Font Size: a A A

Research Of User Identity Management And Hierarchical Authorization Mechanism Under Cloud Computing

Posted on:2014-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y LuFull Text:PDF
GTID:2268330422964859Subject:Logistics Engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the development of cloud computing technology in “cloud”,users can store data in the "cloud", users get in the internet to achieve remote access.Cloud computing has many advantages. More and more enterprises focus on applicationsof cloud computing to the actual operation. Both domestic and foreign scholars of cloudcomputing carried out related research work and achieved certain results. However, cloudcomputing in practice also encountered many challenges, information security and usersidentity management has become the two main obstacles in the development of cloudcomputing. The traditional access control technologies are not suitable to apply in thecloud computing environment. This thesis focuses on identity management methods aswell as new grading authorization mechanisms in cloud computing environment, tryingto figure out a solution.This thesis first introduces the identity management features, further analyzes theproblems of identity management in cloud computing environment. Then based on thetraditional access control model, the thesis put forward a collaborative managementmodel. The thesis also studies the hierarchical authorization mechanism in identitymanagement, including an overview of the theoretical basis of the hierarchicalauthorization, building hierarchical authorization management model, setting theoperation rules. In addition, combining the three cloud computing application modes andhierarchical authorization in identity management, apply them to the actual operation ofthe third-party logistics enterprises in cloud computing environment. Finally, achievecross-domain information sharing of third-party logistics enterprises in cloud computingenvironment by the function mapping, roles mapping.
Keywords/Search Tags:Cloud computing, Identity management, Role classification, Hierarchical authorization, Third-party logistic
PDF Full Text Request
Related items