Font Size: a A A

Key Technology For Cloud Computing Security Terminal

Posted on:2012-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:S Y ZhangFull Text:PDF
GTID:2208330335997812Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Cloud Computing has been proposed in recent years and has drawn widely attention both from academic and industrial communities. In cloud computing, client devices contain very limited software and have no strict requirement on hardware configuration. When customer orders data processing such like document editing, client devices apply for computing resources through network, and servers are responsible for most program execution and data storage. Since servers are more powerful, very promising computing power is available by integrating servers together through internet. Nevertheless, more people concern security of cloud computing instead its computing ability since data is processed far away from its owners. It is a big problem to safeguard confidential data when suppliers are not reliable.In this paper, security requirements to servers are discussed. And based on general-purpose processor, security units are added. Data in main memory are encrypted. And by adding encrypted signature to program, integrity of program could be protected. It is impossible for adversary to know the value of program or to crack program by tampering the program in main memory. Also mechanism of process isolation is supported, and data accesses from unknown process are forbidden. Even when data is tampered, victim process could be terminated immediately in order to prevent further damage. Security hardware is implemented based on MIPS 4kc series processor, but could be easily adapted to other architectures. Adopting SMIC 0.18μm standard CMOS technology, security terminal proposed in this paper could achieve speed of 110 MHz, with 30.1% area penalty. Evaluating our design with benchmark MiBench, the performance penalty is less than 5% in most cases. And performance penalty could be reduced in further by enlarging the cache size and changing the set organization.For general purpose, secure characters such as cipher key management are added to operation system. And this design has been verified on Altera S180 FPGA platform together with security hardware.
Keywords/Search Tags:Cloud Computing, Privacy Protection, Integrity Protection, Process Isolation
PDF Full Text Request
Related items