Font Size: a A A

Security Model Based On Trust Cloud Computing

Posted on:2015-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y D ZhangFull Text:PDF
GTID:2268330425495753Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud Computing is a new booming calculation method and its rising foundation is theInternet. In this way, the users need to apply for the resources, and then obtain hardware andsoftware resources and information services from cloud computing platform. Because cloudcomputing technology has a good development prospects, the major traditional IT companieshave introduced their own cloud computing platform, trying to seize the cloud computing market.However, cloud security is always a development obstacle which cloud service providers mustface with, and it is closely related to the development prospects of cloud computing. It can besaid, without the security, application and popularization of cloud computing is impossible.While traditional security solutions to a certain extent solve the security issues in cloudcomputing, but migrating this set of solutions exactly to the cloud platform is absolutelyundesirable. Due to the new features such as the high degree of virtualization, deploymentcomplexity and high scalability, we have to make research on security mechanisms which isapplicable to cloud computing. Trust problem is one of the biggest obstacles with which theprocess of promotion of cloud computing face, namely whether cloud users and cloud serviceproviders can trust each other.In response to the problems above, we propose appropriate solutions, the main contents aresummarized as follows:1. Analyzes the cloud computing platform and its characteristics, dissect its developmentadvantages and service patterns, discusses the special security threats faced by cloud computing,analyzes virtualization technology, trusted computing, access control and a series of coretechnology which can help the cloud computing platforms improve its security. In addition, makea thorough exposition discuss on the definition of trust, its features, and computing methods.Discusses and analyzes the trust value calculation of the classic trust model, lays special stresson analyzing the necessity of introducing trust mechanism to the cloud environment.2. For dynamic and high scalability features of cloud computing environments, by means offuzzy logic thoughts, this paper proposed cloud platform evaluation model named TBFEM,which based on fuzzy trust. This model uses fuzzy comprehensive evaluation method to calculatethe trust value, while cloud services providers establish fuzzy control rules, grant the cloud usersappropriate permissions according to fuzzy cloud judgment. In the calculation of the trust value,we introduce the time factor, so that the model can better adapt the dynamic cloud computingenvironments access control requirements. By establishing a two-way trust evaluation, it caneffectively improve the security of cloud computing platforms.3for the cloud computing platform has a huge scale deployments and offers many types ofservices, and in many practical applications services may belong to different autonomous domain,and in many cases cloud users need to mobilize more resources situation together to complete atask, this paper presents a single sign-on model to simplify the user’s operating experience,switch between different autonomous domains without repeatedly entering authenticationinformation passively waiting for autonomous return message authentication, and go apply for the necessary services. Against the deficiency of existing single sign-on model, the paperintroduce Security Assertion Markup Language SAML to single sign-on design for cloudcomputing environments, strengthening protection for cloud computing resources to a certainextent, improve the efficiency and flexibility of authentication in the cloud.
Keywords/Search Tags:Cloud Computing, Access Control, Trust, Security Model, SSO authentication
PDF Full Text Request
Related items