Font Size: a A A

Research On The Key Technology Of The Cloud Computing Data Security

Posted on:2015-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:S X LiuFull Text:PDF
GTID:2298330467971117Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Cloud computing which is first put forward by Google company, is a newcomputing model which is a blend of traditional computer and network technologiesinclude Grid computing, Distributed computing, Parallel computing, Utilitycomputing, virtualization technology and so on. Cloud computing is not only toachieves the technical innovation, but also a major revolution of IT business modeland service model. Along with the further applications of cloud computing technology,the cloud security has become the focus of the IT industry. How to guarantee thesecurity of data stored in the cloud is the key problem which the cloud computing isfacing.This paper studies the cloud security issues, and focus on the data security of thekey issues and related technology solutions.First this paper introduces the history source, characteristics, system architectureand application status of the cloud computing in detail, analyzes the security risks andproblems of cloud computing, summarizes the corresponding security strategy, andput forward a cloud computing security framework based on cloud computinghierarchy structure.Then this paper studies the cloud data security problems. It analyzes the datasecurity requirements base on the data life cycle, summarizes the data security hiddendanger and risk, introduces the large distributed data system BigTable, and discussesthe security strategies which can ensure the confidentiality and integrity of cloudcomputing data. It key researches on the secret key management strategy of clouddata security, data encryption technology and cloud computing identity authenticationand access management (IAM) solution. Finally, this paper studies the characteristics of fully homomorphic encryptionalgorithm. Then it advances a cloud data security scheme based on the homomorphicencryption algorithm, and analyses the application scenarios of the scheme.
Keywords/Search Tags:Cloud Computing Security, Data Security, Data Encryption, IAM, Fully Homomorphic Encryption
PDF Full Text Request
Related items