Font Size: a A A

Research On Technology Of Digital Certificate Based On ECC Under Cloud Environment

Posted on:2016-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:X X GuoFull Text:PDF
GTID:2308330470480933Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a new mode of service and a new technology of computer, cloud computing brings a new thoughts and new life to the world of computer, becoming one of the top topics. It integrates the resources such like network, server, storage, service and application to a large configurable virtual resource pool, the remote computer users can get the services they need through the network. This kind of service mode makes people use computer in an easier way, the fast development of cloud computing has brought a great revolution in the whole area of information technology. However, when people are enjoying the benefits that the cloud computing give us, there emerging many security problems like data breaches, data loss, account or service traffic hijacking and so on. These problems make computer researchers have to begin to pay attention to the security issues.Firstly, the paper introduces the concept and main characters of the cloud computing and the security problems that have come out since it has be used, and points out that the problem that privacy data of cloud users reveal has been more and more serious. The paper presents and analyses the current status of researching at home and abroad, and then proposes to build a single-wire connection between the virtual cloud server and cloud user through drawing in PKI system based on ECC to achieve the protection and isolation of cloud users’privacy data and to enhance the cloud’s ability of data protection.Secondly, the paper introduces the working theory of PKI and the mathematical theory of the traditional ECC algorithm, describes the communication process that based on ECC, and improve the traditional ECC algorithm according to the problems of it that the traditional ECC algorithm needs a lot of dot product and square modulo operation, so that the system can improve the security of certificate process.Thirdly, the paper describe the PKI application programme in the cloud computing, and indicates the programme can meet the need of the security of cloud computing.Finally, the paper summarizes the research of cloud computing security, and analyses the emphases and direction of the next research step.
Keywords/Search Tags:cloud computing, cloud computing security, data protection, digital certification, ECC, PKI
PDF Full Text Request
Related items