• Nenhum resultado encontrado

The Security Challenges and an Assorted Approach in Cloud Computing

N/A
N/A
Protected

Academic year: 2017

Share "The Security Challenges and an Assorted Approach in Cloud Computing"

Copied!
11
0
0

Texto

(1)

7KH6HFXULW\&KDOOHQJHVDQGDQ$VVRUWHG

$SSURDFKLQ&ORXG&RPSXWLQJ

5DELQGUD1DWK5D\

Student, Final Semister, Master of Technology (CSE) THE NORTHCAP UNIVERSITY

Sector 23A, Gurgaon, Haryana, India.

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

.H\ZRUGV&ORXG6HUYLFH3URYLGHUV3ULYDWH&ORXG3XEOLF&ORXG&RQWDLQHU&ORXG6HFXULW\&ORXG&RPSXWLQJ&ORXG 8VHUV7KUHDW0LUDJH

,,1752'8&7,21

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¶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

,,6(&85,7<,668(6&+$//(1*(6,1&/28'&20387,1*

7KHDLPVRIFORXGFRPSXWLQJLVWRIDVWHUWKHFRPSXWLQJSRZHUWRH[HFXWHPLOOLRQVRILQVWUXFWLRQVSHUVHFRQG&ORXG FRPSXWLQJFRQVLVWVRIXVHUHQGDQGFORXGHQG7KHXVHUHQGFRQWDLQVWKHXVHU¶VGHYLFHVVXFKDVFRPSXWHUODSWRS PRELOH RU DQ\ DFFHVV GHYLFH DQG DSSOLFDWLRQ VRIWZDUH WKDW UHTXLUHV DFFHVVLQJ WKH FORXG QHWZRUN 7KH FORXG HQG FRQVLVWV RI KLJK VSHHG FRPSXWLQJ GHYLFHV VHUYHUV DQG GLVWULEXWHG GDWD EDVH V\VWHP ZKLFK SURYLGH WKH UHTXLUHG DFFHVVWRWKHFOLHQWVDQGKHQFHIRUPDFORXGHQYLURQPHQW6HHILJ

(2)

)LJ7KH&ORXG(QYLURQPHQW

7KHXVHUHQGQHHGVWRFRQQHFWKLVDFFHVVLQJGHYLFHVOLNH3&/DSWRSRUPRELOHWRWKHFORXGWRDFFHVVKLVGDWDVWRUHG LQDVHUYHULQWKHFORXGWKURXJKDQLQWHUIDFHVRIWZDUHXVLQJLQWHUQHW7KHFORXGEHLQJDGLVWULEXWHGDUFKLWHFWXUHWKH XVHUGDWDLVVWRUHGLQ&63¶VVHUYHUDQGWKHORFDWLRQRIWKHVHUYHULVXQNQRZQWRWKHXVHUVRUFOLHQWV7KH&63¶V VHUYHUV DUH PDQDJHG E\ DGPLQLVWUDWLYH JURXSV WR ZKRP XVHUV QHHG WR GHSHQG XSRQ IRU VDIHJXDUGLQJ GDWD DQG PDLQWDLQLQJSULYDF\7KHDGPLQLVWUDWLYHJURXSPHPEHUVZKRDUHWUDGLQJZLWKXVHU¶VGDWDFDQSURYHWREHDQLQVLGHU WKUHDWYLRODWLQJGDWDVHFUHF\DQGSULYDF\7KHSULYDF\DORQJZLWKFRQILGHQWLDOLW\RIXVHU¶VGDWDPXVWEHWDNHQFDUH$ WKUHDW PDQDJHPHQW SROLF\ HQVXUHV WKDW WKH FORXG GRHV QRW GLVFRYHU DQ\ LQIRUPDWLRQ DERXW WKH XVHU¶V GDWD 7KH IROORZLQJVDUHWKHVHFXULW\FKDOOHQJHVZKLFKQHHGLPPHQVHFRQFHQWUDWLRQ

A. Vulnerabilities

6RIWZDUHDVDVHUYLFH6DD6DSSOLFDWLRQVOLNH*PDLO<DKRRRU)DFHERRNDUHSURYLGHGWRXVHUYLDLQWHUQHWEURZVHU $WWDFNHUV DUH SHQHWUDWLQJ LQWR FOLHQW¶V FRPSXWHU RU DSSOLFDWLRQ E\ XVLQJ WKH ZHE EURZVHU &XVWRPDU\ VHFXULW\ VROXWLRQVGRQRWHIILFLHQWO\SURWHFWGDWDIURPDWWDFNV&RQVHTXHQWO\QHZDSSURDFKHVDUHUHTXLUHGWREHHQIRUFHG,Q YLUWXDOL]DWLRQWHFKQLTXHYDULHGLQVWDQFHVUXQQLQJRQWKHVDPHFRUSRUHDOPDFKLQHQHHGVWREHVHFOXGHG$9LUWXDO 0DFKLQH 0RQLWRU 900 VRIWZDUH WKDW DEVWUDFWV WKH VXEVWDQWLDO UHVRXUFHV IURP WKH PXOWLSOH YLUWXDO PDFKLQHV 9XOQHUDELOLW\LQ0LFURVRIW9LUWXDO3&VRU0LFURVRIW9LUWXDO6HUYHUVFDQDOORZDFDVXDOYLVLWRUWRUXQSURJUDPPHG FRGHRQWKHKRVWRURQDQRWKHURSHUDWLQJV\VWHP7ZRYLUWXDOPDFKLQHVXVLQJFRYHUWFKDQQHOFDQFRPPXQLFDWHZLWK HDFK RWKHU E\SDVVLQJ DOO WKH UXOHV GHILQHG E\ WKH 900V $QRWKHU FORXG WKUHDW FDOOHG7KUHDW >@ZKHUH DQ DWWDFNHUFUHDWHVPDOLFLRXV90LPDJHFRQWDLQLQJPDOZDUHRUYLUXVDQGSXEOLVKLWRQWKHSURYLGHUVVWRUDJHDUHDZKHUH RWKHUXVHUFDQUHWULHYHWKHPDQGLQIHFWWKHZKROHFORXGHQYLURQPHQW7RFRXQWHUWKLVDWWDFN0LUDJH>@DQLPDJH PDQDJHPHQW V\VWHP ZDV SURSRVHG ZKLFK IRFXVHV RQ WKH DFFHVV FRQWURO PHFKDQLVP LPDJH ILOWUDWLRQV GHULYDWLRQ WUDFNLQJ V\VWHP DQG ZDUHKRXVH PDLQWHQDQFH VHUYLFHV 900V VKRXOG EH URRW ORFNHG VR WKDW QR ULJKW ZLWKLQ WKH YLUWXDOL]HGJXHVWHQYLURQPHQWJUDQWVLQWHUIDFHZLWKWKHKRVWV\VWHPV

B. Attacks in Networks

(i) Sniffer attacks:

'DWDLQDQHWZRUNWUDYHOVIURPRQHQRGHWRDQRWKHUDVDSDFNHW&DSWXULQJRIWKHVHSDFNHWVE\LQWUXGHUVLQDQHWZRUN LVWHUPHGDVVQLIIHUDWWDFN,IWKHGDWDSDFNHWVDUHQRWHQFU\SWHGWKHGDWDPD\EHDFFHVVHGDQGPRGLILHGE\WKH XQDXWKRUL]HGJXHVWVDQGKHQFHYLWDOGDWDSDFNHWVPD\ORVWLWVLGHQWLW\$VQLIIHUSURJUDPPHWKURXJKWKH1HWZRUN ,QWHUIDFH&DUG1,&JXDUDQWHHWKHGDWDOLQNHGWRRWKHUV\VWHPVLQWKHQHWZRUNDOVRJHWVUHFRUGHGVRWKDWLWVLGHQWLW\ UHPDLQVLQWDFW7KH$GGUHVV5HVROXWLRQ3URWRFRO$53DQG5RXQG7ULS7LPH577>@DUHXVHGLQDVQLIILQJ GHWHFWLRQSODWIRUPWRGHWHFWDVQLIILQJLQQHWZRUNV

(ii)

A spoofing attack:

:KHQ D PDOLFLRXV SDUW\ ODXQFKHV DWWDFNV DJDLQVW QHWZRUN KRVWV VWHDO GDWD VSUHDG PDOZDUH RU E\SDVVHV DFFHVV FRQWUROVE\LPLWDWLQJDQRWKHUXVHU¶VGHYLFH6RPHRIWKHFRPPRQVSRRILQJDWWDFNVDUH,3DGGUHVVVSRRILQJDWWDFNV $53VSRRILQJDWWDFNVDQG'16VHUYHUVSRRILQJDWWDFNV$QDWWDFNHUVHQGV,3SDFNHWVIURPDIDOVHRUµVSRRIHG¶

(3)

VRXUFHDGGUHVVLQRUGHUWRFDPRXIODJHLWVHOI$53LVXVHGWRUHVROYH,3DGGUHVVHVWR0$&0HGLD$FFHVV&RQWURO DGGUHVVHVIRUWUDQVPLWWLQJGDWD,Q$536SRRILQJDWWDFNVDPDOLFLRXVSDUW\VHQGVVSRRIHG$53PHVVDJHVDFURVVD ORFDODUHDQHWZRUNLQRUGHUWROLQNWKHDWWDFNHU¶V0$&DGGUHVVZLWKWKH,3DGGUHVVRIDJHQXLQHPHPEHURIWKH QHWZRUN+HUHWKHGDWDZKLFKLVPHDQWIRURULJLQDOXVHUDUHVHQWWRDWWDFNHUDQGWKHDWWDFNHUVWHDOWKHLQIRUPDWLRQDQG PRGLI\GDWDWKLVW\SHRIGDWDDOVRLQFOXGHGLQVHVVLRQKLMDFNLQJDQGPDQLQPLGGOHDWWDFNV

$'RPDLQ1DPH6HUYHU'16DVVRFLDWHGRPDLQQDPHWRDQ,3DGGUHVV'16UHVROYHV85/VHPDLODGGUHVVHVDQG RWKHUKXPDQUHDGDEOHGRPDLQQDPHVLQWRWKHLUUHVSHFWLYH,3DGGUHVVHV,Q'16VSRRILQJDWWDFNVDWWDFNHUVPRGLI\ WKHVHUYHUWRUHGLUHFWWKHGRPDLQQDPHWRDGLIIHUHQW,3DGGUHVVHVDQGLQIHFWWKHGDWDZLWKPDOZDUH8VLQJSDFNHW ILOWHULQJXVLQJVSRRILQJGHWHFWLRQVRIWZDUHDQGFU\SWRJUDSKLFQHWZRUNSURWRFRO7/666+DQG+773VVSRRILQJ DWWDFNFDQEHDYRLGHG

(iii) Reused IP address:

7KLVLVDELJVHFXULW\LVVXHLQWHUPVRIQHWZRUNVHFXULW\:KHQDQROGXVHULVPLJUDWLQJIURPWKHFXUUHQWQHWZRUNDQG WKHROG,3DGGUHVVLVUHDVVLJQHGWRDQHZXVHU7KHUHLVDFDFKHORJIRU,3DGGUHVVHVRIWKHGHSDUWLQJXVHUVLQWKH '16VHUYHUZKLFKUHPDLQDFWLYHIRUFHUWDLQWLPHDQGWKHWLPHODJEHWZHHQWKHUHDVVLJQHG,3DGGUHVVDQGWKHFDFKH ORJLQ'16VHUYHU>@FUHDWHVDELJVHFXULW\LVVXH+HQFHWKHDWWDFNHUV PD\XVHWKHFDFKHORJRIWKH'16DQG PRGLI\WKH'16ZLWKPDOZDUHZKLFKZRXOGYLRODWHWKHRULJLQDOLW\RIWKHGDWDRIQHZXVHUV

(iv)

Relationship with third party

3ODWIRUPDVD6HUYLFH3DD6SURYLGHURIIHUWKLUGSDUW\ZHEVHUYLFHVFRPSRQHQWVDORQJZLWKLWVRZQSURJUDPPLQJ ODQJXDJH&ORXGSURYLGHUVRPHWLPHVXEFRQWUDFWVDWKLUGSDUW\IRUGDWDEDFNXSLQRUGHUWRUHFRYHU\RIGDWDLQFDVHRI DGYHUVLW\6RWKHXVHRIPXOWLWHQDQWDUFKLWHFWXUHDQGIODZLQHLWKHURQHPD\DIIHFWWKHRWKHUDQGWKHLQWHUFRQQHFWLRQ FRPSOH[LWLHVUDLVHPDQ\VHFXULW\LVVXHV7KHUHPXVWEHVRPHPHFKDQLVPRUDJUHHGXSRQSROLFLHVDPRQJWKHFORXG VHUYLFHSURYLGHUVVXEFRQWUDFWHGSDUWLHVDQGFORXGXVHUVWRFRXQWHUDFWWKRVHLVVXHVZKLFKFDQEHVHFXULW\WKUHDWIRU VWRUHGGDWD

C. Cryptography:

&U\SWRJUDSK\LVPHDQWDVWKHLQIHDVLELOLW\RIEUHDNLQJWKHHQFU\SWLRQV\VWHPDQGXQDEOHWRFRPSXWHWKHLQIRUPDWLRQ DERXWH[FKDQJHGPHVVDJHV7KHPDLQDLPRIFU\SWRJUDSK\LVWRVHFXUHFRPPXQLFDWLRQRYHUDQLQVHFXUHFKDQQHO 6XSSRVHSDUW\0ZDQWVWRVHQGDVHFUHWPHVVDJHWRSDUW\1ZKLFKVKRXOGQRWEHLQWHUFHSWHGE\DWKLUGSDUW\7KH WUDGLWLRQDOVROXWLRQWRWKLVSUREOHPZDV3ULYDWH.H\(QFU\SWLRQ>@,QWKLVHQFU\SWLRQV\VWHPWKHWZRSDUW\0 DQG1KROGDPHHWLQJDQGWKHPHVVDJHSDVVLQJWDNHVSODFHE\DJUHHGXSRQDSDLURIHQFU\SWLRQDQGGHFU\SWLRQ DOJRULWKP µ(¶ DQGµ'¶ DQG DGGLWLRQDO LQIRUPDWLRQ µ6¶ WREH NHSW VHFUHW 7KH LQWUXGHUPD\ NQRZ WKH µ(¶ DQG µ'¶ DOJRULWKPEXWGRHVQRWNQRZWKHVHFUHWNH\µ6¶ZKHQ0ZDQWVWRVHQGDPHVVDJHµP¶RYHUFRPPXQLFDWLRQFKDQQHO 0HQFU\SWVWKHSODLQWH[WPHVVDJHµP¶E\FRPSXWLQJWKHFLSKHUWH[WF (6PDQGVHQGVFWR1$IWHUUHFHLYLQJF1 GHFU\SWWKHFE\FRPSXWLQJP '6F7KHLQWUXGHUGRHVQRWNQRZ6DQGKHQFHGRQ¶WDEOHGHFU\SWFWRJHWWKH PHVVDJHP7KLVPHFKDQLVPLVXVHIXOIRUDVPDOODPRXQWRIGDWDRUPHVVDJHDQGLIWKHGDWDLVKDQGOHGE\WZRXVHUV RQO\1RZDGD\¶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

,,, /,7(5$785(5(9,(:6

A. The “SeDaSC” Model:

,Q,(((6\VWHP-RXUQDO>@0D]KDU$OL6WXGHQW0HPEHU,(((5(YDWKL'KDPRWKDUDQ(UDM.KDQ6DPHH8 6HQLRU PHPEHU ,((( $WKDQDVLRV 9 9$VLODNRV 6HQLRU 0HPEHU ,((( .HJLQ /L )HOORZ ,((( DQG $OEHUW < =RPD\D)HOORZ,(((SURSRVHGDPRGHORQ6HFXUH'DWD6KDULQJRQ&ORXG6H'D6&WLWOHG³6H'D6&6HFXUH 'DWD6KDULQJLQ&ORXGV´,QWKHLUPRGHOWKHXVHUILOHLVHQFU\SWHGE\DVLQJOHHQFU\SWLRQNH\FDOOHGPDVWHUNH\

(4)

NH\SDUWLVSRVVHVVHGE\WKHXVHUZKLFKNHHSVDZD\WKHLQWUXGHULQVLGHUWKUHDWIURPWKHXVHUGDWDDQGRWKHUNH\ SDUWLVVWRUHGE\WKHWUXVWHGWKLUGSDUW\ZKLFKLVFDOOHGWKH&U\SWRJUDSKLF6HUYHU&67KHPDVWHUNH\LVGHOHWHG SHUPDQHQWO\7KHNH\SDUWDORQHFDQQRWGHFU\SWWKHXVHUGDWD,WQHHGVWRDJDLQJHQHUDWHWKH0DVWHUNH\DJDLQZLWK WKHKHOSRIWKHWZRNH\SDUWVWRGHFU\SWWKHXVHU¶VILOH6HH)LJ

(i) The working of the “SeDaSC” Model:

7KHUHDUHWKUHHHQWLWLHVQDPHO\D8VHUVED&U\SWRJUDSKLF6HUYHU&6DQGFWKHFORXGLQWKH³6H'D6&¶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¶VILOHDQGDVNVIRUWKHXVHU¶VSRUWLRQRIWKHNH\$IWHUDXWKHQWLFDWLRQWKH&6UHFRQVWUXFWVWKHPDVWHUNH\ZLWK WKHKHOSRIXVHU¶VNH\DQG&6PDLQWDLQHGSRUWLRQRIWKHNH\IRUWKDWSDUWLFXODUXVHU7KHXVHU¶VILOHLVWKHQGHFU\SWHG ZLWKWKHPDVWHUNH\QHZO\JHQHUDWHGDQGVHQWEDFNWRWKHXVHU,IDQHZPHPEHUMRLQVWRWKHJURXSWKHQHZXVHULV DGGHGWRWKH$&/DQGWZRSRUWLRQRIWKHNH\LVDJDLQJHQHUDWHG)RUWKHPHPEHUZKRLVOHDYLQJWKHJURXSKLV LGHQWLILFDWLRQLVGHOHWHGIURPWKH$&/7KHGHSDUWLQJPHPEHUFDQQRWDFFHVVWKHGDWDDVKHLVUHPDLQLQJZLWKXVHU SRUWLRQ NH\ RQO\ 7KH 6HGD6F PRGHO VXJJHVWV WKDW QR IUHTXHQW HQFU\SWLRQ DQG GHFU\SWLRQ DUH QHHGHG LQ FDVH RI FKDQJHVLQWKHJURXSPHPEHUVKLS

7KH6H'D6&FODLPVWREHXVHGLQPRELOHFORXGFRPSXWLQJHQYLURQPHQWLQDGGLWLRQWRH[LVWLQJFRQYHQWLRQDOFORXG FRPSXWLQJGXHWRWKHUHDVRQWKDWFRPSXWHLQWHQVLYHRSHUDWLRQVDUHSHUIRUPHGE\WKH&U\SWRJUDSKLF6HUYHU

(ii). Discussions on ‘SeDaSC Model:

7KRXJKWKH6H'D6&PRGHOVHHPVWREHDPXVFXODULQWHUPVRIVDIHW\DQGSULYDF\RIGDWDODFNVLQDGGUHVVLQJVR PDQ\LVVXHV7KHPRGHOLWVHOILVDFRPSOH[RQH7KHFRPSXWDWLRQDOEXUGHQVLQWKLVPRGHOPDNHVLWXQKHDOWK\IRU KDQGOLQJPLOOLRQVRIGDWDDQGNHHSLQJXVHU¶VGDWDVHSDUDWHIRUPRWKHUVXVHULQWKHQHWZRUN7KHIROORZLQJLVVXHV QHHGVWRKDYHDJUHDWHUDWWHQWLRQWRXSJUDGHWKHVHFXULW\LVVXHVIRUWKHGDWD

D 7KH&U\SWRJUDSKLF6HUYHU&6

L 7RPDLQWDLQD&6LQWKHFORXGHQYLURQPHQWLVDKXJHWDVNDQGWZRVWHSVJHQHUDWLRQRIXVHUNH\ZLOOLPSRVH DQLQWHQVLYHFRPSXWDWLRQFRVWDQGDQRYHUEXUGHQLQFUHDVHLQSD\SHUXVHGHILQLWHO\ZRXOGGLVFRXUDJHWKHFORXG XVHUVWRVWRUHWKHLUGDWD

(5)

LL 7KHDGPLQLVWUDWRUVRIWKH&6PD\QRWEHWUXVWZRUWK\7KHXVHU¶VSRUWLRQRIWKHNH\PD\EHUHWDLQHGE\WKH WDLQWHGDGPLQLVWUDWRUVDQGWKHGDWDVHFXULW\DQGSULYDF\PD\EHYLRODWHG

LLL$GXSOLFDWH$&/OLVWIRUWKHRXWJRLQJPHPEHUVRIWKHJURXSPD\H[LVWVLQWKHVHUYHUDVDPLUURULPDJHDQG FDQEHXVHGE\WKHGHSDUWLQJPHPEHUVDVWKH\DUHDOUHDG\KROGLQJWKHXVHUSRUWLRQNH\

LY7KH&6PD\QRWUHVSRQVHGXHWRXQUHDFKDELOLW\ZLWKGUDZDOGHQLDORIVHUYLFHDWDQ\SRLQWRIWLPHWKHQ ZKROHGDWDZLOOEHORVW7KHUHLVQRPHFKDQLVPWRUHFRYHUWKHGDWDDVWKHXVHUDORQHFDQQRWUHFRYHUWKHGDWD ZLWKRXWWKH&6SRUWLRQRIWKHNH\0RUHRYHUWKHHQFU\SWLRQDQGGHFU\SWLRQRIGDWDLVGRQHE\WKH&6RQO\6R WKHXVHUVKDYHQRFRQWURORYHUWKHLURZQGDWD

E 7KH&ORXG6HUYLFH3URYLGHU&63QHHGVWRPDLQWDLQXVHU¶VUHFRUGVDORQJZLWKWKH&6UHFRUGVDQGDQH[WUD QHWZRUNOLQNZLWKWKH&6ZKLFKPDNHVWKHFORXGHQYLURQPHQWDFULWLFDOPHVK

F 7KHVKDULQJRINH\VZLWKLQPXOWLWHQDQWFORXGHQYLURQPHQWLVQRWUHFRPPHQGHG

B. The ‘SecCloud’ Model

7KHUH LV D SDSHU QDPHG ³6HFXULW\ DQG SULYDF\ IRU VWRUDJH DQG FRPSXWDWLRQ LQ FORXG FRPSXWLQJ´ >@ E\ /LIHL +DRMLQ-KX=KHQIX&DR;LDROHR'RQJDQGWHDPSXEOLVKHGLQDMRXUQDOQDPHGµ(/6(9,(5¶,QWKLVSDSHUWKH\ SURSRVHG D SULYDF\ FKHDWLQJ GLVFRXUDJHPHQW DQG VHFXUH FRPSXWDWLRQ DXGLWLQJ SURWRFRO ZKLFK LV QDPHG DV µ6HF&ORXG¶7KH\FODLPHGWKDWWKHSURSRVHGµ6HF&ORXG¶LVWKHILUVWSURWRFROWKDWEULGJHVEHWZHHQVHFXUHVWRUDJHDQG VHFXUH FRPSXWDWLRQ DXGLWLQJ LQ FORXG ,W DFKLHYHV WKH SULYDF\ FKHDWLQJ GLVFRXUDJHPHQW E\ GHVLJQDWHG YHULILHU VLJQDWXUHEDWFKYHULILFDWLRQDQGSUREDELOLVWLFVDPSOLQJWHFKQLTXHV

7KH\DOVRWULHGWREXLOGD³SUDFWLFDOVHFXUHDZDUHFORXGFRPSXWLQJH[SHULPHQWDOHQYLURQPHQW´ZKLFKLVQDPHGDV µ6HF+')6¶DWHVWEHGWRLPSOHPHQWµ6HF&ORXG¶

(i)

The Working of ” SecCloud” Model

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

$VSHUWKHLUFODLPWKHSURWRFROLVDEOHWRDFKLHYHWKHIROORZLQJJRDOV

D 'DWDVWRUDJHVHFXULW\E\WKHHIIHFWLYHDXGLWLQJRI&8DQG9$

E 'DWDFRPSXWDWLRQVHFXULW\E\9$VYHULILFDWLRQDQGDXGLWLQJE\&8DQG9$

F 3ULYDF\FKHDWLQJGLVFRXUDJHPHQWEHFDXVHRIYHULILFDWLRQE\DGHVLJQDWHGSDUW\DQGGLVFRXUDJLQJ&63VIRU UHYHDOLQJSULYDF\RI&8VGDWDHYHQLIWKHVHUYHUVDUHDWWDFNHGE\WKHDWWDFNHUV

(ii)

Discussion on “SecCloud” Model

7KHSURSRVHGSURWRFROSHUIRUPVWKHIROORZLQJIRXUVWHSV

D 7KHSURSRVHGSURWRFROUHTXHVWIRUDVWRUDJHVSDFHWRWKH&63VDQGWKH&63DOORFDWHVDVSDFHE\UHWXUQLQJD VSDFHLQGH[iIRUWKHPHVVDJHWREHVWRUHG

E 7KH&8VQHHGWRVLJQHDFKWUDQVPLWWHGPHVVDJHEORFNWRHQDEOHWKH9$VIRUDXGLWLQJ

(6)

:KHQWKHGDWDLVQHHGWREHUHFHLYHGWKHQWKH&63GHFU\SWWKHSDFNHWE\XVLQJLWRZQVHVVLRQNH\WRUHFRYHUGDWD VLJQDWXUHSDLUVDQGFKHFNWKHVLJQDWXUHIRUGDWDDXWKHQWLFLW\E\9$VXVLQJLWVHFUHWNH\7KHDXWKRULW\IRUFKHFNLQJ WKHVLJQDWXUHVDUHKHOGE\WKH&63DQG9$RQO\DQGKHQFHLWLVFODLPHGWKDWWKHGDWDLVVHFXUHGDQGSURWHFWHG

7KRXJKWKHµ6HF&ORXG¶SURWRFROFODLPVWREHUREXVWDQGUHOLDEOHLWVVKRUWFRPLQJVFDQEHIRXQGDVEHOORZ

D 7KHFRPSXWLQJDQGWUDQVPLVVLRQRYHUKHDGLVWKHPDLQFRQFHUQKHUH7KHFRPSXWLQJDQGWUDQVPLVVLRQRI HQFU\SWHGGDWDLVYHU\PXFKFRPSOH[DQGWDNHVDORWRIWLPHZKLFKPD\FDXVHDWLPHRXWIRUDFFHVVWRWKH VHUYHUV

E +HUHLQWKLVSURSRVHGPRGHOZHDUHDJDLQJRLQJWREHGHSHQGHQWRQDWKLUGSDUW\LH9HULILFDWLRQ$XGLWRUV 9$VZKLFKPD\UHYHDOWKHYDOXDEOHXVHU¶VGDWDDQGFDXVHDWKUHDW9$VDUHQHHGWRFRQYLQFHGWKDWWKH FORXG VHUYHUV XVH WKH GDWD RQ WKH FRUUHFW SRVLWLRQ VR WKDW FORXG VHUYHU¶V FKHDWLQJ EHKDYH VKRXOG QRW EH GHWHFWHG

F ,QVRPHFDVHVWKHXVHUVPD\IDFHDGHQLDORIVHUYLFHGXHWRWKHIDFWWKDW9$VPD\XQUHVSRQVLYHGXHWR FRQQHFWLRQORVVZLWKWKHXVHUVRUVHUYHUV

,9 7+(352326('$3352$&+6(&85(.(<72.(16.702'(/

,QWKHSURSRVHG6HFXULW\.H\7RNHQ6.7DSSURDFK&U\SWRJUDSKLF6HUYHU&6LVDYRLGHGIRUWKHLVVXHVDULVHVR IDU LQ WKH GLVFXVVLRQV RI WKH 6H'D6& PRGHO LQ SDUD DERYH +HUH D VLPSOH DQG UREXVW PRGHO LV SURSRVHG FLUFXPYHQWLQJWKH&67KHKXJHFRPSXWDWLRQDOFRVWLVDYRLGHGDQGWUXVWZRUWK\RQVHFXULW\RIGDWDLVHQDEOHGDWD PDPPRWKOHYHO,QWKLV6.7PRGHODOOWKHFRQWUROVIRUVHFXULQJDQGDFFHVVLQJGDWDUHPDLQRQWKHKDQGRIXVHUV RQO\

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

(7)

'2:1/2$'

83/2$'

XVHU

/DSWRS

XVHU

6HFXULW\.H\7RNHQ6.7

83/2$'(' 72&/28'

(1&5,37,21

$/*25,7+0

'2:1

6(3(5$7,21 '(&5,37,21

/2$'2)6.7,'$/*25,7+0

)LJ7KHSURSRVHGDSSURDFK6.7PRGHO

A. The RSA Algorithm:

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

(m^a)^p mod d = m

(YHQNQRZLQJDGRUHYHQPLWLVYHU\GLIILFXOWWRILQGS

>Kh^dKZ'

d

EZ/Wd

d&/>;&Ϳ

EZ/Wd d&/> t/d, ^<d/

d

W<d

d d

W<d

EZ/Wd dt/d, ^<d/

EZ/Wd

(8)

Key Distribution:7RHQDEOH7RPWRVHQGKLVHQFU\SWHGPHVVDJHV-HUU\WUDQVPLWVSXEOLFNH\GDWR7RPYLDD UHOLDEOHEXWPD\EHQRQVHFUHWURXWH7KHSULYDWHNH\LVQHYHUVKDUHG

Encryption:6XSSRVH7RPZDQWVWRVHQGVPHVVDJH0WR-HUU\)LUVWO\7RPQHHGVWRWXUQWKHPHVVDJH0LQWRDQ LQWHJHUPVXFKWKDW

PGDQGJFGPG E\XVLQJDQDJUHHGXSRQUHYHUVLEOHSURWRFRONQRZQDVSDGGLQJVFKHPH7RP WKHQFRPSXWHVWKHFLSKHUWH[WFXVLQJ-HUU\¶VSXEOLFNH\DFRUUHVSRQGLQJWRF PADPRGG(YHQIRUELW QXPEHUVWKLVFDQEHGRQHHIILFLHQWO\XVLQJPRGXODUH[SRQHQWLDWLRQ7RPWKHQVHQGVFWR-HUU\

Decryption:-HUU\FDQUHFRYHUPIURPFE\XVLQJSULYDWHNH\H[SRQHQWSE\FRPSXWLQJ FASŁPADASŁPPRGG

-HUU\FDQILQGVWKHRULJLQDOPHVVDJH0XVLQJPDQGUHYHUVLQJWKHSDGGLQJVFKHPH

Key generation of RSA:

7KHNH\VJHQHUDWLRQLVDQLPSHUDWLYHSDUWIRU56$DOJRULWKP7KHNH\VDUHJHQHUDWHGDVIROORZV

DSDQGTDUHWZRSULPHQXPEHUVDUHFKRVHQGLVWLQFWO\7KHSULPHQXPEHUVSDQGTDUHFKRVHQ UDQGRPO\DQGDUHVLPLODULQPDJQLWXGH7KH\GLIIHULQOHQJWKE\DIHZGLJLWVIRUPDNLQJWKHIDFWRULQJ KDUGHU

E1RZFRPSXWHQ ST

)RUERWKWKHSULYDWHDQGSXEOLFNH\VQLVXVHGDVPRGXOXVDQGLWVOHQJWKLVH[SUHVVHGLQELWVZKLFKDUH WHUPHGDVNH\OHQJWK

F &DOFXODWHijQ ijSijT SíTí QíSTíWKHYDOXHRIijQLVWKHSULYDWHNH\ SRUWLRQZKLFKLVFDOOHG(XOHU¶VWRWLHQWIXQFWLRQDQGLVNHSWVHFUHW

G$QLQWHJHUGLVFKRVHQVXFKWKDWGijQDQG*&'GijQ LHGDQGijQDUHFRSULPH

H)LQGRXWHDVHŁGPRGijQLHHLVPRGXODUPXOWLSOLFDWLYHLQYHUVHRIGPRGXORijQ

,QDVLPSOHLWFDQEHVWDWHGWKDWIRUJLYHQGHŁPRGijQWDNHRXWWKHVROXWLRQIRUH7KHOHQJWKRIHEHLQJDVKRUW DQGVPDOO+DPPLQJZHLJKWLWUHVXOWVLQPRUHHIILFLHQWHQFU\SWLRQ

+HUHHLVUHOHDVHGDVWKHSXEOLFNH\H[SRQHQWDQGGLVNHSWDVSULYDWHNH\H[SRQHQW7KHPRGXOXVQDQGWKHSXEOLF H[SRQHQWHWRJHWKHUPDNHWKHSXEOLFNH\DQGWKHPRGXOXVQDQGWKHSULYDWHH[SRQHQWGIRUGHFU\SWLRQIRUPWKH SULYDWHNH\ZKLFKLVNHSWVHFUHW7KHSULPHQXPEHUVSDQGTDQGijQDOVRNHSWVHFUHWEHFDXVHWKRVHDUHXVHGIRU FDOFXODWLQJG

B. Key generation for SKT (SKT id)

6XSSRVH6LVJHQHUDWHGUDQGRPO\E\WKH6.7GHYLFHIRUHDFKRI(QFU\SWHG'DWD)LOH(')$WWKHILUVWVWHSD UDQGRPQXPEHU5KDYLQJOHQJWKELWVPD\EHJHQHUDWHGLQVXFKDZD\WKDW5 A,QWKHVHFRQGVWHS5 EHSDVVHGWKURXJKD+DVKIXQFWLRQXVLQJVHFXUH+DVKDOJRULWKP6+$7KHVHFRQGVWHSLVWRUDQGRPL]HWKH LQLWLDOXVHUGHULYHGUDQGRPQXPEHU51RZWKHRXWSXWRIWKH+DVKIXQFWLRQLV6ZKLFKLVXVHGLQ6\PPHWULF.H\ $OJRULWKP6.$IRUHQFU\SWLRQLQ$GYDQFHG(QFU\SWLRQ6WDQGDUG$(6IRUVHFXULQJXVHU¶VGDWD7KLV6LVXVHGIRU JHQHUDWLQJWKH6.7LGZKLFKLVWKHQDGGHGWRWKHHQFU\SWHGGDWDDQGWKHQFDOOHGDVSDFNHWZKLFKLVVWRUHGLQWKH FORXG7KHFRS\RI6.7LGLVVDYHGWRWKHXVHU6.7GHYLFHIRUPDWFKLQJDQGUHFRYHULQJGDWDDIWHUGRZQORDGLQJWKH UHTXHVWHGGDWD

C. Algorithm for SKT id generation

(9)

L &RPSXWH5 ^`ADQG6 +¦5 LL 6.7LG 6.$(')6

LLL $GG6.7LGWR(')

LY 5HWXUQ6.7LGDQGVDYH6.7LGWR6.7GHYLFHRIWKHRZQHU Y 3DFNHW3Ł(')6.7LG

YL 8SORDGWKH3LQWRWKH&ORXG

D. Algorithm for SKT id separation

,QSXW7KHGDWDSDFNHW3WKH6.$ $IWHUGRZQORDGLQJWKHGDWDSDFNHW3 &RPSXWH

L *HW6.7LGIURPWKHUHTXHVWLQJXVHU3OXJLQ6.7GHYLFHLQWR3&RU/DSWRS

LL 0DWFKWKH6.7LGRIXVHUWKH6.7LGRIXVHUDQGWKH6.7LGSUHVHQWLQWKHGDWDSDFNHW LLL ,IPDWFKLQJVXFFHVVIXOWKHQJRWRVWHSYHOVH

LY 5HWXUQXQDXWKRUL]HGXVHU

Y (') 6.$6.7LG3

YL 6HQG(')WRWKHXVHU YLL 'HOHWH6.7LG YLL HQGLI

E. Discussions on the proposed model

7KHUHDUHPDQ\UHVHDUFKDSSURDFKWRZDUGVWKHVHFXULW\LVVXHVRIWKHFORXGFRPSXWLQJ7KHUHODWHGDSSURDFKHVIRFXV RQVRPHFRPSOH[DUFKLWHFWXUHZKLFKWHQGVWREHGLIILFXOWWRLPSOHPHQWRQUHDOFORXGHQYLURQPHQWDQGLPSRVHD FRPSOH[ FRPSXWDWLRQ RYHUKHDG 0RUH RYHU WKHVH UHVHDUFKHV DUH QRW WKDW PXFK ZHOO EXLOW WR IDFH DOO VHFXULW\ FKDOOHQJHV7KHSURSRVHG6.7PRGHOXVHV56$DOJRULWKPWRHQFU\SWXVHU¶VGDWDILOH$IWHUHQFU\SWLRQRIGDWDILOHLW LVQDPHGDV(QFU\SWHG'DWD)LOH(')DQGLWEHFRPHVGLIILFXOWWRGHFU\SWWKHILOHE\WKHXQDXWKRUL]HGLQWUXGHUVDV WKHUH LV D VHFXUHG SULYDWH NH\ WR XQORFN WKH GDWD ILOH 7KH (') DJDLQ JRHV WKURXJK D V\PPHWULF NH\ JHQHUDWLRQ DOJRULWKP6+$DQGJHQHUDWHWKH6.7LG7KH6.7LGLVDGGHGWRWKH(')DQGDFRS\RIWKH(')LGLVVDYHG DXWRPDWLFDOO\LQWKH6.7GHYLFHIRUHDFKILOHORDGHGWRWKHFORXG:KHQDGRZQORDGUHTXHVWLVUHFHLYHGE\WKH&63 WKHQWKHGDWDILOH¶V6.7LGLVPDWFKHGZLWKWKH6.7LGRIXVHU¶V6.7GHYLFH,IWKHPDWFKLQJLVIRXQGWKHQRQO\WKH GDWDILOHLVDOORZHGWRGRZQORDGIRUWKHDXWKRUL]HGXVHUDQGWKHDXWKHQWLFDWLRQLVHVWDEOLVKHG7KH6.7LGLVWKHQ VHSDUDWHGIURPWKHHQFU\SWHGGDWDXVLQJ6.7VHSDUDWLRQDOJRULWKPDQGROG6.7LGLVWKHQGHOHWHGIURPWKHGDWDILOH DQGDVZHOODV6.7GHYLFH7KHHQFU\SWHGGDWDLVGHFU\SWHGYLDUHYHUVH56$DOJRULWKP$IWHUDFFHVVLQJGDWDXVHU PD\GRVRPHUHDGZULWHRSHUDWLRQDQGZKHQKHXSORDGVWKHGDWDWRFORXGDJDLQD6.7LGLVJHQHUDWHGDQGWKHVDPH SURFHGXUHIROORZVWRVHFXUHWKHGDWD,QWKLVPRGHOHYHU\VHFXULW\DVSHFWLVPDLQWDLQHGE\WKHXVHUKLPVHOI8VHUV QHHGQRWWRUHO\RQWKLUGSDUW\¶VWUXVWZKLFKLVWKHPDLQWKUHDWIRUGDWDVWRUDJH

7KHFORXGVWRUDJHRQO\VWRULQJWKHSDFNHWFRQWDLQLQJWKHHQFU\SWHGGDWDDORQJZLWK6.7LGWKLVGDWDLILVDFFHVVHG E\LOOLFLWXVHUVWKHGDWDLVXVHOHVVIRUWKHP7KHPRGHOLVUHODWLYHO\VLPSOHDQGWUXVWZRUWK\LQYLHZRIWKHVHFXULW\ FRQFHUQVIRUWKHFORXGHQYLURQPHQW

(10)

7KH VWRUDJH YLUWXDOL]DWLRQ DV ZHOO DV WKH YDULRXV YLUWXDOL]DWLRQ WHFKQLTXHV DQG WKH QHWZRUN LQ XVH HQFRPSDVV D JUHDWHUVHFXULW\FRQFHUQLQFORXGFRPSXWLQJHQYLURQPHQW7KHVHFXULW\RIXVHU¶VGDWDQHHGVWREHHQVXUHGDWKLJKHVW OHYHO'XHWRWKHFRPSOH[DUFKLWHFWXUHRIWKHFORXGLWLVDELJFKDOOHQJHWRHQVXUHVHFXULW\RIGDWDDWDOOOHYHOVLQWKH FORXG HQYLURQPHQW 7KH FORXG LV VWLOO LQ D JURZLQJ SKDVH DQG WKH SURSRVHG 6.7 PRGHO DSSURDFK FDQ GHILQLWHO\ DGGUHVV WKH H[LVWLQJ VHFXULW\ LVVXHV,Q IXWXUH ZRUN LW LV LQWHQGHG WR XQGHUWDNH GHWDLO FRPSXWDWLRQV IRU WKLV 6.7 PRGHODQGLPSOHPHQWDWLRQRQUHDOFORXGSODWIRUP

5()(5(1&(6

>@ /RUG&UXV$GU´3UREOHPV)DFHGE\&ORXG&RPSXWLQJ´GOSDFNHWVWRUPVHFXULW\QHW3UREOHPV)DFHGE\&ORXG&RPSXWLQJSGI >@ KWWSVHQZLNLSHGLDRUJZLNL&ORXGBFRPSXWLQJ

>@ 5%X\\D63DQGH\DQG&9HFFKLROD&ORXGEXVWRRONLWIRUPDUNHWRULHQWHGFORXGFRPSXWLQJLQ3URFHHGLQJVVW,QWHUQDWLRQDO&RQIHUHQFH RQ&ORXG&RPSXWLQJ&ORXG&RP%HLMLQJSSB

>@ /RUG&UXV$GU´3UREOHPV)DFHGE\&ORXG&RPSXWLQJ´GOSDFNHWVWRUPVHFXULW\QHW3UREOHPV)DFHGE\&ORXG&RPSXWLQJSGI >@ &ORXG6HFXULW\$OOLDQFH6HFXULW\JXLGDQFHIRUFULWLFDODUHDVRIIRFXVLQ&ORXG&RPSXWLQJ9$YDLODEOH

KWWSVFORXGVHFXULW\DOOLDQFHRUJJXLGDQFHFVDJXLGHYSGI

>@ 5HQ<XORQJDQG:HQ7DQJ$6(59,&(,17(*5,7<$6685$1&()5$0(:25.)25&/28'&20387,1*%$6('21 0$35('8&(Proceedings of IEEE CCIS2012+DQJ]KRXSS±2FW1RY

>@ ZZZLEPFRPVRIWZDUHVROXWLRQVVRD

>@ 30HOO7*UDQFH7KH1,67GHILQLWLRQRIFORXGFRPSXWLQJGUDIW1,676SHFLDO3XEO

>@ .&KLWKDUDQMDQDQG.DOD.DUXQ$$UHYLHZRQKDGRRS²+')6LQIUDVWUXFWXUHH[WHQVLRQV-H-X,VODQGSS$SU

>@ '$%)HUQDQGHV/)%6RDUHV-9*RPHV00)UHLUH350,QiFLRVHFXULW\LVVXHVLQFORXGHQYLURQPHQWVDVXUYH\,QW-,QIRUP 6HF±

>@ 81'(567$1',1*7KH&ORXG&RPSXWLQJ6WDFN6DD63DDV,DD6‹'LYHUVLW\/LPLWHG1RQFRPPHUFLDOUHXVHZLWKDWWULEXWLRQ SHUPLWWHG

>@ 0DWKHU7.XPDUDVZDP\6/DWLI6&ORXG6HFXULW\DQG3ULYDF\2¶5HLOO\0HGLD,QF6HEDVWRSRO&$

>@ .HHQH&7KH.HHQH9LHZRQ&ORXG&RPSXWLQJ2QOLQH$YDLODEOHKWWSZZZNHHQHYLHZFRPZKDWLVSODWIRUPDV VHUYLFHSDDVKWPO$FFHVVHG-XO

>@ .+DVKL]XPH'*5RVDGR()HUQQGH]0HGLQD(%)HUQDQGH]$QDQDO\VLVRIVHFXULW\LVVXHVIRUFORXGFRPSXWLQJ-,QWHUQHW6HUYLFHV $SSO±

>@ :$-DQVHQ&ORXGKRRNV6HFXULW\DQGSULYDF\LVVXHVLQFORXGFRPSXWLQJLQWK+DZDLL,QWHUQDWLRQDO&RQIHUHQFHRQ6\VWHP6FLHQFHV +,&66SS±

>@ )=KDQJ+&KHQ6HFXULW\SUHVHUYLQJOLYHPLJUDWLRQRIYLUWXDOPDFKLQHVLQWKHFORXG-1HWZ6\VW0DQDJH± >@ 66XEDVKLQL9.DYLWKD$VXUYH\RQVHFXULW\LVVXHVLQVHUYLFHGHOLYHU\PRGHOVRIFORXGFRPSXWLQJ-1HWZ&RPSXW$SSO

±

>@ 0$OL5'KDPRWKDUDQ(.KDQ68.KDQ$99DVLODNRV./L$<=RPD\D6H'D6&VHFXUHGDWDVKDULQJLQFORXGV,(((6\VW-KWWSG[GRLRUJ-6<67

>@ :HL-=KDQJ;$PPRQV*%DOD91LQJ30DQDJLQJ6HFXULW\RIYLUWXDOPDFKLQHLPDJHVLQD&ORXGHQYLURQPHQW,Q3URFHHGLQJV RIWKH$&0ZRUNVKRSRQ&ORXG&RPSXWLQJ6HFXULW\$&01HZ<RUN1<86$SS±

>@ 2KOPDQ % (ULNVVRQ $ 5HPEDU] 5 :KDW 1HWZRUNLQJ RI ,QIRUPDWLRQ &DQ 'R IRU &ORXG &RPSXWLQJ 7KH WK ,((( ,QWHUQDWLRQDO:RUNVKRSVRQ(QDEOLQJ7HFKQRORJLHV,QIUDVWUXFWXUHVIRU&ROODERUDWLYH(QWHUSULVHV*URQLQJHQ7KH1HWKHUODQGV-XQH -XO\

>@ /-=KDQJDQG4XQ=KRX³&&2$&ORXG&RPSXWLQJ2SHQ$UFKLWHFWXUH´,&:6,(((,QWHUQDWLRQDO&RQIHUHQFHRQ:HE6HUYLFHV SS-XO\

>@ 'LDD6DODPD$EGXO0LQDDP+DWHP0$EGXDO.DGHUDQG0RKL\0RKDPHG+DGKRXG³(YDOXDWLQJWKH(IIHFWVRI6\PPHWULF &U\SWRJUDSK\$OJRULWKPVRQ3RZHU&RQVXPSWLRQIRU'LIIHUHQW'DWD7\SHV´,QWHUQDWLRQDO-RXUQDORI1HWZRUN6HFXULW\336HSW

>@ 5LYHVW5/6KDPLU$$GOHPDQ/$PHWKRGIRUREWDLQLQJGLJLWDOVLJQDWXUHVDQGSXEOLFNH\FU\SWRV\VWHPV&RPPXQ$&0±

>@ :HL-=KDQJ;$PPRQV*%DOD91LQJ30DQDJLQJ6HFXULW\RIYLUWXDOPDFKLQHLPDJHVLQD&ORXGHQYLURQPHQW,Q3URFHHGLQJV RIWKH$&0ZRUNVKRSRQ&ORXG&RPSXWLQJ6HFXULW\$&01HZ<RUN1<86$SS±

>@ ,(((6<67(06-2851$/6H'D6&6HFXUH'DWD6KDULQJLQ&ORXGV0D]KDU$OL6WXGHQW0HPEHU,(((5HYDWKL'KDPRWKDUDQ(UDM .KDQ6DPHH8.KDQ6HQLRU0HPEHU,((($WKDQDVLRV99DVLODNRV6HQLRU0HPEHU,(((.HTLQ/L)HOORZ,(((DQG$OEHUW< =RPD\D)HOORZ,(((

>@ 6HFXULW\DQGSULYDF\IRUVWRUDJHDQGFRPSXWDWLRQLQFORXGFRPSXWLQJ/LIHL:HLD+DRMLQ=KXD=KHQIX&DRD֛;LDROHL'RQJD:HLZHL -LDD<XQOX&KHQD$WKDQDVLRV99DVLODNRVE

>@ &RQJ:DQJ4LDQ:DQJ.XL5HQ:HQMLQJ/RX3ULYDF\3UHVHUYLQJ3XEOLF$XGLWLQJIRU'DWD6WRUDJH6HFXULW\LQ&ORXG&RPSXWLQJ ,1)2&203URFHHGLQJV,(((YROQRSS0DUFK

>@ ,QWHUQDWLRQDO-RXUQDORI7KHVLV3URMHFWVDQG'LVVHUWDWLRQV,-73'9RO,VVXH330RQWK2FWREHU'HFHPEHU$YDLODEOH$W

ZZZUHVHDUFKSXEOLVKFRP3DJH_5HVHDUFK3XEOLVK-RXUQDOV6HFXULW\,VVXHVLQ&ORXG&RPSXWLQJ$5HYLHZ$QLWKD<'HSDUWPHQWRI &RPSXWHU6FLHQFHDQG(QJLQHHULQJ3XQMDE7HFKQLFDO8QLYHUVLW\66&(73DWKDQNRW,QGLD

>@ (QVXULQJ 'DWD 6WRUDJH 6HFXULW\ LQ &ORXG &RPSXWLQJ &RQJ :DQJ 4LDQ :DQJ DQG .XL 5HQ 'HSDUWPHQW RI (&( ,OOLQRLV ,QVWLWXWH RI 7HFKQRORJ\:HQMLQJ/RX'HSDUWPHQWRI(&(:RUFHVWHU3RO\WHFKQLF,QVWLWXWH

(11)

>@ ,661SULQW,QWHUQDWLRQDO-RXUQDORI&RPSXWHU6FLHQFHDQG,QIRUPDWLRQ7HFKQRORJ\5HVHDUFK,661;RQOLQH9RO ,VVXHSS0RQWK$SULO-XQH$YDLODEOHDWZZZUHVHDUFKSXEOLVKFRP3DJH_5HVHDUFK3XEOLVK-RXUQDOV'DWD 6HFXULW\ DQG 3ULYDF\ 3URWHFWLRQ ,VVXHV LQ &ORXG &RPSXWLQJ 0V 5XSDOL 5 .DQWKH 0V 5LQNOH & 3DWHO 'HSDUWPHQW RI 0&$ ,0&267&ROOHJH7KDQHZ8QLYHUVLW\RI0XPEDL,QGLD

>@ ,QWHUQDWLRQDO -RXUQDO RI 6RIW &RPSXWLQJ DQG (QJLQHHULQJ ,-6&( ,661 9ROXPH ,VVXH 0DUFK &ORXG &RPSXWLQJ'LIIHUHQW$SSURDFK 6HFXULW\&KDOOHQJH0DQHHVKD6KDUPD+LPDQL%DQVDO$PLW.XPDU6KDUPD

>@ ,QWHUQDWLRQDO -RXUQDO RI 1HWZRUN 6HFXULW\ ,WV $SSOLFDWLRQV ,-16$ 9RO 1R 0D\ '2, LMQVD 6(&85,7< ,668(6 $662&,$7(' :,7+ %,* '$7$ ,1 &/28' &20387,1* 9HQNDWD 1DUDVLPKD ,QXNROOX 6DLODMD $UVL DQG 6ULQLYDVD 5DR 5DYXUL 'HSDUWPHQW RI &RPSXWHU (QJLQHHULQJ 7H[DV 7HFK 8QLYHUVLW\ 86$ 'HSDUWPHQW RI %DQNLQJ DQG )LQDQFLDO 6HUYLFHV&RJQL]DQW7HFKQRORJ\6ROXWLRQV,QGLD

>@ ,5$&67,QWHUQDWLRQDO-RXUQDORI&RPSXWHU6FLHQFHDQG,QIRUPDWLRQ7HFKQRORJ\ 6HFXULW\,-&6,769RO1R'HFHPEHU &ORXG&RPSXWLQJ6HFXULW\,VVXHVDQG5HVHDUFK&KDOOHQJHV5DEL3UDVDG3DGK\0DQDV5DQMDQ3DWUD6XUHVK&KDQGUD6DWDSDWK\6HQLRU 6RIWZDUH(QJLQHHU$VVRFLDWH3URIHVVRU+2' 3URIHVVRU2UDFOH,QGLD3YWOWG'HSWRI&RPSXWHU6FLHQFH'HSWRI&RPSXWHU6F (QJJ %DQJDORUH,QGLD%HUKDPSXU8QLYHUVLW\,QGLD$1,766DQLYDVDOD,QGLD

>@ ,QWHUQDWLRQDO -RXUQDO RI 1HWZRUN 6HFXULW\ ,WV $SSOLFDWLRQV ,-16$ 9RO 1R 0D\ '2, LMQVD 6(&85,7< ,668(6 $662&,$7(' :,7+ %,* '$7$ ,1 &/28' &20387,1* 9HQNDWD 1DUDVLPKD ,QXNROOX 6DLODMD $UVL DQG 6ULQLYDVD 5DR 5DYXUL 'HSDUWPHQW RI &RPSXWHU (QJLQHHULQJ 7H[DV 7HFK 8QLYHUVLW\ 86$ 'HSDUWPHQW RI %DQNLQJ DQG )LQDQFLDO 6HUYLFHV&RJQL]DQW7HFKQRORJ\6ROXWLRQV,QGLD

>@ $VVHVVLQJWKHGHWHUPLQDQWVRIFORXGFRPSXWLQJDGRSWLRQ$QDQDO\VLVRIWKHPDQXIDFWXULQJDQGVHUYLFHVVHFWRUV7LDJR2OLYHLUDD0DQRM 7KRPDV E 0DULDQD (VSDGDQDO D D ,6(*, 8QLYHUVLGDGH 1RYD GH /LVERD /LVERQ 3RUWXJDO E 6FKRRO RI %XVLQHVV 9LUJLQLD &RPPRQZHDOWK8QLYHUVLW\:0DLQ6WUHHW5LFKPRQG9$86$

>@ (QKDQFHGSULYDF\RIDUHPRWHGDWDLQWHJULW\FKHFNLQJSURWRFROIRUVHFXUHFORXGVWRUDJHE\<RQJ<Xā0DQ+R$Xā<L0Xā6KDRKXD7DQJ ā-LDQ5HQā:LOO\6XVLORā/LMX'RQJ

>@ 6HH GLVFXVVLRQVVWDWV DQG DXWKRU SURILOHVIRU WKLV SXEOLFDWLRQ DW KWWSVZZZUHVHDUFKJDWHQHWSXEOLFDWLRQ &ORXG &RPSXWLQJ 6HFXULW\,VVXHVDQG&KDOOHQJHV$57,&/(ā-$18$5<

>@ $$EEDVDQG68.KDQ³$UHYLHZRQWKH6WDWHRIWKHDUWSULYDF\SUHVHUYLQJDSSURDFKHVLQHKHDOWKFORXGV´,(((-%LRPHG+HDOWK ,QIRUPDWYROQRSS±-XO

>@ $ &RPSDUDWLYH 6XUYH\ RQ 6\PPHWULF .H\ (QFU\SWLRQ 7HFKQLTXHV 0RQLND $JUDZDO 'HSDUWPHQW 2I &RPSXWHU 6FLHQFH 6KUL 6KDQNDUD&KDU\D,QVWLWXWH2I7HFKQRORJ\ 0DQDJHPHQW%KLODL,QGLDPRQLNDDJUDZDO#JPDLOFRP3UDGHHS0LVKUD'HSDUWPHQW2I &RPSXWHU6FLHQFH6KUL6KDQNDUD&KDU\D&ROOHJH2I(QJLQHHULQJ 7HFKQRORJ\%KLODL,QGLDSUDGHHSPLVKUDX#JPDLOFRP

>@ 1LVLRND0RWRWVXJX³3XEOLF.H\FU\SWRV\VWHPZLWKSURYDEOHVHFXULW\'6SDFHDW:DVHGD8QLYHUVLW\ >@ KWWSVHQZLNLSHGLDRUJZLNL&ORXGBFRPSXWLQJBVHFXULW\

>@ -'HDQ6*KHPDZDW0DS5HGXFHVLPSOLILHGGDWDSURFHVVLQJRQODUJHFOXVWHUV&RPPXQLFDWLRQVRI7KH$&0± >@ +LPDQL$JUDZDODQG0RQLVKD6KDUPD³,PSOHPHQWDWLRQDQGDQDO\VLVRIYDULRXVV\PPHWULFFU\SWRV\VWHPV´,QGLDQ-RXUQDORI6FLHQFHDQG

7HFKQRORJ\9RO1R'HFHPEHU

>@ 5%X\\D63DQGH\DQG&9HFFKLROD&ORXGEXVWRRONLWIRUPDUNHWRULHQWHGFORXGFRPSXWLQJLQ3URFHHGLQJVVW,QWHUQDWLRQDO&RQIHUHQFH RQ&ORXG&RPSXWLQJ&ORXG&RP%HLMLQJSSB

>@ KWWSVFORXGVHFXULW\DOOLDQFHRUJWRSWKUHDWVFVDWKUHDWVYSGI

>@ /HFWXUH1RWHVRQ&U\SWRJUDSK\6KDIL*ROGZDVVHU0LKLU%HOODUH-XO\0,7&RPSXWHU6FLHQFHDQG$UWLĀFLDO,QWHOOLJHQFH /DERUDWRU\7KH6WDWD&HQWHU%XLOGLQJ9DVVDU6WUHHW&DPEULGJH0$86$(PDLOVKDIL#WKHRU\OFVPLWHGX:HESDJH KWWSWKHRU\OFVPLWHGXVKDIL'HSDUWPHQWRI&RPSXWHU6FLHQFHDQG(QJLQHHULQJ0DLO&RGH8QLYHUVLW\RI&DOLIRUQLDDW6DQ'LHJR *LOPDQ'ULYH/D-ROOD&$86$(PDLOPLKLU#FVXFVGHGX:HESDJHKWWSZZZFVHXFVGHGXXVHUVPLKLU

>@ 6HFXULW\DQGSULYDF\IRUVWRUDJHDQGFRPSXWDWLRQLQFORXGFRPSXWLQJ/LIHL:HLD+DRMLQ=KXD=KHQIX&DRD֛;LDROHL'RQJD:HLZHL -LDD<XQOX&KHQD$WKDQDVLRV99DVLODNRVE

Referências

Documentos relacionados

Amazon VPC enables enterprises to connect their existing infrastructure to a set of isolated AWS compute resources via a Virtual Private Network (VPN) connection, and to extend

Keywords — Cloud Computing; Risk Management; Information Security; Cloud Risks; Software as a service; Platform as a service; Infrastructure as a service..

The cloud computing security based on fully Homomorphic encryption, is a new concept of security which enables providing results of calculations on encrypted

A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection.. Process: World Future Society

Future prediction of pollution levels in an area depending on past pollution and weather data using machine learning..

1) Protection from Data Breaches: Various security mea- sures and techniques have been proposed to avoid the data breach in cloud. One of these is to encrypt data before storage

proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and

Various attacks such as social engineering attack, XML signature wrapping attack, malware injection, data manipulation, account hijacking, traffic flooding, and wireless local