Font Size: a A A

The Research Of The Security And Trust Model Based On Cloud Computing Platform

Posted on:2012-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:S R WangFull Text:PDF
GTID:2218330338462965Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the introduction of cloud computing, the attention of many enterprises is attracted on it because of its customized services, processing power and relatively low prices. While some companies are prepared to enjoy the cloud, however, problems of cloud computing service break out time to time, which makes many companies hesitate. Although performance-to-price ratio is high, the safety and reliability of the service must be ensured firstly. The research on the security of cloud computing is significant to the development and promotion of cloud computing.In this thesis, the basic concept, features, and application prospects of cloud computing are described, three typical cloud computing services are broadly compared. And the status of cloud computing service, security status and problems to be solved are focused on.Focusing on users'credibility, this thesis proposes Behavior-based Trust Level and Role Control Model in Cloud (BTRMC), and gives out a specific calculation method of the credibility, through which the user's trust level based on the user's behavior can be determined. And a dynamic role permission control model is proposed in this thesis. The distribution of roles and the configuration of permissions are according to user's trust level. Changes in the user's trust level will bring dynamic role and permissions changes. In this way, the cloud computing providers guide and manage the users, and protect the cloud computing systems.Focusing on the security of data transmission, this thesis divides the data transmission into two parts, data transferring inside the cloud and data transferring outside the cloud. For the insider data transfer, the thesis proposes a simple secure communication model for inter cloud (SSCMIC). For outsider data transfer, this thesis presents a combination of hardware and software method using USB key for user authentication and encrypted transmission of information to enhance the user's credibility and data security.
Keywords/Search Tags:Cloud Computing, Security, Trust Model
PDF Full Text Request
Related items