Font Size: a A A

A Transmission Security Plan Based On Distributed System

Posted on:2008-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:L HuangFull Text:PDF
GTID:2178360212474150Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The distributed system security is an essential link in the system construction, but transmission is a weak link in distributed system security. By the development of the distributed system service more and more complex, the transmission safety of the distributed system is facing the new challenge. Many distributed systems take Internet as the transmission media, but Internet is an open, loose and unsafe network, therefore more and more people attach importance to the research for the distributed system-based transmission safety entire plan. The based on the distributed system transmission security entire plan not merely needs to consider rightly Bilateral status authentication, the transmission data secrecy, the integrity, the authenticity and cannot deny information security and so on nature asked topic, also must consider the usability of the data transmission the efficiency as well as the plan in different network under environment question and so on.This article take the national information application ability test system as a background, has proposed and realized a transmission security plan based on distributed system. First, in paper we analyze the need of distributed system in data message transmission aspect in detail, and has made clear about the goal which the design safe transmission plan to have to achieve; secondly, has introduced some common used safe Canada dense method simply ,analyzed the good and bad points of each method , in order to choose the suitable method in the design security plan; Then, referred to the SSL agreement, profited from the merit in the security aspect, removed some disadvantages to insufficiencies in distributed system data transmission in this plan ,Simultaneously unified the status authentication and the digital signature technology, designed one kind of safe transmission plan in distributed system.Finally, took the national information application ability test system as the example, described realization regulation of this transmission security plan in detail, and practiced the feasibility of the plan.
Keywords/Search Tags:Distributed system, Transmission security, Encryption Algorithm, Digital signature, Identity Authentication
PDF Full Text Request
Related items