Font Size: a A A

Research And Application Of Secure Cloud Computing Based On PKI

Posted on:2014-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:W L DingFull Text:PDF
GTID:2268330401466900Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing, cloud computing security issueshave become prominent. More and more users began to realize the need to protect theirown security, which is different from the usual security. The user considers that securityservices providers can not just provide simple data backup and recovery, and need toensure their data on servers is not be theft and illegal used. Cloud computing securityissue has become one of the urgent issues of cloud computing development. Therequirements of researching on cloud computing security are also becoming more andmore urgent. PKI is currently one of the widely used security systems. The system usesan asymmetric algorithm for data authenticity, confidentiality, integrity andnon-repudiation. Cloud computing can use PKI very well solve their own securityproblems, is one of the important research directions of cloud computing security.My main study is on this direction. I analysis cloud computing and theory andtechnology of PKI, and combine it with Chinese SM algorithm. I work out a model forthe communication between entities with different algorithms, and find some softwaredevelopment techniques to realize a middleware for the model. The point of my studyis:1. How do entities with different algorithm capabilities can trust each other, andthink out a model to solve it. In this model, I add a third entity with two differentalgorithm capabilities between original two entities. The new entity verifies the data andre-signatures it with the other algorithm. So the receiver can verify the data with itsalgorithm.2. How do entities with different algorithm capabilities can send data to each othersecurely, and think out a model to solve it. In this model, I add a third entity with twodifferent algorithm capabilities between original two entities. The new entity decryptsthe data and re-encrypts it with the other algorithm. So the receiver can decrypts thedata with its algorithm.3. Find out a software develop techniques to design a flexible programs that cansupport multi algorithms. These techniques abstract an interface from different algorithms. With the advantage of interface-programing, the business layer can invokean algorithm more easily, and the programs can also support a new algorithm moreeasily.
Keywords/Search Tags:PKI, cloud computing, trusted delivery, SM2, middleware
PDF Full Text Request
Related items