Font Size: a A A

Research On Cloud Computing-oriented User Data Security Strategy

Posted on:2015-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y ZhaoFull Text:PDF
GTID:2298330467485546Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a fusion product of traditional computer and network technologies such as distributed computing, grid computing, parallel computing, etc. and it’s a new model of business computing. With the advantages of virtualization, flexible customization, dynamic scalability, high reliability, high cost performance, the development and applications of cloud computing are gaining fast momentum. At the same time there are also many cloud computing security risks which would cause huge losses to the users, especially enterprise ones. Currently, the security issues of cloud computing have become a major factor restricting the development and applications.Focusing on the security issue of customer’s data in the cloud, the paper firstly introduces the development of cloud computing, the main architecture, key technology and so on, and then analyzes the present situation of cloud computing security. Finally, it dishes the following two secure cloud computing solutions to solve the problems of how to transfer data safety between the different cloud computing service providers and how to defense the side channel attack.(1) Proposed a solution of transferring customer’s data between different cloud computing service providers. It has been a problem that how to transfer the data of customers between cloud computing service providers which have different technology architecture and data protocols. Cloud service providers often "kidnap" users’data maliciously on that ground, and make it difficult for the data stored in the cloud to be transferred back to the local or replaced cloud service providers. With the means of combination of physical and network technologies as well as encryption, this solution can transfer the data of customers safely, fast and accurately without regard to technologies and protocols used by various service providers. It is universally applicable to any cloud computing service provider and can’t affect users’ business in the process of data transfer.(2) Proposed a virtual machine Cache dynamic management strategy to defense the side channel attack of cloud computing. At present, Cache side channel attack is the hotspot of dynamically attack, and virtualization technology is widely utilized in cloud computing, which provides more convenient conditions for side channel attack. With the means of distributing and adjusting virtual machine Cache’s available size dynamically based on its failure rate, the strategy adjusts the size of the Cache constantly, changes the computing environment of the virtual machine dynamically and disturbs the side channel information revealed during the computing. It disturbs the information about Cache "hit" and "miss" that attackers collected thereby avoiding the side channel attack effectively. Moreover, it divides the Cache to different virtual machines reasonably, which improves the operating efficiency and makes the resources in the cloud computing virtual resource pool a more reasonable utilization.
Keywords/Search Tags:Cloud Computing, Data Migration, Side-Channel Attack, Cache
PDF Full Text Request
Related items