Font Size: a A A

Research On Security Of Customer Relationship Management (CRM) System Based On Cloud Computing

Posted on:2014-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2248330398472087Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Customer Relationship Management (CRM) system can help the enterprise managing customer relationship. With customer relationship management system, enterprise can manage interactions of sales department, marketing department and other department with customers, and seek more business opportunities. With the burgeoning of cloud computing, CRM systems are also being involved in cloud computing. The CRM system based on cloud computing has brought hope to the vast number of small and medium enterprises. SMEs will also be able to enjoy the convenience of the CRM system, so as to enhance the competitiveness of enterprises. But that also bring new security risks, this is an important problem that need to be resolved.This paper first introduced cloud computing concepts and existing cloud computing platform. Then analyzed the security risks of the system from three aspects:security risks of the cloud computing platform, security risks of the customer relationship management systems and security risks of the data. Then proposed security solutions combined with existing security technology to eliminate the risk. Xen-based virtual machine security solution solved the security risks of cloud computing platform; R-UCON access control model, combining the advantages of role-based access control and the usage access control, can authorize flexibility safety, prohibit unauthorized access to the system; a new data encryption method, using different encryption algorithms and keys to ensure the security of the encrypted data, and support information retrieval. Other security risks can be solved by existing mature security technology, combined with other non-technical aspects like the laws and regulations of safety and security, to form a complete system security protection system to eliminate security risks from weak point of the system. Finally, this paper simulated the virtual machine security module, R-UCON access control model and data encryption method and proved the feasibility of the security solution.
Keywords/Search Tags:Cloud, computing, CRM, Virtual machine security, Access control, Data encryption
PDF Full Text Request
Related items