• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Ŭ¶ó¿ìµå ½ºÅ丮Áö »ó¿¡¼­ ¾ÈÀüÇÏ°í ½Ç¿ëÀûÀÎ ¾ÏÈ£µ¥ÀÌÅÍ Áߺ¹Á¦°Å¿Í ¼ÒÀ¯±Ç Áõ¸í ±â¼ú
¿µ¹®Á¦¸ñ(English Title) A Secure and Practical Encrypted Data De-duplication with Proof of Ownership in Cloud Storage
ÀúÀÚ(Author) ¹ÚöÈñ   È«µµ¿ø   ¼­Ã¢È£   Cheolhee Park   Dowon Hong   Changho Seo  
¿ø¹®¼ö·Ïó(Citation) VOL 43 NO. 10 PP. 1165 ~ 1172 (2016. 10)
Çѱ۳»¿ë
(Korean Abstract)
Ŭ¶ó¿ìµå ½ºÅ丮Áö ȯ°æ¿¡¼­ Áߺ¹Á¦°Å ±â¼úÀº ½ºÅ丮ÁöÀÇ È¿À²ÀûÀÎ È°¿ëÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. ¶Ç
ÇÑ Å¬¶ó¿ìµå ½ºÅ丮Áö ¼­ºñ½º Á¦°øÀÚµéÀº ³×Æ®¿öÅ© ´ë¿ªÆøÀ» Àý¾àÇϱâ À§ÇØ Å¬¶óÀ̾ðÆ® Ãø Áߺ¹Á¦°Å ±â¼úÀ» µµÀÔÇÏ°í ÀÖ´Ù. Ŭ¶ó¿ìµå ½ºÅ丮Áö ¼­ºñ½º¸¦ ÀÌ¿ëÇÏ´Â »ç¿ëÀÚµéÀº ¹Î°¨ÇÑ µ¥ÀÌÅÍÀÇ ±â¹Ð¼ºÀ» º¸ÀåÇϱâ À§ÇØ µ¥ÀÌÅ͸¦ ¾ÏȣȭÇÏ¿© ¾÷·ÎµåÇÏ±æ ¿øÇÑ´Ù. ±×·¯³ª ÀϹÝÀûÀÎ ¾Ïȣȭ ¹æ½ÄÀº »ç¿ëÀÚ¸¶´Ù ¼­·Î ´Ù¸¥ ºñ¹ÐÅ°¸¦ »ç¿ëÇϱ⠶§¹®¿¡ Áߺ¹Á¦°Å¿Í Á¶È­¸¦ ÀÌ·ê ¼ö ¾ø´Ù. ¶ÇÇÑ Å¬¶óÀ̾ðÆ® Ãø Áߺ¹Á¦°Å´Â ÅÂ±× °ªÀÌ Àüü µ¥ÀÌÅ͸¦ ´ë½ÅÇϱ⠶§¹®¿¡ ¾ÈÀü¼º¿¡ Ãë¾àÇÒ ¼ö ÀÖ´Ù. Ãֱ٠Ŭ¶óÀ̾ðÆ® Ãø Áߺ¹Á¦°ÅÀÇ Ãë¾àÁ¡À» º¸¿ÏÇϱâ À§ÇØ ¼ÒÀ¯±Ç Áõ¸í ±â¹ýµéÀÌ Á¦¾ÈµÇ¾úÁö¸¸ ¿©ÀüÈ÷ ¾ÏÈ£µ¥ÀÌÅÍ »ó¿¡¼­ Ŭ¶óÀ̾ðÆ® Ãø Áߺ¹Á¦°Å ±â¼úÀº È¿À²¼º°ú ¾ÈÀü¼º¿¡ ¹®Á¦Á¡À» °¡Áö°í ÀÖ´Ù. º» ³í¹®¿¡¼­´Â Àü¼öÁ¶»ç °ø°Ý¿¡ ÀúÇ×¼ºÀ» °®°í ¾ÏÈ£µ¥ÀÌÅÍ »ó¿¡¼­ ¼ÒÀ¯±Ç Áõ¸íÀ» ¼öÇàÇÏ´Â ¾ÈÀüÇÏ°í ½Ç¿ëÀûÀΠŬ¶óÀ̾ðÆ® Ãø Áߺ¹Á¦°Å ±â¼úÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
In cloud storage environment, deduplication enables efficient use of the storage. Also, in order to save network bandwidth, cloud storage service provider has introduced client-side deduplication. Cloud storage service users want to upload encrypted data to ensure confidentiality. However, common encryption method cannot be combined with deduplication, because each user uses a different private key. Also, client-side deduplication can be vulnerable to security threats because file tag replaces the entire file. Recently, proof of ownership schemes have suggested to remedy the vulnerabilities of client-side deduplication. Nevertheless, client-side deduplication over encrypted data still causes problems in efficiency and security. In this paper, we propose a secure and practical client-side encrypted data deduplication scheme that has resilience to brute force attack and performs proof of ownership over encrypted data.
Å°¿öµå(Keyword) Áߺ¹Á¦°Å   ¼ÒÀ¯±ÇÁõ¸í   ¾ÏÈ£µ¥ÀÌÅÍ Áߺ¹Á¦°Å   Ŭ¶ó¿ìµå ½ºÅ丮Áö   deduplication   proof of ownership   encrypted data deduplication   cloud storage  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå