Font Size: a A A

The Research On Management Of Secret Key And Technology Of Hybrid Cloud Computing

Posted on:2015-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:J DuanFull Text:PDF
GTID:2298330452960275Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of a large number of emerging technologies, such as artificialintelligence,big data, intelligent terminal, virtualization and etc., we can share and obtain thelatest information at any time. In order to meet the market demand, the related enterprisescombine the service modules quickly, which makes our lives and work more convenient,more wider and more intelligent. In this circumstance, cloud computing emerge. Many domesticand foreign well-known enterprises (for example: IBM, Alibaba, Amazon, China Mobile) havelaunched its cloud computing services products.At present, more than50%of the enterprises are taking into consideration the cloudcomputing services, of which12%want to obtain the value of the cost-effectiveness. However,the security problems become the main obstacle for those enterprises to choose cloud computing.One authority made a survey:"What do you think the current challenges and problems of cloudcomputing mode are?" the result shows that the security is at the top by the rate of74.6%, whichobviously also releases that security problem of cloud computing is the biggest concern. In thenext10years, we will enter a "clouds" ear, which makes the safety of hybrid cloud environmentmore complex. As a result, we need to further study.Key management is an aspect that the hybrid cloud environment has to pay close attentionto. Key management has been widely used in banks, O2O and B2C internet e-business, whichprovides the basic security services for people’s daily life. With the trend of furtherimplementation of cloud computing services, we need to achieve the maximization of resourcesvirtualization and centralized coordination.Key management system was independent deployed before. Therefore, it was faced withthe trend to support the platform and integrate the multi-clients with different protocol. Aiming atthe hybrid cloud environment lack of key management scheme in Telecom domain, this essayanalyzes the requirement for key safety in hybrid cloud environment, and the collaborationscheme of key management in hybrid cloud based on KMIP protocol. Besides this essay alsointroduces the related technology and industry manufacturers situation for the safty in hybrid cloud and the system sketch design by modular design method according to the characteristics ofthe key lifecycle. At last the essay carries on the detailed design for the client and server, andsystem compilation and test in the virtual environment.
Keywords/Search Tags:Hybrid Cloud, Cloud Security, Module Design, Key LifeCylcleManagement
PDF Full Text Request
Related items