Font Size: a A A

Design And Implementation Of User Identity Management System In Cloud Computing Center

Posted on:2013-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:M L ChenFull Text:PDF
GTID:2248330392953224Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The proposal and development of the Cloud Computing bring a series of newchallenges to the existing network computing models and technology. Because of thecoexisting of virtual clusters and physical clusters, the sharing of software andhardware infrastructures, and the coordinating of decentralized authorization andcentralized management, it is not appropriate for the user identity managementframeworks in the conventional local, LAN or Internet environment to meet therequirements in the Cloud Computing environment. The main problems of theconventional work are usability and security. The scale expansion and interconnectionof homogeneous Clouds are also new requirements for the user management systemin the Cloud.This paper analyzes these problems, and then designs and implements system,auniform user management system for the Cloud applications. It constructs a globaluser space, introduces a series of uniform mechanisms. So it brings simplicity,confidentiality, and scalability for the user identity management in differentinfrastructures and application services.There are four key issues need to be addressed for user identity management.First, we should choose the organizational form of the system architecture for thebusiness model, such as independent user identity management, alliance managementof user identities, and centralized management of user identities. Second, trust model,namely the definition of cross-domain access and identity federation uniform,verifiable agreement, to establish mutual trust association for users and serviceproviders. Third, authentication, interact with one or both by the identity provider, orother credible mechanism to verify that the person has a claim, a trusted identity.Forth, privacy protection through a variety of protocols, standards and technicalsupport, protect user privacy, reduce the users and service to maintain the identity ofthe burden of secure single sign-on or Alliance certification.In this paper, the above four questions, combined with the virtual cluster in thecloud computing environment relying on the structure, infrastructure sharing model,as well as public services users value, stating the system requirements analysis,system design, system implementation and system on-line implementation. The system has been deployed in our experiment Cloud infrastructure. Its designgoals have been verified by the implementation effects of different applications. Thesystem solved the four key issues encountered in the cloud computing platform.
Keywords/Search Tags:Cloud Computing, Isomorphism Cloud, Identity Management, GridComputing
PDF Full Text Request
Related items