Font Size: a A A

Based On The Key Techniques Of Cloud Computing Data Security

Posted on:2013-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:S HanFull Text:PDF
GTID:2248330374485638Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years, cloud computing has been the hot topic in research and applicationfiled and envisioned as the next-generation architecture by most IT Enterprises andinsiders. It has completely changed people’s custom of using computers. Most ofapplication software and data is moved into huge data centers of the cloud computingservices provider in the cloud computing environment. All application software anddata is managed by the cloud computing services provider as well. This feature bringsconvenient as well as many security challenges.Users may feel uneasy due to the datastorage is not controllable and have no faith in the service. To a great extent, it restrictsthe development of cloud computing. Therefore, the data security area of cloudcomputing is of important application and academic value to be researched.In this thesis, data security in cloud computing is regarded as the research object.First of all, the definiton, model, structure, application, research organization and relatedknowledge of cloud computing is introduced. Then, the data security assurance methodswhich used in this thesis including symmetric and asymmetric encryption system,attribute-based encryption algorithm and Merkle Hash Tree are discussed. The securitychallenge, advantage, protective measures and security architecture of data securitybased in cloud computing environment are summarized with many cloud computing’scharacteristics, such as massive, virtualization, dynamics and eapansibility.On this basis, according to the data storage’s dynamic operation characteristics andless of verification support in cloud computing environment, the thesis has put forwarda scheme which is based on the Merkle Hash Tree structure. The main ideas and safeassumption of the scheme are introduced. Also the pretreatment and validation methodof the file and data dynamic operation process including insertion, modification anddeletion are described. The scheme is analyzed as well. In addition, due to solving thedata file’s access control problem in cloud computing environment, the thesis hasproposed a solution which is based on attribute-based encryption algorithm andintroduced the main ideas and safe assumption of the scheme. The participants andrelated definitions are described. The thesis has designed initialization of scheme, file access and the change of access permission in details. Finally, the scheme is alsoanalyzed.
Keywords/Search Tags:cloud computing, data security, Merkle Hash Tree, attribute-basedencryption
PDF Full Text Request
Related items