Font Size: a A A

Research Of Cloud Computing Data Security Technology

Posted on:2013-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:X L WangFull Text:PDF
GTID:2248330377458335Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a super-computing model based on Internet network. Now usenetwork high speed data transmission capacity, the original data processing model of movingfrom the personal computer to a remote large-scale computer data center. These cloud datacenter by a large number of the computer or the server component, the cloud data centerallows users to experience the trillions of times per second super computing power, with sucha strong computing ability can be used to do a lot of scientific experiments (e.g. nuclearexplosion simulation experiment). When the user needs to computing resources, according tothe need to purchase the cloud computing services, no longer need to invest a lot of money tobuy the computer hardware and custom software system, only need to purchase the cloudcomputing services provided by a service provider, through the network to use cloudcomputing providers custom services, thus less investment to obtain relatively highcomputational ability to service, and no longer need manpower investment and operation cost.Despite the use of cloud computing service to the user can bring many benefits, buteveryone on cloud computing this mode of business applications support wait-and-see attitude.This kind of wait-and-see attitude mostly on cloud computing security not quite at ease.Theuse of cloud computing mode of this kind of service, means that the user data control has theoriginal user control is changed to a cloud computing service provider control now. Therefore,the current cloud computing security research is focused on how to ensure that the cloudcomputing service system data confidentiality and integrity, so that the cloud computingsystems in the data with high reliability. Cloud environment user data security is cloudcomputing security key, have become the important factors in the development of cloudcomputing.This paper analyzes the cloud computing data security threats, that data security is cloudcomputing security research priority, according to the data security in the life cycle of the law,and according to these factors put forward cloud computing data security threat model.According to cloud computing data security threats, put forward specific countermeasures, gives cloud computing data security strategy model of formal description.Then based on the predicate encryption data security solution, and analyze itssecurity.The predicate encryption applications to the cloud, a design can ensure that usersstatic storage data security, and can guarantee in data transmission and processing in theprocess of data security. The scheme for the safety requirement of the user provides a feasiblesolution.
Keywords/Search Tags:Cloud Computing, Data Security, Predicate Encryption
PDF Full Text Request
Related items