Font Size: a A A

Data Security Strategies Cloud Computing Platform Based CRM System

Posted on:2015-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:X F XiFull Text:PDF
GTID:2268330431469398Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As cloud computing develops quickly and becomes to the mature technology. Cloudcomputing has been widely applied to our daily lives and business affairs management. Thepopularity of cloud computing applications for enterprise customer relationship managementsystem provides the opportunity, especially for the small and medium enterprises while they donot require much cost and they can enjoy professional grade custom CRM system.Although CRM system based on cloud computing platform develops rapidly, many businessdecision makers concern much about data safety when the data was saved in cloud computingenvironment and losed the protection of firewall. CRM systems on the cloud computing platformis not only faced the existence of security threats of the traditional CRM systems, but also has itsown security threats from cloud platforms. Faced with this situation in our data platform basedon cloud computing and CRM system characteristics, the trusted platform module, dataencryption, data isolation, data backup and data security transmission present a combination ofdata security policies to protect corporate data privacy.Depending on the differences of sensitive corporate data for security and usage in the CRMsystem on cloud platform, data security solutions respectively using MD5algorithm and fullyhomomorphic encryption are selected to encrypt the sensitive corporate data. For diversity ofenterprise data, enterprise data were processed using no encryption, MD5encryption and fullyhomomorphic encryption process. We use the virtual isolation technology program based on theTrusted Platform Module (TPM) to process the data in different ways for isolated storage. Thescheme could not only further improve the security of the encrypted data but also improve theefficiency of the call through the various ways of the processed data. Ciphertext, key and otherprivate information were used secure SSL protocol for secure transmission during transmission.To prevent damage to the enterprise data such as viruses, Trojan horses, and earthquakes andother disasters, the scheme uses the data to develop a backup strategy for data backup to ensurethe accurate and rapid recovery of data.For the technology used in data security policies, the paper focuses on the searchableencryption techniques homomorphic encryption scheme, based on DGHV program and get animproved fully homomorphic encryption. Compared with DGHV homomorphic encryptionscheme to improve the whole program will be encrypted bits from1bit up to2bit one time, andimprovement program has smaller public key. While improving the whole in the homomorphicencryption scheme searches the ciphertext, the key need not be exposed to the server. Takingthese characteristics, improved fully homomorphic encryption scheme is more suitable for cloud computing environments.This paper first discusses cloud computing, CRM systems and data security issues andresearch of cloud-based computing platform CRM system; Second, discusses data securitypolicy on cloud computing platform CRM systems related to technology, including the TrustedPlatform Module (TPM), homomorphic encryption algorithm, the improved homomorphicencryption algorithm, MD5algorithm, data isolation based on the TPM, data backup and securechannel protocol based on SSL; Finally, the operation and application scenarios based dataencryption security policy program of study discusses the whole principle of data securitypolicies and analyze the feasibility of using this data security policy in the CRM system.
Keywords/Search Tags:Cloud Computing, CRM, Fully Homomorphic Encryption, TPM, MD5, PrivateData Retrieval
PDF Full Text Request
Related items