Font Size: a A A

Research And Evaluation On Data Security Mechanisms In Cloud Computing Platform

Posted on:2014-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiuFull Text:PDF
GTID:2248330398472336Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Cloud computing is evolved from traditional computing technology and grid computing. For distributed virtual structure, cloud service providers through the sharing and coordination of data resources, multiple computing entity integration, making it the perfect system with powerful computing capabilities. In future Internet development, cloud computing as an important component, the application of cloud computing is certainly more and more widely.However, in cloud computing, users need to transfer large amounts of data resources to the cloud, which allows users to worry about the security and privacy of data stored in the cloud. Therefore, data security of cloud computing is one of the most important issues need to be addressed. The trusted cloud computing, which combination of trusted computing technology is a major research direction to resolve the data security issues in cloud computing. Using trusted cloud computing platform, cloud computing provides users with a secure operating environment, and provides a basis for the protection of data security in the cloud.In this paper, based on trusted computing platform, we mainly protected data in cloud computing platform from two aspects.One hand, using trusted platform module, we proposed a data isolation access mechanism based on role distributed. Through comprehensive validation of trust certificates and trust level of users, As well as real-time monitoring of user behavior, we achieved the protection of data storage, isolation and access in cloud computing platform. On the other hand, using homomorphic encryption technology, we. proposed a data privacy operation mechanism based on homomorphic encryption, by encrypting the plaintext data, and then through homomorphic arithmetic operating on the ciphertext data, we achieved the protection of data privacy operating in cloud computing platform.Theory and practice prove that the data isolation access mechanism based on role distributed and the data privacy operation mechanism based on homomorphic encryption has a good effect to improve the data security in cloud computing platform.
Keywords/Search Tags:cloud computing, data security, role distributed, trustlevel, homomorphic encryption, privacy operating
PDF Full Text Request
Related items