Font Size: a A A

Data Security And Access Control Model In Cloud Computing

Posted on:2015-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:S XuFull Text:PDF
GTID:2268330425485379Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous improvement of the era, the rapid development of the computer science and technology and the acceleration of global information technology, cloud computing is applied more and more frequently in people’s daily lives. People don’t need to know the specific details of cloud, either have the appropriate expertise, they can enjoy the service and convenience provided by cloud computing. However, there are many risks in cloud computing at present, such as privileged user’s access, the review, the geographic and logical location of data, the isolation and recovery of data, whether to support investigation and the data’s long-term survival, etc. With the continuous promotion of cloud computing, its security issues continue to be exposed. The security problems of cloud computing have become the primary reason for restricting its development, data security and privacy protection are the core issues for cloud computing technology development.The security issues are mainly focused on authentication, access control model, virtual security technology, data encryption and privacy protection and other aspects. The main contributions and research achievements are listed as follow:(1) By comparing the current traditional access control models, this thesis analyzes the domestic and international research results of cloud data protection and access control model, and come to the point that Role-based access control(RBAC) model is the most suitable model for cloud.(2) In cloud computing environment, this thesis improves the RBAC model and raises a new model named NT-RBAC by importing the network environments and temporal constraints, storing sensitive data using encryption algorithm. The improved NT-RBAC model allows more fine-grained permissions control than normal RBAC model, which enhanced the security of data and resources in cloud computing environment.(3) This thesis applies the NT-RBAC model to the specific example by using the Google’s cloud platform-GAE. Ensure the security of resources through the implementation of the specific resources access control.
Keywords/Search Tags:Cloud Computing, Role-based access control model, GAE
PDF Full Text Request
Related items