Font Size: a A A

Truested Distributed Computing Environment Key Technology Research On Cloud Computing

Posted on:2014-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:X S ChenFull Text:PDF
GTID:2248330398972136Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
Cloud computing is a hot research topic, it makes calculation distribution in a large number of distributed computer, users get service like as convenient access calculation or storage resources. But because of the great amount of data, and privacy data cloud service provider to the third party, so cause the user and provider of distrust. Thus hindered the development of cloud computing.This paper combinesreliable technology and cloud computing together, using virtualization technology, improve the traditional credible technologies in the identification mechanism, make credible technical agile used in cloud computing, solve the user and service provider of trust problem. In this paper, the cloud computing of the key technology of credible distributed environment was studied, the main work is as follows:This paper studies the traditional credible technology used in TPM trusted platform module technology, introduces in detail the work mechanism and use of encryption and authentication technology. This paper improves process of trusted chain that lessons from the TPM related technologies,in each virtual machine use vTPM virtual credible module, in a virtual machine migration and create protect the user’s data security.This paper improves the traditional credible technology AIK certificate authentication of the limitations, in the cloud computing model using the DAA anonymous authentication strategy and Privacy CA strategy combination way to ensure that the remote the proof that the true anonymity, and at the same time, using the simulation proves the feasibility of the algorithm.This paper improves the original TCCP model, solved the TC work is arduous and once paralysis can lead to the whole system paralyze limitations. Beyond the clouds is established in Privacy CA and ITC two characters is responsible for the management of the area of TNs, and the relationship between reliable are described in detail, and at the same time to the improvement of the TCCP model of trusted chain building security and performance analysis.
Keywords/Search Tags:cloud computing, TCCP model, virtual trusted technical, DAA strategy
PDF Full Text Request
Related items