Font Size: a A A

Research And Implementation Of Unified Authentication And Data Labeling Scheme In Cloud Computing

Posted on:2013-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:B B YinFull Text:PDF
GTID:2248330392957879Subject:Information security
Abstract/Summary:PDF Full Text Request
Cloud computing is a new computing model,computing tasks are deployed in thecloud,making the Internet a resource pool composed of a lot of computing resources.Endusers can use the network to access to computing resources in a convenient、on-demandway. Cloud computing provides people a new efficient information service mode.Cloud makes great change in the IT field, it is different from the existing pattern,inwhich desktop on the local computer is the core part to the data processing and applicationservices,alternatively,these processing are transferred in the cloud. As a result of its servicemode, user information and storage resources are highly concentrated, which bringssecurity risk that much higher than traditional way. At present, the security problem hasbecome the the biggest bottleneck of cloud computing.This paper has a deep analysis of typical safety problems existing in cloud computing,such as identity management, data security and access control problems. For federatedidentity management organizational flexibility problem, we put forward OpenID basedunified identity authentication scheme C-OpenID, while for the virtual desktop sensitivedata confidentiality protection,we introduce data labeling technique combined withattribute based encryption.Ciphertext access control information is stored in the filelabel,while changing the access control policy,the re-encryption processing is held incloud which enables confidential data storage and dynamic access control.After the introduction of the OpenID based unified identity authentication technologyand virtual desktop data labeling scheme, a detailed description of the scheme structureand the relationship between each module is present, meanwhile we discuss detaileddesign of the core modules. Finally, based on the windows platform, we have implementedthe supposed scheme and make a summary and prospect.
Keywords/Search Tags:Cloud Computing, Unified Identity Management, Ciphertext-policy attributebased encryption, Virtual desktop, Data labeling technique
PDF Full Text Request
Related items