摘要: | 雲端服務的特性是將應用程式(Application Server)與資料(Data)置於遠端,使用者可以透過不同的媒體進行服務存取(例如:網際網路與行動嵌入式系統)。此外,雲端平台可提供完全彈性的(Elastic)服務,使用者可以隨時根據需要而更換不同的服務提供商或是選購不同配額(Quota)的服務。然而,這也為雲端計算平台帶來更大的挑戰,因為要保持這樣的彈性,服務提供商必須針對此平台上的安全性與隱密性(Security & Privacy)、系統容錯(Fault Tolerance)、負載平衡(Load Balancing) 以及質量服務(Quality of Service, QoS)等議題提出合適的解決方案。根據本團隊過去的研究經驗,上述各項議題在分散式系統架構中,攔截機制是最常使用的解決方案之一。因此,本團隊認為攔截機制應該也適用於雲端計算平台;然而,目前的雲端計算平台並未提供與攔截機制相關的解決方案。為此,本團隊預計研發一套適用於雲端服務的攔截機制。此外,由於近年來行動嵌入式系統(Mobile Embedded System)的使用越來越廣泛,根據報導,台灣平均每個人有1.59隻行動電話,加上漸漸成為汽車標準的GPS導航系統,這些行動系統都保存了一些隱私資訊,例如:短訊(SMS)、多媒體訊息(MMS)、通話記錄(Call Log)、通訊錄(Contact)、通話語音與GPS座標資訊等,這些資料的洩漏將造成隱私被竊聽與侵犯,因此行動系統的安全性成為重要的一環。本計畫亦將針對行動嵌入式系統進行一系列的研究,研發可偵測出嘗試存取隱私資訊並對外送出的程式,並記錄下該程式執行時期的行為與相關資訊,以做為後續分析、記錄與提供查詢,藉此保護行動嵌入式系統的安全性。 Since Cloud Computing platform places its services (e.g. application servers and data centers) at remote sites; therefore, users can access Cloud services through different ways (e.g. Web Service and Mobile device). Besides, Cloud can provide elastic services which users can change their services provider and/or hardware/software quota on-demand. This nature of elasticity brings challenges to the existing information technologies, including security, privacy, fault tolerance, robustness, load balance, and quality of services. According to our research experience, we find that the interceptor approach is a commonly used solution to resolve previous issues on distribution system. We believe that the interceptor approach maybe a promising candidate for the Cloud Computing platform, which is a system with distributed architecture. However, the current infrastructure of the Cloud Computing doesn’t support any types of the interceptor mechanism. We therefore propose to investigate an interceptor mechanism for Cloud Computing. Recently, mobile embedded systems have become increasingly popular. Nowadays, in Taiwan the number of cellular phones that each person owns is about 1.59. However, a lot of private information is stored in these devices, such as short message, multimedia messages, call logs, contacts, voice and geolocation. As a result, we believe in the near future mobile devices will become one of the major targets of attackers. This research also focuses on the security issue of one of the most promising mobile operating systems to protect the private information stored in a cellular phone. Therefore, we will develop some mechanisms to prevent the leak of private information stored in cellular phone through utilizing the special properties of mobile devices to control the transmission of private data. 研究期間:9908 ~ 10007 |