ASIA unversity:Item 310904400/95809
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 94286/110023 (86%)
造訪人次 : 21706413      線上人數 : 212
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    ASIA unversity > 資訊學院 > 資訊工程學系 > 博碩士論文 >  Item 310904400/95809


    請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/95809


    題名: The Study of Cloud Data Privacy Preserving Mechanisms
    作者: Lin, Yung-Wang
    貢獻者: 資訊工程學系
    關鍵詞: Cloud Computing;Cloud Database;Data Encryption;Data Fragmentation;Data Masking;Access Control
    日期: 2015
    上傳時間: 2015-11-20
    出版者: 亞洲大學
    摘要: Due to the ever-updated technology of the Internet and the acceleration of network bandwidth, cloud computing has arisen. The development of cloud has offered an effective platform, which enables users to swiftly store and share the data. Organizations at all levels or individuals no longer need to pay extra cost purchasing information technology equipment, but seek multi-functional cloud service from the providers. Thus, to cater to the cost down of manpower and the decreased budge of the equipment, cloud will be the best option. Nonetheless, using the cloud system has its inevitable risk. It is highly possible that hackers visit the platform with its authentication mechanisms and access others personal data, which has posed a threat to cloud data.
    This study focuses on the issue of illegal access of personal documents and seeks corresponding solutions. Three focal points will be brought up regarding the information security. First and foremost, we will discuss the management of personal data as per ISO SOP and domestic regulations. Secondly, we discuss the solutions to the privacy of cloud databases, which include data encryption and data fragmentations. K-anonymity is adopted to discuss data encryption; as for data fragmentations, we use collection as a solution. This study suggests enterprises adopt both methodologies to ensure personal data preserving. Thirdly, this study focuses on discussing data masking in regard to classified documents. With authorization mechanisms, data bits of digital archives can only be correctly and completely accessed by legitimate users. This study aims at preserving a low-risk and high-reliability cloud environment.
    顯示於類別:[資訊工程學系] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML293檢視/開啟


    在ASIAIR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋