Font Size: a A A

Research Of Cloud Computing Security Technology Based On Classified Protection Of Information System

Posted on:2016-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:F TangFull Text:PDF
GTID:2348330470461241Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With a service-oriented computing model, cloud computing technology integrates kinds of IT infrastructure resource together into a shared resource pool, resulting in improvement of resource utilization and reduction of resource cost. The advantages of good flexibility, high reliability and excellent scalability in cloud computing are obvious. Users can obtain cloud services in a cheap price according to their needs as convenient as the way they get water and electricity. The tremendous commercial and social value in cloud computing has drawn more and more governments, enterprises and research institutions to carry out researches, promoting a further development of cloud computing.With the continuous development and application of cloud computing, cloud security issues become increasingly prominent. How to implement reliable and comprehensive security protection to cloud computing has become a focus in researches. The unique characteristics such as multi-tenancy, virtualization and dynamic scalability in cloud computing have determined that single security protection technology is not enough to ensure safety of cloud computing, and building a multilayer security protection is becoming a trend. The classified protection of information system running in our country, which puts hands on technical and management factors, has played an important role in protecting traditional information systems. As a special kind of information system, cloud computing system can still take classified protection as its rule to ensure safety. However, classified protection is unable to solve new security issues brought by new technology of cloud computing, presenting obvious limitations.This paper starts from introducing meanings and features of cloud computing security. After analyzing kinds of security risks of cloud computing, combining key technologies of cloud computing security and drawing on the experience of classified protection, this paper proposes a technology to implement comprehensive protection for cloud computing. The main contents are as follows:1. The cloud computing security research status are summarized and analyzed from 3 points of view: cloud computing security reference model, cloud computing security policies, cloud computing security hierarchy, and then the security features of cloud computing are also pointed out. By analyzing technical and management security risks of cloud computing and combining key technologies of cloud computing security, this paper proposes a technology to implement protection for cloud computing from 7 layers after drawing on the experience of classified protection.2. By putting proposed cloud computing security protection technology into protection indexes and drawing into analytic hierarchy process and fuzzy comprehensive evaluation algorithm, this paper gives an evaluation method for cloud computing security. To validate effectiveness of the evaluation method, a teaching information system is selected as experimental subject. After making a brief design of cloud computing security for the teaching information system, this paper carries out a security evaluation process.
Keywords/Search Tags:Cloud Computing Security, Classified Protection of Information System, Analytic Hierarchy Process, Fuzzy Comprehensive Evaluation Algorithm, Evaluation of Cloud Computing Security
PDF Full Text Request
Related items