| Distributed Cache technology is always in the spotlight in research of theory and applications, especially in recent years. The scale of network application is growing, as the development of spreading of Internet. Not only has the network application itself become larger and larger, but also the number of the users is increasing. Internet is not only the tool which push information towards the network users anymore because of the spread and popularity of Web 2.0. Now Internet appears a place for sharing personal information, experiences, photos, videos and music. It advocates that users can initiative publish their stuff into Internet. Many social networks which driven by the conception of Web2.0 were established in a short time, such as Facebook, LinkedIn, MySpace, Twitter and so forth. These applications formed lots of large communities which owned large number of users. There are common points among these applications, those are the amount of users and frequent in updating. Moreover, because of the development in e-commerce in recent years, more and more people tend to shop online. The e-commerce web sites such as Taobao.com, Paipai.com, Amazon.com and so on, is producing heavy network traffic at every second. All these should base on cache technology.The applications could not meet the requirement of such a high load of work if there is not a suitable cache architect, so cannot the good user experience. A novel security mechanism for memcached is introduced in this paper. But at the first, the paper described the cache technology and distributed cache technology and the research status of the technologies currently, the algorithms related with cache technology and the popular cache products. And then the product named memcached is referred. The mechanisms in this product are analyzed and researched, including the mainly data structure, storage and memory allocation strategy, multi-threaded mechanism and the command process flow. And next the drawback on security respect in the command line protocol of memcached is proposed. For dealing with this issue, memcached-authz, a security enhanced component for command line protocol of memcached, is proposed. This component is used to authorize and authenticate the cache clients when using the command line protocol of memcached. The design and implementation of memcached-authz is based on memcached. Symmetric encryption and hash digest algorithms are used in authorization process by balancing between securities and computing performance. There are several main parts in this paper. These parts described the process of designing, implementation and experiments which proof memcached-authz component could work as a proxy with memcached smoothly and provide security features for memcached servers. |