帳號:guest(18.216.3.63)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:Demiah Kisla Charlery
作者(英文):Demiah Kisla Charlery
論文名稱:Secure Role-Based Access Control and Encryption Framework with a Case Study on Law Enforcement Data Application
論文名稱(英文):Secure Role-Based Access Control and Encryption Framework with a Case Study on Law Enforcement Data Application
指導教授:雍忠
指導教授(英文):Chung Yung
口試委員:雍忠
湯政仁
方文杰
口試委員(英文):Chung Yung
Cheng-Jen Tang
Wen-Chieh Fang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:611021301
出版年(民國):112
畢業學年度:111
語文別:英文
論文頁數:61
關鍵詞:資料安全RSA 加密演算法基於角色的存取控制(RBAC)政府機構加密存取控制機密性完整性
關鍵詞(英文):Data SecurityRSA encryption algorithmRole-Based Access Control (RBAC)government agenciesencryptionaccess controlconfidentialityintegrity
相關次數:
  • 推薦推薦:0
  • 點閱點閱:13
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:14
  • 收藏收藏:0
本論文提供了一種資訊安全的基於角色的存取控制(RBAC)和加密架構,專為執法資料存取應用量身定製,特別是使用Rivest-Shamir-Adleman(RSA)加密技術。該系統的創建和評估結合了RBAC和RSA加密,以保證政府機構內敏感資料處理的安全性與機密性,並進行深入測試以確定架構提供的資訊安全程度。本論文還包括四個不同的個案,展示了所提出系統的實用性與效果。這些個案涵蓋以下主題:通過使用 RBAC 提高資料安全性;保護員工資料存取並對性犯罪者調查背景資料進行加密;以及在刑事調查中的醫療資料進行資訊安全管控。通過這些個案的研究,我們將檢查並解決基於 RSA範例的優點、缺點和效果。此外,我們也進行了學理上的評估討論,比較RBAC與基於屬性的加密(ABE)和我們所提出的系統。此比較的目的是評估每種策略的優缺點。論文結果為在政府企業中構建安全的RBAC和RSA加密體系結構提供了具體的建議,和最佳實踐指南,期望對於提升處理與執法相關資訊的安全性能有所助益。
This thesis offers a secure role-based access control (RBAC) and encryption architecture tailored for law enforcement data applications, specifically using the Rivest-Shamir-Adleman (RSA) encryption technique. The creation and assessment of this system, which combines RBAC and RSA encryption to guarantee the secure handling of sensitive data within government institutions, is the main focus. In-depth testing is done to determine how well the framework provides safe data access and confidentiality. The thesis also includes three different use cases that show the usefulness of the proposed system. These use cases cover the following topics: improving security through the use of RBAC; protecting employee data access and encrypting it in the context of a sex offender investigation; and secure management of medical records in a criminal investigation. The benefits, drawbacks, and ramifications of the RSA-based paradigm are xamined and addressed through these use cases. Also included is a theoretical evaluation RBAC, attribute-based encryption (ABE), and the proposed system. The objective of this comparison is to assess the advantages and disadvantages of each strategy. The thesis findings provide insightful suggestions, best practices, and guidelines for building a secure RBAC and RSA encryption architecture in government enterprises, particularly those that handle data related to law enforcement.
Chapter 1 Introduction 1
1.1 Motivation and Goals 2
1.2 Use Case#1 - Security Enhancement Through RBAC Implementation 5
1.3 Data Security Techniques 8
1.4 Thesis Overview 9
Chapter 2 Background and Related Work 11
2.1 Law Enforcement Data 11
2.2 Data Collection and Storage 11
2.3 RSA 12
2.4 Role Based Access Control Acknowledgement Algorithm 13
2.5 Attribute Based Encryption (ABE) 15
Chapter 3 Material and Methodology 17
3.1 The Dataset 17
3.2 The Environment 18
3.3 Use Case#2 - Secure Employee Data Access and Encryption in the Context of a Sex Offender Investigation 19
3.4 The Framework 22
3.5 The Algorithm 24
Chapter 4 System Implementation & Demonstration 29
Chapter 5 Experimental Results & Discussion 37
5.1 Use Case#3 – Secure Handling of Medical Records in a Criminal Investigation 38
5.2 Experimental Results 39
5.2.1 Use Case #1 41
5.2.2 Use Case #2 43
5.2.3 Use Case #3 44
5.3 System Performance Assessment 46
5.4 Comparative Analysis: RBAC, ABE vs Proposed System 49
5.5 Findings and Analysis 54
5.6 Use Case#4 – Handling Users with Multiple Roles in a Law Enforcement Agency 55
Chapter 6 Conclusion and Future Work 57
Author’s Biography – Demiah Kisla Charlery 60
References 61
[1] G. Singh, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” 2013.
[2] P. Kumar Tiwari, V. Choudhary, and S. Raj Aman, “Analysis and Comparison of DES, AES, RSA Encryption Algorithms,” in Proceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 1913–1918. doi: 10.1109/ICAC3N56670.2022.10073996.
[3] Y. Singhal, A. Agarwal, S. Mittal, S. Katyayani, and A. Sharma, “Database Security using Cryptography,” Int J Res Appl Sci Eng Technol, vol. 10, no. 6, pp. 582–587, Jun. 2022, doi: 10.22214/ijraset.2022.43621.
[4] S. Radhakrishnan and A. Akila, “Securing Distributed Database Using Elongated RSA Algorithm,” in 2021 7th International Conference on Advanced Computing and Communication Systems, ICACCS 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021, pp. 1931–1936. doi: 10.1109/ICACCS51430.2021.9441962.
[5] C. Ling, “Research on role-based access control policy of e-government,” in Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, 2010, pp. 714–716. doi: 10.1109/ICEE.2010.186.
[6] Y. Zhang, R. H. Deng, S. Xu, J. Sun, Q. Li, and D. Zheng, “Attribute-based Encryption for Cloud Computing Access Control: A Survey,” ACM Computing Surveys, vol. 53, no. 4. Association for Computing Machinery, Sep. 01, 2020. doi: 10.1145/3398036.
[7] Z. Zeng, T. Chen, and Y. Zhang, “E-government information security in the web environment based on role based access control technology,” in 2008 International Seminar on Business and Information Management, ISBIM 2008, IEEE Computer Society, 2008, pp. 210–213. doi: 10.1109/ISBIM.2008.246.
[8] K. Rajesh Rao, I. G. Ray, W. Asif, A. Nayak, and M. Rajarajan, “R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data,” IEEE Access, vol. 7, pp. 133274–133289, 2019, doi: 10.1109/ACCESS.2019.2941560.
[9] S. T. KR and P. N, “Secure Crime Case Summary in Police Station Using Block Chain Technology,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 50–53, Jul. 2021, doi: 10.32628/cseit217410.
[10] X. Feng et al., “Verifiable Decentralized Access Control for Distributed Databases,” in Proceedings - 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Institute of Electrical and Electronics Engineers Inc., Oct. 2020, pp. 248–253. doi: 10.1109/CyberC49757.2020.00046.
[11] S. Omer, A. L. Faroog, M. Koko, D. Amin Babiker, and A. / Nabi Mustafa, “Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication,” vol. 17, no. 1, pp. 62–69, doi: 10.9790/0661-17136269.
[12] P. Kumar Tiwari, V. Choudhary, and S. Raj Aman, “Analysis and Comparison of DES, AES, RSA Encryption Algorithms,” in Proceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 1913–1918. doi: 10.1109/ICAC3N56670.2022.10073996.
[13] S. Radhakrishnan and A. Akila, “Securing Distributed Database Using Elongated RSA Algorithm,” in 2021 7th International Conference on Advanced Computing and Communication Systems, ICACCS 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021, pp. 1931–1936. doi: 10.1109/ICACCS51430.2021.9441962.
[14] R. Ghazal, A. K. Malik, N. Qadeer, B. Raza, A. R. Shahid, and H. Alquhayz, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” IEEE Access, vol. 8, pp. 12253–12267, 2020, doi: 10.1109/ACCESS.2020.2965333.
[15] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption.”
[16] N. A. Fitri, M. Udin, H. Al Rasyid, A. Sudarsono, P. Elektronika, and N. Surabaya, “Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm,” EMITTER International Journal of Engineering Technology, vol. 7, no. 1, 2019.
[17] T. Lee, H. S. Moon, and J. Jang, “Data encryption method using CP-ABE with symmetric key algorithm in blockchain network,” in International Conference on ICT Convergence, IEEE Computer Society, 2021, pp. 1371–1373. doi: 10.1109/ICTC52510.2021.9620889.
[18] Sex Offenders Dataset. Accessed: 10 April 2023. [Online]. Available: Sex Offenders | City of Chicago | Data Portal
[19] Current Employee Dataset. Accessed: 10 April 2023. [Online]. Available: Current Employee Names, Salaries, and Position Titles | City of Chicago | Data Portal
[20] Public Health Dataset. Accessed: 10 April 2023. [Online]. Available: Public Health Statistics - Selected public health indicators by Chicago community area - Historical | City of Chicago | Data Portal
[21] HeidiSQL, MariaDB, MySQL. [Online]. Available: https://www.heidisql.com
[22] Welcome to Python. [Online]. Available: https://www.python.org
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *