Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Achieving data privacy and security ...
~
Huang, Xueli.
Linked to FindBook
Google Book
Amazon
博客來
Achieving data privacy and security in cloud.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Achieving data privacy and security in cloud./
Author:
Huang, Xueli.
Description:
101 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
Contained By:
Dissertation Abstracts International77-10B(E).
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10111293
ISBN:
9781339745022
Achieving data privacy and security in cloud.
Huang, Xueli.
Achieving data privacy and security in cloud.
- 101 p.
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
Thesis (Ph.D.)--Temple University, 2016.
The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud computing. The traditional method to protect the data privacy is to encrypt data before they are sent to public cloud, but heavy computation is always introduced by this approach, especially for the image and video data, which has much more amount of data than text data. Another way is to take advantage of hybrid cloud by separating the sensitive data from non-sensitive data and storing them in trusted private cloud and un-trusted public cloud respectively. But if we adopt the method directly, all the images and videos containing sensitive data have to be stored in private cloud, which makes this method meaningless.
ISBN: 9781339745022Subjects--Topical Terms:
523869
Computer science.
Achieving data privacy and security in cloud.
LDR
:04393nmm a2200313 4500
001
2114864
005
20161128141928.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339745022
035
$a
(MiAaPQ)AAI10111293
035
$a
AAI10111293
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Huang, Xueli.
$3
1975680
245
1 0
$a
Achieving data privacy and security in cloud.
300
$a
101 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-10(E), Section: B.
500
$a
Adviser: Xiaojiang Du.
502
$a
Thesis (Ph.D.)--Temple University, 2016.
520
$a
The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud computing. The traditional method to protect the data privacy is to encrypt data before they are sent to public cloud, but heavy computation is always introduced by this approach, especially for the image and video data, which has much more amount of data than text data. Another way is to take advantage of hybrid cloud by separating the sensitive data from non-sensitive data and storing them in trusted private cloud and un-trusted public cloud respectively. But if we adopt the method directly, all the images and videos containing sensitive data have to be stored in private cloud, which makes this method meaningless.
520
$a
Moreover, the emergence of the Software-Defined Networking (SDN) paradigm, which decouples the control logic from the closed and proprietary implementations of traditional network devices, enables researchers and practitioners to design new innovative network functions and protocols in a much easier, flexible, and more powerful way. The data plane will ask the control plane to update flow rules when the data plane gets new network packets with which it does not know how to deal with, and the control plane will then dynamically deploy and configure flow rules according to the data plane's requests, which makes the whole network could be managed and controlled efficiently. However, this kind of reactive control model could be used by hackers launching Distributed Denial-of-Service (DDoS) attacks by sending large amount of new requests from the data plane to the control plane.
520
$a
For image data, we divide the image is into pieces with equal size to speed up the encryption process, and propose two kinds of method to cut the relationship between the edges. One is to add random noise in each piece, the other is to design a one-to-one mapping function for each piece to map different pixel value into different another one, which cuts off the relationship between pixels as well the edges. Our mapping function is given with a random parameter as inputs to make each piece could randomly choose different mapping. Finally, we shuffle the pieces with another random parameter, which makes the problems recovering the shuffled image to be NP-complete.
520
$a
For video data, we propose two different methods separately for intra frame, I-frame, and inter frame, P-frame, based on their different characteristic. A hybrid selective video encryption scheme for H.264/AVC based on Advanced Encryption Standard (AES) and video data themselves is proposed for I-frame. For each P-slice of P-frame, we only abstract small part of them in private cloud based on the characteristic of intra prediction mode, which efficiently prevents P-frame being decoded.
520
$a
For cloud running with SDN, we propose a framework to keep the controller away from DDoS attack. We first predict the amount of new requests for each switch periodically based on its previous information, and the new requests will be sent to controller if the predicted total amount of new requests is less than the threshold. Otherwise these requests will be directed to the security gate way to check if there is a attack among them. The requests that caused the dramatic decrease of entropy will be filter out by our algorithm, and the rules of these request will be made and sent to controller. The controller will send the rules to each switch to make them direct the flows matching with the rules to honey pot.
590
$a
School code: 0225.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
Temple University.
$b
Computer and Information Science.
$3
1065462
773
0
$t
Dissertation Abstracts International
$g
77-10B(E).
790
$a
0225
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10111293
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9325486
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login