Font Size: a A A

Study Of Mechanism Of User Authentication And Certificate Authority Technology Based On The DAC Of DOA

Posted on:2016-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:T C TanFull Text:PDF
GTID:2308330461955544Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The era of big data is coming with the development of Internet, and DOA is bearing at the right moment. DOA as a new data-oriented architectures, it tries to solve the growth, the management and the sustainable development between data and applications, build up a complete set of mechanism from data protection to the authorization of applications, and provide a theoretical and technical support to solve the problems of software architecture. DOA uniformly defines and manages all kinds of data which is mapped into the virtual world and provides corresponding services through Data Register Center, Data Authority Center and Data Exception Control Center. Data Authority Center is the security assurance of the whole system, all users could obtain the corresponding data service only after identity authentication and authorization.The main research work of this paper:(1) It studies the theory and function of the DOA, it analyzes the data’s secure storage and access under the DOA, and the important role of the DRC center and DAC center under the DOA.(2) It studies the technology and related basic theory of PKI and PMI, the encryption algorithm such as RSA、identity authentication mechanism and the certificate authority on the basis of a public key technology research, and it analyzes the theory of digital certificate and attribute certificate in the process of identity authentication authorization.(3) It designs and proposes the system of user’s identity authentication authorization under the DOA, and the digital certificate and attribute certificate could be comprehensive operated and managed by the key institutions of CA and AA.(4) Finally, it tests the system and realizes the main modules’ function of the system of user’s identity authentication authorization under the DOA combined with the actual life.The main achievements of this paper:(1) It proposes the DOA provides a theoretical and technical support to establish a mechanism of data platform and fragmentation application, data protection and authorization, as well as the problem of era of big data.(2) It understands in the DAC center of DOA, user’s identity authentication authorization must be made before user access data, the user could own the rights of access the DRC center only get through the reality authentication.(3) It understands the relevant technology and working principle of users’ identity authentication authorization in the user’s access process.(4) It analyses and understands the specific working process by combining the actual application, it has a lot of help to the improvement of theoretical research.The innovation points of this paper:(1) This paper proposes a mechanism of user’s identity authentication authorization based on DOA. This mechanism improve and simplify the process of user’s identity authentication authorization on the basis of using traditional method, make up and perfect the security mechanism of the DOA.(2) This paper proposes a method of user’s identity authentication authorization under the DOA. The system is roughly divided into four modules, they are respectively the user’s information registration, user’s authentication, user’s authorization and user access the DRC center to get the data. This method uses two kinds of encryption methods of RSA to ensure that the trust and safety in the process of user’s identity authentication authorization.
Keywords/Search Tags:DOA, User’s identity authentication, Authorization, PKI, PMI
PDF Full Text Request
Related items