Font Size: a A A

Research And Achieve On The Key Technology Of Trusted Support Mechanism In The Cloud Computing

Posted on:2016-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:S G ZhangFull Text:PDF
GTID:2308330503450635Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays, with the rapid development of network and information technology, cloud computing model is produced. It provides light and available service for cloud users which they can get with a little money. It also saves the cloud users from the heavy maintenance of resources. However, with more and more extensive application of cloud computing, the cloud security issues have become increasingly prominent. Many problems have threatened the security of cloud computing, such as the untrusted cloud service provider, the security of cloud user’s identity and data security.The cloud security solution which is widely used is usually the simple accumulation of traditional security methods and safety components. The solution is difficult to adapt to the dynamic computing environment which is allocated on demand. Especially the lack of basic trust in cloud computing is the urgent problem to be solved. This calls us to explore new ideas urgently. We can use the new technology and new method to solve the security problem. As the basis of security, we can build the reliable chain on the trusted root with trusted computing technology. It achieves the security of system through the control of user’s limitation access to the data, and it also provides a new idea to have a research program with cloud security for building the basic trust in cloud computing. This has become an important method to solve the security problems of cloud.In this paper, we conduct a deep analysis of the trusted computing technology and apply it into the cloud computing model. With that, we put forward a trusted supporting mechanism for cloud computing model, which can provide reliable support for cloud security. The main context in my research includes four aspects as follows.Firstly, for the problem of missing the physical security mechanisms, we have a analysis of studying the trusted root structure and the mechanism of cloud computing architecture. With that, we build a virtual trusted root for cloud virtual machine which is bound with the root. The root can be as the initial credible point of virtual machine.Secondly, we have a research on the features of cloud virtualization. Through that, we design the trusted verification mechanism which crosses the virtualization layer. In addition, we also have designed the trusted transmission protocol for the reliable connection between different cloud security components. In this way we can construct the trusted chain which is through the root of trust, control virtual machine, trusted application and network. The chain can provide the reliable running environment for the cloud services.Thirdly, we combine the trusted cloud system with three elements and three layers architecture which is proposed by Changxiang Shen academician. In this way, we can have the separation of safety and reliability. In addition, in order to realize the effective management of the trusted cloud system, we define the specific meaning for every trusted object which is used in the "cloud". We also establish a lot of credible strategy for the unified management.Lastly, relying on the credible strategy, we use the basic trusted measurement function, trusted report function which is provided by trusted computing technology to measure the integrity of cloud components. So we can use the trusted report to show the reliability of running environment in platform for cloud users.
Keywords/Search Tags:trusted computing, cloud computing, trusted root, trusted connection
PDF Full Text Request
Related items