Font Size: a A A

Research Of Authentication Strategy Based On Simulated Cloud Computing Environment

Posted on:2015-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:G J GuanFull Text:PDF
GTID:2298330452950741Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a new model of service, cloud computing has been studied and appliedwidely. Especially in recent years, more and more companies launched their ownproducts about cloud computing, which are mainly related to storage, computing andplatform. With the advantages of flexibility and price, cloud computing attracts usersto experienceit.When resources operation happensin thisplatform, it requires a modelto include users, resources and permissions that can meet the business need of cloudproviders and provide rational authorization behavior on cloud platform.Actually, the research on access control is accompanied with the process ofinformation. From simply controlling the usage of personal resources, to controllingnetwork resources,authorization architectureembodiesthe interior security. In a cloudcomputing simulation environment, efficiency and security are most importantmetric. By comparing the common model and introducing many constraints, I aim tobuild a model to meet tangible needs.The main points are as follows:1. Combined basic pattern,complete role-system design by differentiating role’spurpose, and determine a user include four roles: Tenant, Owner, Authorized andAccess. By introducing role inheritance, authorization architecture has beenenhanced. On scaffolding prototype system,this measure reduces the difficulty ofrealization, and optimizes the management process.2. By using MAC model’s idea, authorization model combines users andresources to show their correlations. Also adding rational planning on roleinformation quantity and mark of resource could reduce system overhead. Finally,using the result of the comparison between prototype system and traditional DACmodel to illustrate that the cost is controllable.3. Analysis the basic operations in cloud computing simulation environment,and think the relationship between the operations and roles, also the relationshipbetween the authority in role-set and the authority in ACLs.Finally,use the averagetime consumes to evaluate the availability of system.4.Adopting Session-hierarchical strategy in authorizationframework toincreasethe accuracy of authorization. Achieving dynamic role transformation with lessresource can minimize the role set in certain user session. Andthe experimental dataconfirm that this measure basically have no effect on system performance.
Keywords/Search Tags:Cloud Computing, Access Control, RBAC, Session Grouping
PDF Full Text Request
Related items