Font Size: a A A

Research On Security And Data Transmission Security For Cloud Computing

Posted on:2013-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:C L DuanFull Text:PDF
GTID:2248330377450235Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Cloud computing is a new computing mode, to provide users with the computingand storage services. It is the product of the combination of distributed computing,parallel computing, grid computing and utility computing. It means that computingpower can also be in circulation as a commodity. It provides users with convenientlyaccess and low-cost computing resources, like gas, water and electricity. And thebiggest difference is that it is transmitted via the Internet. Cloud computing integratesInternet resources effectively. It uses virtualization technology to separated physicalresources and virtual services, improve the utilization of network resources. But cloudcomputing has not always been smooth recently. It still faces many problems. Thesecurity issues are the most critical. To this end, a large number of researchinstitutions are launching a positive study on security of cloud computing. Butrecently, only a small number of companies and organizations have a clearerunderstanding on cloud computing security issues. It is still lack of uniform safetystandards.In response to these issues above, start from three aspects of management,technical and legal, the paper analyzes the cloud computing security threats under thecomprehensive consideration of various factors. And with the combination of thesesecurity concerns, it puts forward a cloud computing security architecture referencemodel. Finally, it proposes some recommendations for cloud computing to ensure thatit can develop healthy and sustainably. It is visible that there is a wide range of cloudcomputing security issues by analyzing. And need a variety of security technologies asa support.Furthermore, this paper proposes a solution for the secure transmission of clouduser data. Firstly, set up a cloud computing system according to the existing cloudcomputing system structure. It analyzes the data transfer process of cloud computingthat build, learns that there are two aspects to the threat of data:1) security threat,private information may be intercepted by hackers;2) integrity threat, data may betampered by hackers. In response to the above threats, the paper proposes the use ofdouble encryption and message validation technology to ensure the security and effective transmission of user data. The specific implementation plan is that, differentusers use different symmetric key to encrypt the users’ sensitive data with symmetricencryption algorithm, and generate a message digest. The distribution of symmetrickey is using asymmetric encryption algorithm. Secondly, The paper designs andimplements a cloud computing security transmission system. The system consists ofsix modules: the client module, the mainserver module, the blockserver module,symmetric encryption module, asymmetric encryption module and information checkmodule. The client uses the MD5algorithm of the hash function to generate amessage digest, then encrypts and transmits the extensible message with DESsymmetric encryption algorithm. For the symmetric key distribution between aparticular client and sub-nodes, it uses RSA asymmetric encryption algorithm. Finally,testing and validating the cloud computing security transmission system. Theexperiment shows that the system is safe, both can safety and completely transmissionthe user’ sensitive data and can safely distribute user keys.
Keywords/Search Tags:Cloud computing, Cloud security, Transferring security, Symmetricencryption, Asymmetric encryption, Message authentication
PDF Full Text Request
Related items