Font Size: a A A

Research On Security Key Issues Of Cloud Computing Based On Hadoop

Posted on:2016-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2208330461984928Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology, especially the rapid development of computer Internet technology, the cloud computing has became the one of the latest hot topics now. More and more mature cloud computing products such as Baidu cloud and Ali cloud have springs up, have became the necessity in our work and learning. More and more users deposit their data on these cloud storage platform, but cloud computing security issues become increasingly prominent, the development of Cloud computing is hindered by the cloud security problem. Cloud computing has many characteristics, such as virtualization, multi-user, high flexibility and so on. Because of these new characteristics, traditional security technologies can not make cloud computing fully safe. Therefore, how to protect cloud computing’s security has became the current research focus and we will extend the research at the direction.First the paper introduces cloud computing’s concept, cloud computing’s characteristics and different implementations in companies and enterprises. And Hadoop which is an open source cloud computing platform is focusedly introduced.Then this paper analyses the cloud security problems from multiple angles such as deployment mode, service mode, etc. and proposes various corresponding security solutions. Through the above analysis, we find that how to protect data security which is at failed state Data Node is a unsolved problem. And This issue is also a blind spot in cloud computing security.This paper extends research at the security of data which at failed state Data Node,studies the heartbeat mechanism of HDFS and designs a two-step data security mechanism that protects data from being destroyed based on data overwrite algorithm and HDFS. This mechanism will modify the permission of data block, if modify unsuccessfully this mechanism will overwrite original data through the data overwrite algorithm. Before delete the data, we first pre-process data and then we can achieve the purpose of destruction of data completely. After experimental verification, this algorithm can effectively overwrite the files at HDFS platform with data overwrite algorithm, and we achieve the purpose of protecting data security.
Keywords/Search Tags:Cloud Computing, Hadoop, HDFS, Data Security, DataNode, Protection Mechanism
PDF Full Text Request
Related items