Font Size: a A A

Virtualization Security And Single Sign-on Research Of Cloud Computing

Posted on:2013-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:J FangFull Text:PDF
GTID:2248330371959479Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Cloud computing is developed on the basis of parallel computing, distributed computing, grid computing and many other technologies. It distributes computing tasks in resource pool that is composed by a large number of computers, so that all kinds of applications can access computing power, storage space and a variety of software services as according to the needs. As a revolutionary calculation model,cloud computing has been consistent concerned by academia and industry from the beginning of first proposed, the development in full swing. However, compared to the traditional computing model to save the information in their own controlled environment, in cloud computing environment, information is stored in the cloud and data ownership and management is in the separation. In addition, cloud computing is exposed to an open environment, combined with the use of a large number of virtual technology, lack of standards, and policies and regulations are not perfect, based on these to bring many hidden dangers.Therefore,secutity has become the most care problem about cloud computing applications,and even a bottleneck in the development of cloud computing.Based on the above reasons,this paper made a systematic research and analysis on cloud computing security. After a brief introduction of cloud computing and cloud computing security based on the research status, from the difference between the traditional security and cloud computing security, cloud computing security technology research, cloud computing security organization and standards and many other aspects made a comprehensive description and analysis of cloud computing security issues. Based on many cloud computing security problems, this paper focuses on virtualization security and cloud computing single sign-on issue.For virtualization security issues,this paper began from the introduction of cloud computing architecture on the angle of virtualization, followed by the introduction of virtualization technology, elaborated on virtualization security research including the summary analysis of the virtualization security issues and layerd analysis. And the focus made the Xen platform as an example, analyzed the facing virtualization problems using Xen to build cloud computing platform.For cloud computing single sign-on issues, introduced the single sign on system, and described several types of single sign on, analyzed the reality single sign on solutions. Based on the above,this paper is emphasis on the introduction of the principles and models of cloud computing single sign on. Focuses on the mechanism of Cookie-based single sign on and SAML-based single sign-on. Based on these two implementations, this paper made a specific single sign-on system design, finished code completion and analysis, and proved that the implemented system could solve the current login problems that cloud computing faced.
Keywords/Search Tags:Cloud Computing Secutity, Virtualization Security, Single Sign-on, Cookie, SAML
PDF Full Text Request
Related items