Font Size: a A A

Research On Data Transmission And Storage Security In Cloud Environment

Posted on:2015-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:F YuFull Text:PDF
GTID:2298330452953158Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud computing is the major technology of the future IT industry, which hasgreat potential development. Cloud computing is the highest expecting valuetechnology in the current world-wide people. The characteristics of Cloud computingis on-demand services, dynamic resource allocation, low cost, which has brought newhope for the innovation of technological revolution. But while the cloud computinghas a good development trend; we must recognize that any development issues arecertain opportunities and challenges. The data may have some security issues in thecloud computing environments, such as data storage, data transmission and so on.we need to solve the data security issues in the cloud computing form thefollowing aspects: First is data privacy: we do some technical process for the datastored in the cloud environment, such as encryption and so on, so the others can’t getthe original content of user data; Second is data reliability: we must ensure that if thecloud servers run out-of-order, the data stored in the cloud will not lost; Last is dataintegrity: we must ensure that the data stored in the cloud environment can’t betampered by the illegal cloud user and internal staff.According to the special requirements for data transmission and storage in a cloudenvironment, security problems may appear in the data transmission and storageprocess, we study the PKI public key cryptosystem, identity authentication technology,trusted computing technology and cloud computing virtual technology, then proposedthe solution to the security of cloud computing. In order to ensure the cloudenvironment secure data transmission and storage in the cloud environment, thisproposal add a credible chip to the cloud environment, the chip provides credibleproof of identity, data protection, integrity measurement, storage and reportingcapabilities to provide a more secure data effective protection.First, introduce the research background and research status at home and abroadabout this subject, given the major research topics of my proposal; Then analysis thebasic concepts of cloud computing and trusted computing technology, and indicate thepresence of data security issues, which has laid a foundation for subsequent research.Then describes the key technical and related issues of the cloud user data transfer andstorage; Based on the analysis of above theoretical technology studies and practicalissues, propose based on trusted computing cloud users data transmission and storage security solutions. Finally, according to the system requirements designed cloud usersdata transmission and storage security architecture and function module and verifiedthe function.
Keywords/Search Tags:cloud computing, trusted cloud platform, mutual authentication, trustedcomputing
PDF Full Text Request
Related items