Font Size: a A A

Safety Cloud System Design And Implementation

Posted on:2011-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:X H JiFull Text:PDF
GTID:2208330335497366Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Due to the rapid increasing of internet information and development in access network bandwidth, as well as popularization of intelligent mobile terminal, the new computing pattern known as "cloud computing" is going through a remarkable expansion and getting mature.With the development of cloud computing, especially in "public cloud" and "hybrid cloud" technology, the security issue of this new computing pattern, i.e. providing a secure and trusted computing service for its users, has becoming one of the major barriers and challenges in the road.Nowadays, the "cloud" service providers have first priority of accessing data that users turned in and consequently they can build competitive advantages upon this. Hence, privacy data protection is obviously the key to secure Cloud computing service. Due to lack of definite legal norm or conclusion on internet privacy data protection, some of service providers are using users' data for business activity.●How to support a variety of different types of applications in the cloud.●Proposing the infrastructures for all level, and establish the standard together to speed up the development of cloud.●How to manage these large amounts of computing resources for each application according to requirements.●How to ensure the isolation between applications, and prevent unauthorized access to ensure the safeties of a variety of heterogeneous applications.●How to ensure safe and efficient mechanisms for user access.If the security in cloud can be resolved, we will promote cloud computing in real world a lot. We design a security system which can support hybrid applications in this paper. The system can deploy all applications to the cloud sufficiently, and then deploy the system on the existing large-scale multi-point distributed system. At last, the experiments present good performance.
Keywords/Search Tags:Cloud Computing, Cloud Security, Virtualization, Clusters
PDF Full Text Request
Related items