Font Size: a A A

Design And Implementation Of Thetrustworthiness Mechanism In Cloud Computing Environment

Posted on:2014-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:X Q JieFull Text:PDF
GTID:2248330398470746Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud computing has brought considerable benefits for individuals and enterprises as it can greatly save costs for them. However, in cloud computing environment, users’data and application are all deployed on the cloud that users are deprived of their right of control over these data. On the other hand, for the sake of cloud security, cloud provider hardly discloses information about cloud platform, leading to users’lack of knowledge of cloud. Consequently, users don’t trust the cloud provider as well as the platform, and they would return to the traditional mode without cloud computing rather than using cloud computing. This crisis of trust has emerged as one of the most significant barrier to faster and more widespread adoption of cloud computing, so it’s urgent to take measures to settle the issue. This paper focuses on the issue of trust between users and cloud providers, designs and implements a trustworthiness mechanism for cloud computing. Accurately, this mechanism is for the IaaS (Infrastructure as a Service).Base on the Trusted Computing introduced by TCG (Trusted Computing Group) and extensive research into the related work of home and abroad, this paper designs and implements a trustworthiness mechanism of cloud computing environment. As for the cloud environment, it includes two parts:physical layer and virtual layer. For the physical layer, this paper takes the factor of physical servers’different role into consideration, regarding them as different when designing the mechanism. And for the virtual layer, as it’s the critical part for users’ data and application, so we make users as the sponsor of the authentication. What’s more, in order to protect the detail information of cloud, so the important information such as the registration information will not exposed to the Trusted Third Party.Introducing the mechanism into cloud platform will surely bring some extra cost for the system. In the experiments, apart for the validation of VM start-up, this cost can be transparent for the users; while time of5s for users in startup of VM can hardly be sensed. So we can come to a conclusion that the benefit of this trustworthiness mechanism will outweigh the cost, that this mechanism is applicable.
Keywords/Search Tags:cloud computing, IaaS, trustworthiness mechanism, trusted computing
PDF Full Text Request
Related items