Font Size: a A A

The Full Life Cycle Of The Data Security Technology In The Cloud Computing

Posted on:2014-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiuFull Text:PDF
GTID:2268330401965973Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The cloud computing by a large number of computing resources in the wide-areanetwork integration and again in the form of services provided to the users, theformation of an effective emerging computing model. Users to service after computingresources and storage resources required by the network at any time, without regard tothe specific details of the calculation and equipment maintenance. And thus greatlyreduce the cost of business users of IT. The cloud computing model by way ofcomputing resources with specific business decoupled effectively reduce the cost ofenterprise information, improve utilization of hardware resources.In the evolution of cloud computing with applications to carry out, the keyquestion then highlights the many barriers to cloud computing development, cloud datasecurity and trusted one. As the cloud terminal and cloud, cloud and cloud data at anytime there are vast amounts of interaction, and multiple user using the same set ofcomputing environments and storage environments through virtualization technology.Cloud computing architecture at the same time bring a lot of convenience, but alsocaused a series of cloud data security and the issue of credibility.1. in-depth analysis of the typical life cycle of the data in the cloud. The analysis ofthe cloud computing model may lead to data security risks. Based on a cloud computingin the data lifecycle security model, and to build a cloud computing data securityresearch and test environment. Also cloud computing data security the storageencryption middle layer, and data destruction of the middle layer design with hardwareand software to achieve the results of the project also successfully applied of units of thesecurity of the data center as well as secure cloud storage project. This paper studies thework and progress as follows:Mainstream cloud computing system architecture in-depth analysis of typicalcomputing architecture cloud computing, and cloud computing applications to coretechniques were discussed.2. Cloud computing research test environment designed for data security system,the typical life cycle of the cloud data. And analysis of the security threats faced by the data in the different stages of the life cycle, and propose viable solutions to thesesecurity threats. The full life cycle of the data for this emerging computing model, cloudcomputing security model.3. Designed and implemented for cloud computing security of data transmission,data storage encryption middle layer, the use of large-scale FPGA cloud computingrequire high-speed processing of massive data. Transparent encryption technology toachieve a high level of compatibility of various cloud computing solutions, and basedthe disk array lun multi key encryption scheme, virtual data isolation.Design and virtual machine images for cloud computing, virtual volume files andsensitive data such as data destruction of the middle layer, the use of erasure softwarecoding algorithm designed for magnetic media used in current mainstream RLL (1,11).Both to avoid multiple blind random overwrites caused by reduced efficiency, but alsoto ensure the thoroughness of the data destruction. Meet the data life cycle data at theend of the unrecoverable requirements.The proposed cloud computing data lifecycle security system can greatly improvethe security of cloud computing and centralized storage when the user sensitive data.The security system provides a comprehensive solution for cloud computing in the datain the different stages of the life cycle. Ensure efficiency while also ensuring thesecurity of the data.
Keywords/Search Tags:Cloud computing, cloud storage, data life cycle, data security, data erase
PDF Full Text Request
Related items