Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55872
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor薛智文(Chih-Wen Hsueh)
dc.contributor.authorYuxuan Linen
dc.contributor.author林鈺烜zh_TW
dc.date.accessioned2021-06-16T05:09:53Z-
dc.date.available2015-08-22
dc.date.copyright2014-08-22
dc.date.issued2014
dc.date.submitted2014-08-19
dc.identifier.citation[1] Facebook — a social network. https://www.facebook.com/, 2004. [Online; accessed 2014-07-15].
[2] Login with Facebook. https://developers.facebook.com/products/login/, 2004. [Online; accessed 2014-07-15].
[3] OpenID Authentication 2.0 - Final. http://openid.net/specs/openid-authentication-2_0.html, 2007. [Online; accessed 2014-07-15].
[4] OpenID Foundation. http://openid.net/foundation/, 2007. [Online; accessed 2014-07-15].
[5] Information technology – security techniques – entity authentication assurance framework, 2013.
[6] OpenID Connect. http://openid.net/developers/specs/, 2014. [Online; accessed 2014-07-15].
[7] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. Privacy-enabling social networking over untrusted networks. In Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN ’09, pages 1–6, New York, NY, USA, 2009. ACM.
[8] Angela Bonifati, Hui (Wendy)Wang, and Ruilin Liu. Spac: A distributed, peer-to-peer, secure and privacy-aware social space. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM ’10, pages 1953–1954, New York, NY, USA, 2010. ACM.
[9] L.J. Camp. Digital identity. Technology and Society Magazine, IEEE, 23(3):34–41, Fall 2004.
[10] Xu Cheng and Jiangchuan Liu. Nettube: Exploring social networks for peer-to-peer short video sharing. In INFOCOM 2009, IEEE, pages 1152–1160, April 2009.
[11] Ed H. Chi. Information seeking can be social. Computer, 42(3):42–46, March 2009.
[12] Federal Financial Institutions Examination Council. Authentication in an internet banking environment. Financial Institution Letter, FIL-103-2005. Washington, DC: Federal Deposit Insurance Corp.(FDIC). Retrieved March, 18:2005, 2005.
[13] M.L. Das, A Saxena, and V.P. Gulati. A dynamic id-based remote user authentication scheme. Consumer Electronics, IEEE Transactions on, 50(2):629–631, May 2004.
[14] Hoang Giang Do, Wee Keong Ng, and Zhendong Ma. Privacy-preserving social network for an untrusted server. In Cloud and Green Computing (CGC), 2013 Third International Conference on, pages 472–478, Sept 2013.
[15] L. Harn. A public-key based dynamic password scheme. In Applied Computing, 1991., [Proceedings of the 1991] Symposium on, pages 430–435, Apr 1991.
[16] Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. Social phishing. Commun. ACM, 50(10):94–100, October 2007.
[17] Jens Janiuk, Alexander Macker, and Kalman Graffi. Secure distributed data structures for peer-to-peer-based social networks. In Collaboration Technologies and Systems (CTS), 2014 International Conference on, pages 396–405, May 2014.
[18] C.I Jaramillo, G.G. Richard, S.O. Sperry, andW. Patterson. An implementation of a zero-knowledge protocol for a secure network login procedure. In Southeastcon ’89. Proceedings. Energy and Information Technologies in the Southeast., IEEE, pages 197–201 vol.1, Apr 1989.
[19] Moo Nam Ko, G.P. Cheek, M. Shehab, and R. Sandhu. Social-networks connect services. Computer, 43(8):37–43, Aug 2010.
[20] P. Leach, M. Mealling, and R. Salz. RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace, 2005.
[21] Wanying Luo, Qi Xie, and U. Hengartner. Facecloak: An architecture for user privacy on social networking sites. In Computational Science and Engineering, 2009. CSE ’09. International Conference on, volume 3, pages 26–33, Aug 2009.
[22] VictorS. Miller. Use of elliptic curves in cryptography. In HughC. Williams, editor, Advances in Cryptology CRYPTO 85 Proceedings, volume 218 of Lecture Notes in Computer Science, pages 417–426. Springer Berlin Heidelberg, 1986.
[23] Xuguang Ren and Xin-Wen Wu. A novel dynamic user authentication scheme. In Communications and Information Technologies (ISCIT), 2012 International Symposiumon, pages 713–717, Oct 2012.
[24] Haifeng Yu, P.B. Gibbons, M. Kaminsky, and Feng Xiao. Sybillimit: A nearoptimal social network defense against sybil attacks. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 3–17, May 2008.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/55872-
dc.description.abstract近年來社群網站蓬勃發展,Google 和 Facebook 等公司透過搜集分析與操作網際網路上的使用者資料,提供了許多智慧化的服務與資訊。不過,這些本來是私人的資料逐漸被這些公司所把持,其中包括許多個人的隱私。於是,不僅難以確保隱私,也難以在不同公司間的各種網路服務分享與修改個人資料。另一方面,社群網站上存在許多假的甚至惡意的資訊,不僅對使用者造成困擾,也浪費了許多社會成本來處理。因此,本論文提出了自主式的社群網路身分 (Aid),讓使用者能夠完全掌握自己的資料和隱私。我們將 Aid 從網路服務中獨立出來,讓大部份的資訊儲存在本地,並透過數位簽章的機制進行身分驗證。此外,使用者能夠真正自主的前提是使用者要能先為自己的社會活動負責。因此,我們也提出了一個自主的機制來評估如信用度或真實度等 Aid 的度量,讓使用者可以利用這些度量彼此量化評估。目前我們已經實作出 Aid 的雛型以及給服務使用的應用介面,提供多個學校的實驗室開發相關的自主網路服務。透過『自主量化』的 Aid,相信網路身分能變得更加自主可靠,進而提升社群網路活動的品質。zh_TW
dc.description.abstractAs the booming of social network recently, companies such as Google and Facebook provide intelligent services and information by collecting, analyzing, and manipulating user data on the Internet. However, these originally private data which contain lots of privacy gradually become dominated by these companies. Thus, not only might the privacy not be ensured but it is also difficult to share and update personal data among services of different companies. On the other hand, much information is fake or even malicious on social network. It not only confuses users but also wastes lots of social cost to handle. Hence, this thesis proposes an autonomous identity (Aid) for social network to provide users with total control of own data and privacy. Aid is designed independent from network services, most of Aid information is stored locally, and it is authenticated by digital signature. Moreover, users need to be responsible for their social activities before they can be really autonomous. Therefore, we also propose an autonomous mechanism to evaluate metrics of Aid, such as credit or reality, so that users can evaluate one another by these metrics quantitatively. We have implemented the prototype of Aid and application programming interfaces for services, offered some laboratories of some universities to develop autonomous network services. By Aid of 'autonomous quantification', we believe network identities become more autonomous and reliable to increase the quality of activities in social network.en
dc.description.provenanceMade available in DSpace on 2021-06-16T05:09:53Z (GMT). No. of bitstreams: 1
ntu-103-R01922065-1.pdf: 611001 bytes, checksum: f682b33467d275564c29b8562fa41d74 (MD5)
Previous issue date: 2014
en
dc.description.tableofcontentsContents
1 Introduction 1
2 Background 7
2.1 Universally Unique Identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.1 Version 1 (MAC Address) . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.2 Version 4 (Random) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2 Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2.1 Traditional Password Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2.2 OpenID Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3 Digital Signature Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.3.1 Elliptic Curve Digital Signature Algorithm . . . . . . . . . . . . . . . . . . 15
3 Design of Autonomous Identity 18
3.1 Architecture of Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.1.1 AidCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.1.2 AidTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.1.3 DataStorage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.1.4 CacheServer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2 Data Structure of Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2.1 Actor Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.3 Authentication of Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4 Credit and Reality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4 Implementation 27
4.1 Creating Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.1.1 Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.1.2 Sign In Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.2 Updating Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.2.1 Resetting System Identifier or Password . . . . . . . . . . . . . . . . . . . . 33
4.2.2 Forgetting UUID and Password . . . . . . . . . . . . . . . . . . . . . . . . 33
4.2.3 Destroying Aid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.3 Feasibility Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
5 Conclusion 36
Bibliography 37
dc.language.isozh-TW
dc.subject網路身分zh_TW
dc.subject身分自主zh_TW
dc.subject身份驗證zh_TW
dc.subject數位簽章zh_TW
dc.subject社群網路zh_TW
dc.subjectnetwork identityen
dc.subjectautonomous identityen
dc.subjectauthenticationen
dc.subjectdigital signatureen
dc.subjectsocial networken
dc.title自主式社群網路身分的設計與實作zh_TW
dc.titleThe Design and Implementation of Autonomous Identity for Social Networken
dc.typeThesis
dc.date.schoolyear102-2
dc.description.degree碩士
dc.contributor.oralexamcommittee徐讚昇,張榮貴,陳敬
dc.subject.keyword網路身分,身分自主,身份驗證,數位簽章,社群網路,zh_TW
dc.subject.keywordnetwork identity,autonomous identity,authentication,digital signature,social network,en
dc.relation.page40
dc.rights.note有償授權
dc.date.accepted2014-08-19
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-103-1.pdf
  未授權公開取用
596.68 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved