Font Size: a A A

Research On Key Technology Of Mobile Cloud Security Authentication

Posted on:2013-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:X Y DuanFull Text:PDF
GTID:2248330371489957Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, cloud computing has get more and more attention and favorin industry-wide. Cloud computing is the development of traditional computer and network technologysuch as the grid computing distributed computing, parallel computing, utility computing, network storage,virtualization, load balancing, etc. It is not just a simple pooling of computer resources, but also provides amanagement mechanism.The Mobile Internet characteristics have a lot of the same points with cloud computing in somerespects, flexibility is just the most important one. When it comes to outstanding performance of cloudcomputing in the mobile Internet era, and the feature can be best reflected by this: many domesticmanufacturers have joined in developing cloud computing mobile terminals. Cloud computing, mobileterminals, to some extent, is the smart phone in the so-called "cloud mobile phone". Many companies havebegan to use cloud computing services, and it has made certain benefits, which makes a lot of companieschanging to active concern on cloud services from indifference. But along with a great opportunity cloudcomputing bringing, also a series of challenging issues have been produced, security is one of them.Along with the increasing of the smart phone applications, cloud computing has become the bestchoice for service providers. On the basis of the researches on cloud computing security, the paper has builtcloud computing-based phone access authentication scheme on the bases of cloud computing architecture,which can to guide cloud computing applications in the mobile phone service on theory.Firstly, cloud computing technology are briefly introduced in development status and trends, and thencloud computing security technology is investigated, mostly in security issues of virtualization technologyand distributed file system. The problems mobile access authentication technology faced are also described.Secondly, the architecture of cloud computing is analysized. On this basis, the article proposes the mobilecloud security access authentication mechanism, and realizes the authentication algorithm. Lastly, itconstructed the platform to simulate the mechanism, and describes the presentation and analysis ofsimulation resultsThe original intention of this article is to applied the cloud computing to the mobile phone access authentication, which expands its application direction. The features of cloud computing, includingvirtualization, resource integration and ultra-large-scale, can be a good solution to a huge amount ofcomputing demand for resources in mobile access authentication process. Considered the needs and gaps inthe mobile access authentication, as well as the in-depth understanding of the advantages andcharacteristics of cloud computing, to effectively integrate the two applications is a a good applicationdirection. Based on the analysis on the cloud computing architecture and business, as well as its coretechnology of virtualization technology and its security analysis, the paper builds a mobile cloud computingsecurity authentication platform architecture. Through the research of the platform architecture, the paperprovides a theoretical reference and a basis in the cloud computing practical application on the mobilephone access authentication.
Keywords/Search Tags:cloud computing, cloud security, mobile phone access, authentication technology
PDF Full Text Request
Related items