . . . . . . . . . 34\n3.2 Functional Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 34\n3.2.1 Order Preserving Encryption . . . . . . . . . . . . . . . . . . 35\n3.2.2 Identity-based encryption . . . . . . . . . . . . . . . . . . . 35\n3.2.3 Attributed-based Encryption . . . . . . . . . . . . . . . . . . 36\n3.2.4 Predicate Encryption . . . . . . . . . . . . . . . . . . . . . . 36\n3.3 Verifiable Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 37\n3.3.1 Verifiable Outsourced Computation . . . . . . . . . . . . . . 37\n3.3.2 Verifiable Storage . . . . . . . . . . . . . . . . . . . . . . . . 37\n3.4 Other Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38\n3.4.1 Format Preserving Encryption . . . . . . . . . . . . . . . . . 38\n3.4.2 Proxy Re-encryption . . . . . . . . . . . . . . . . . . . . . . 39\n3.4.3 Secure Deduplication . . . . . . . . . . . . . . . . . . . . . . 39\n4 Cloud Data Deduplication 41\n4.1 Cloud Storage and Issues . . . . . . . . . . . . . . . . . . . . . . . . 41\n4.2 Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42\n4.2.1 Client-Side Deduplication . . . . . . . . . . . . . . . . . . . 43\n4.2.2 Server-Side Deduplication . . . . . . . . . . . . . . . . . . . 43\n4.2.3 Level of Data Deduplication . . . . . . . . . . . . . . . . . . 43\n4.3 Data Deduplication Techinical Design Issues . . . . . . . . . . . . . 44\n4.3.1 Types of Data Deduplication . . . . . . . . . . . . . . . . . . 45\n4.3.2 Client vs Server Side Deduplication . . . . . . . . . . . . . . 46\n4.3.3 Single User vs Cross User Deduplication . . . . . . . . . . . 46\n4.4 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47\n4.4.1 Convergent or Message-locked Encryption . . . . . . . . . . 47\n4.4.2 Proofs of Ownership . . . . . . . . . . . . . . . . . . . . . . 50\n5 Multiple Group Signature Setting 52\n5.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52\n5.1.1 Group Signature . . . . . . . . . . . . . . . . . . . . . . . . 53\n5.1.2 Group Signature from Unlikable Randomizable Signature . . 55\n5.2 Management Policy of Proposed Scheme . . . . . . . . . . . . . . . 55\n5.3 Proposed Scheme Architecture . . . . . . . . . . . . . . . . . . . . . 56\n5.3.1 System Setup Protocol . . . . . . . . . . . . . . . . . . . . . 58\n5.3.2 Upload Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 59\n5.3.3 Edit Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 60\n5.3.4 Delete Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 62\n5.3.5 Restore Protocol . . . . . . . . . . . . . . . . . . . . . . . . 63\n5.4 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63\n5.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 69\n6 Multiple Group Signcryption 71\n6.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72\n6.1.1 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 72\n6.1.2 Original Signcryption Scheme . . . . . . . . . . . . . . . . . 72\n6.1.3 Public Verifiable Signcryption Scheme . . . . . . . . . . . . 73\n6.1.4 Group Signcryption Scheme . . . . . . . . . . . . . . . . . . 74\n6.2 Proposed Scheme Architecture . . . . . . . . . . . . . . . . . . . . . 75\n6.2.1 KeyGen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75\n6.2.2 Join . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76\n6.2.3 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 76\n6.2.4 Partial Unsigncryption . . . . . . . . . . . . . . . . . . . . . 77\n6.2.5 Unsigncryption . . . . . . . . . . . . . . . . . . . . . . . . . 77\n6.3 Application in Cloud Computing . . . . . . . . . . . . . . . . . . . 78\n6.3.1 System Setup Protocol . . . . . . . . . . . . . . . . . . . . . 79\n6.3.2 Upload Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 80\n6.3.3 Download Protocol . . . . . . . . . . . . . . . . . . . . . . . 81\n6.4 Application in Mobile Data Transmission . . . . . . . . . . . . . . . 81\n6.4.1 System Setup . . . . . . . . . . . . . . . . . . . . . . . . . . 82\n6.4.2 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 83\n6.4.3 Partial-Unsigncryption . . . . . . . . . . . . . . . . . . . . . 83\n6.4.4 Unsigncryption . . . . . . . . . . . . . . . . . . . . . . . . . 83\n6.5 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84\n6.6 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 88\n7 Related Research and Future Improvements 90\n7.1 Proxy Re-encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 90\n7.1.1 Motivation of Proxy Re-encryption . . . . . . . . . . . . . . 93\n7.1.2 Syntax of our PRE scheme . . . . . . . . . . . . . . . . . . . 94\n7.2 Future Improvements . . . . . . . . . . . . . . . . . . . . . . . . . . 96\n8 Conclusion 97\n8.1 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97\nReferences 100", "subitem_description_type": "Other"}]}, "item_113_description_25": {"attribute_name": "注記", "attribute_value_mlt": [{"subitem_description": "指導教員 : 重原孝臣", "subitem_description_type": "Other"}]}, "item_113_description_33": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"subitem_description": "text", "subitem_description_type": "Other"}]}, "item_113_description_34": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_113_dissertation_number_19": {"attribute_name": "学位授与番号", "attribute_value_mlt": [{"subitem_dissertationnumber": "甲第1087号"}]}, "item_113_identifier_registration": {"attribute_name": "ID登録", "attribute_value_mlt": [{"subitem_identifier_reg_text": "10.24561/00018485", "subitem_identifier_reg_type": "JaLC"}]}, "item_113_publisher_11": {"attribute_name": "出版者名", "attribute_value_mlt": [{"subitem_publisher": "埼玉大学大学院理工学研究科"}]}, "item_113_publisher_12": {"attribute_name": "出版者名(別言語)", "attribute_value_mlt": [{"subitem_publisher": "Graduate School of Science and Engineering, Saitama University"}]}, "item_113_record_name_8": {"attribute_name": "書誌", "attribute_value_mlt": [{"subitem_record_name": "博士論文(埼玉大学大学院理工学研究科(博士後期課程))"}]}, "item_113_text_31": {"attribute_name": "版", "attribute_value_mlt": [{"subitem_text_value": "[出版社版]"}]}, "item_113_text_36": {"attribute_name": "アイテムID", "attribute_value_mlt": [{"subitem_text_value": "GD0000992"}]}, "item_113_text_4": {"attribute_name": "著者 所属", "attribute_value_mlt": [{"subitem_text_value": "埼玉大学大学院理工学研究科(博士後期課程)理工学専攻"}]}, "item_113_text_5": {"attribute_name": "著者 所属(別言語)", "attribute_value_mlt": [{"subitem_text_value": "Graduate School of Science and Engineering, Saitama University"}]}, "item_113_version_type_32": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "EI, MON CHO", "creatorNameLang": "en"}, {"creatorName": "イ, モン チョ", "creatorNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "29503", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-02-08"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "GD0000992.pdf", "filesize": [{"value": "1.9 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1900000.0, "url": {"label": "GD0000992.pdf", "objectType": "fulltext", "url": "https://sucra.repo.nii.ac.jp/record/18515/files/GD0000992.pdf"}, "version_id": "2b8b0a29-1770-46eb-919f-cdfb67b7399f"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "doctoral thesis", "resourceuri": "http://purl.org/coar/resource_type/c_db06"}]}, "item_title": "Secure Multiple Group Data Deduplication in Cloud Data Storage", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Secure Multiple Group Data Deduplication in Cloud Data Storage", "subitem_title_language": "en"}]}, "item_type_id": "113", "owner": "15", "path": ["925"], "permalink_uri": "https://doi.org/10.24561/00018485", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2019-02-08"}, "publish_date": "2019-02-08", "publish_status": "0", "recid": "18515", "relation": {}, "relation_version_is_last": true, "title": ["Secure Multiple Group Data Deduplication in Cloud Data Storage"], "weko_shared_id": -1}
Secure Multiple Group Data Deduplication in Cloud Data Storage
https://doi.org/10.24561/00018485
https://doi.org/10.24561/0001848511dbdab6-084b-4fd0-9414-d190c4e39bf4
名前 / ファイル | ライセンス | アクション |
---|---|---|
GD0000992.pdf (1.9 MB)
|
|
Item type | 学位論文 / Thesis or Dissertation(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2019-02-08 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Secure Multiple Group Data Deduplication in Cloud Data Storage | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_db06 | |||||
資源タイプ | doctoral thesis | |||||
ID登録 | ||||||
ID登録 | 10.24561/00018485 | |||||
ID登録タイプ | JaLC | |||||
アクセス権 | ||||||
アクセス権 | open access | |||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||
タイトル(別言語) | ||||||
その他のタイトル | クラウドストレージにおける多重グループデータの安全な重複除外について | |||||
著者 |
EI, MON CHO
× EI, MON CHO |
|||||
著者 所属 | ||||||
埼玉大学大学院理工学研究科(博士後期課程)理工学専攻 | ||||||
著者 所属(別言語) | ||||||
Graduate School of Science and Engineering, Saitama University | ||||||
書誌 | ||||||
収録物名 | 博士論文(埼玉大学大学院理工学研究科(博士後期課程)) | |||||
書誌情報 |
発行日 2018 |
|||||
出版者名 | ||||||
出版者 | 埼玉大学大学院理工学研究科 | |||||
出版者名(別言語) | ||||||
出版者 | Graduate School of Science and Engineering, Saitama University | |||||
形態 | ||||||
内容記述タイプ | Other | |||||
内容記述 | xvii, 112 p. | |||||
学位授与番号 | ||||||
学位授与番号 | 甲第1087号 | |||||
学位授与年月日 | ||||||
学位授与年月日 | 2018-03-23 | |||||
学位名 | ||||||
学位名 | 博士(学術) | |||||
学位授与機関 | ||||||
学位授与機関識別子Scheme | kakenhi | |||||
学位授与機関識別子 | 12401 | |||||
学位授与機関名 | 埼玉大学 | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | With the tremendous growth of available digital data, the use of Cloud Service Providers are gaining much popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, cloud storage providers often employ data deduplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users’ privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for two secure multiple group setting data deduplication in cloud environments. Firstly, we propose a new framework DDUP-MUG (deduplication for the multiplegroup signature scheme) that allows one or more groups to access a file such that the cloud storage server can avoid duplicates according to the ownership of the file. The main goal of the primitive red is allowing individual management to multiple groups. We propose the group managers mainly manage the new entities and produce revocation lists for clients and the server respectively. We use Message-Locked Encryption (MLE) as an ingredient for deduplication and we provide new three protocols, namely UPL-Dup (for uploading a new message), EDT-Dup (for editing the existing message) and DEL-Dup(for eliminating the existing message) in the DDUP-MUG framework. Furthermore, we propose a new primitive group signcryption for deduplication called verifiable hash convergent group signcryption (VHCGS) by adding the properties of group signcryption and the verification facilities for the storage server(third party). An interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better performance than the traditional signature-then-encryption approach. According to the deduplication, we propose a new method for a group of users that can eliminate redundant encrypted data owned by different users. |
|||||
目次 | ||||||
内容記述タイプ | Other | |||||
内容記述 | Abstract i Acknowledgments iii List of figures v List of tables vi Publications vii Abbreviations x Notations xii 1 Introduction 1 1.1 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Motivating applications . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.4 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.5 Structure of this Thesis . . . . . . . . . . . . . . . . . . . . . . . . . 13 2 Cryptographic Mechanism 14 2.1 Public Key Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2 Hash Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.3 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.4 Group Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.5 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.6 Computational Primitives . . . . . . . . . . . . . . . . . . . . . . . 19 2.6.1 Integer Factorization . . . . . . . . . . . . . . . . . . . . . . 19 2.6.2 Discrete-Logarithm . . . . . . . . . . . . . . . . . . . . . . . 20 2.7 Security Notions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.7.1 Steps to Achieving Provable Security . . . . . . . . . . . . . 22 2.7.2 Confidentiality Notion . . . . . . . . . . . . . . . . . . . . . 22 2.7.3 Unforgeability Notion . . . . . . . . . . . . . . . . . . . . . . 26 2.7.4 Random Oracle Model . . . . . . . . . . . . . . . . . . . . . 28 3 Cloud Computing 30 3.1 Cryptographic Mechanisms of the Cloud . . . . . . . . . . . . . . . 32 3.1.1 Searchable Encryption . . . . . . . . . . . . . . . . . . . . . 33 3.1.2 Homomorphic Encryption . . . . . . . . . . . . . . . . . . . 33 3.1.3 Computing Aggregates over Encrypted Data . . . . . . . . . 34 3.2 Functional Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 34 3.2.1 Order Preserving Encryption . . . . . . . . . . . . . . . . . . 35 3.2.2 Identity-based encryption . . . . . . . . . . . . . . . . . . . 35 3.2.3 Attributed-based Encryption . . . . . . . . . . . . . . . . . . 36 3.2.4 Predicate Encryption . . . . . . . . . . . . . . . . . . . . . . 36 3.3 Verifiable Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.3.1 Verifiable Outsourced Computation . . . . . . . . . . . . . . 37 3.3.2 Verifiable Storage . . . . . . . . . . . . . . . . . . . . . . . . 37 3.4 Other Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.4.1 Format Preserving Encryption . . . . . . . . . . . . . . . . . 38 3.4.2 Proxy Re-encryption . . . . . . . . . . . . . . . . . . . . . . 39 3.4.3 Secure Deduplication . . . . . . . . . . . . . . . . . . . . . . 39 4 Cloud Data Deduplication 41 4.1 Cloud Storage and Issues . . . . . . . . . . . . . . . . . . . . . . . . 41 4.2 Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.2.1 Client-Side Deduplication . . . . . . . . . . . . . . . . . . . 43 4.2.2 Server-Side Deduplication . . . . . . . . . . . . . . . . . . . 43 4.2.3 Level of Data Deduplication . . . . . . . . . . . . . . . . . . 43 4.3 Data Deduplication Techinical Design Issues . . . . . . . . . . . . . 44 4.3.1 Types of Data Deduplication . . . . . . . . . . . . . . . . . . 45 4.3.2 Client vs Server Side Deduplication . . . . . . . . . . . . . . 46 4.3.3 Single User vs Cross User Deduplication . . . . . . . . . . . 46 4.4 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 4.4.1 Convergent or Message-locked Encryption . . . . . . . . . . 47 4.4.2 Proofs of Ownership . . . . . . . . . . . . . . . . . . . . . . 50 5 Multiple Group Signature Setting 52 5.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 5.1.1 Group Signature . . . . . . . . . . . . . . . . . . . . . . . . 53 5.1.2 Group Signature from Unlikable Randomizable Signature . . 55 5.2 Management Policy of Proposed Scheme . . . . . . . . . . . . . . . 55 5.3 Proposed Scheme Architecture . . . . . . . . . . . . . . . . . . . . . 56 5.3.1 System Setup Protocol . . . . . . . . . . . . . . . . . . . . . 58 5.3.2 Upload Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 59 5.3.3 Edit Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 60 5.3.4 Delete Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 62 5.3.5 Restore Protocol . . . . . . . . . . . . . . . . . . . . . . . . 63 5.4 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 5.5 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 6 Multiple Group Signcryption 71 6.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.1 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 6.1.2 Original Signcryption Scheme . . . . . . . . . . . . . . . . . 72 6.1.3 Public Verifiable Signcryption Scheme . . . . . . . . . . . . 73 6.1.4 Group Signcryption Scheme . . . . . . . . . . . . . . . . . . 74 6.2 Proposed Scheme Architecture . . . . . . . . . . . . . . . . . . . . . 75 6.2.1 KeyGen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 6.2.2 Join . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 6.2.3 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 6.2.4 Partial Unsigncryption . . . . . . . . . . . . . . . . . . . . . 77 6.2.5 Unsigncryption . . . . . . . . . . . . . . . . . . . . . . . . . 77 6.3 Application in Cloud Computing . . . . . . . . . . . . . . . . . . . 78 6.3.1 System Setup Protocol . . . . . . . . . . . . . . . . . . . . . 79 6.3.2 Upload Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 80 6.3.3 Download Protocol . . . . . . . . . . . . . . . . . . . . . . . 81 6.4 Application in Mobile Data Transmission . . . . . . . . . . . . . . . 81 6.4.1 System Setup . . . . . . . . . . . . . . . . . . . . . . . . . . 82 6.4.2 Signcryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 6.4.3 Partial-Unsigncryption . . . . . . . . . . . . . . . . . . . . . 83 6.4.4 Unsigncryption . . . . . . . . . . . . . . . . . . . . . . . . . 83 6.5 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 6.6 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7 Related Research and Future Improvements 90 7.1 Proxy Re-encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 90 7.1.1 Motivation of Proxy Re-encryption . . . . . . . . . . . . . . 93 7.1.2 Syntax of our PRE scheme . . . . . . . . . . . . . . . . . . . 94 7.2 Future Improvements . . . . . . . . . . . . . . . . . . . . . . . . . . 96 8 Conclusion 97 8.1 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 References 100 |
|||||
注記 | ||||||
内容記述タイプ | Other | |||||
内容記述 | 指導教員 : 重原孝臣 | |||||
版 | ||||||
[出版社版] | ||||||
出版タイプ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
資源タイプ | ||||||
内容記述タイプ | Other | |||||
内容記述 | text | |||||
フォーマット | ||||||
内容記述タイプ | Other | |||||
内容記述 | application/pdf | |||||
作成日 | ||||||
日付 | 2019-02-08 | |||||
日付タイプ | Created | |||||
アイテムID | ||||||
GD0000992 |