Font Size: a A A

Research Of Safty Cloud Computing Systems

Posted on:2012-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:K XueFull Text:PDF
GTID:2218330371962355Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Cloud computing was firstly proposed by the Google company, it is a business model combined by Grid Computing, Distributed Computing, Parallel Computing, Utility Computing, Network Storage Technologies, Virtualization, Load Balance and other traditional computer and network technology. As a new distributed computing technology, Although Cloud computing is not mature, its rapid development has attracted very high attention in business and academic circles.While using cloud computing has gradually become the industry and business trends, there are many reports on that cloud computing is still lack of security, reliability and control. The Authority IT industry"Gartner"released a "cloud computing security risk assessment " report, in which listed seven cloud computing security risks, these risks will bring to users especially large corporate users incalculable economic loss. At present, the cloud security problems has become the major bottleneck which restrain the development and application of Cloud computing.In this paper, we have discussed the security of Cloud computing. Firstly, we have introduced the conception, key technology and development process of cloud computing, then discuss the security problems and its solutions of Cloud computing from IaaS, SaaS and PaaS, and create a dynamic, secure authentication systems at last. mainly as follows:1. Introduce the development, key technology and the specific architecture of Cloud computing.To research the security problems of Cloud computing, we firstly describes the emergence and conception of cloud computing, then define the classification of cloud computing (public cloud, private clouds, mixed clouds), at last, analysis the key technologies and components of Cloud computing. This work can make us understand the following concepts better.2. From the three major cloud computing services, we have discussed its security issues and solutions. In this paper, we have discussed the security problems of Cloud computing from certification, data, storage, application, virtual technology, access, IAM, post responses, analysis and review the existing security policies of cloud, supply and optimize this policies with use of sophisticated theories and methods, given a set of systematic, comprehensive cloud security policy.3. According to the login problem of Cloud computing, we combine the existing authentication technology, created a set of dynamic two-factor authentication system. According to the discussion of Cloud computing authentication, we propose a two-factor authentication method with Java language. This method makes the authentication code dynamic with the feature of time passage, and use double-layer encryption, this can greatly reduces the possibility of counter-push of the authentication code. Because of the authentication code is not transmitted through network, this method can greatly improve the security and scalability of the authentication code.
Keywords/Search Tags:Cloud computing, IaaS, SaaS PaaS, Two-factor authentication
PDF Full Text Request
Related items