Font Size: a A A

Research On Trusted Connection Technology For Cloud Environment

Posted on:2018-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiuFull Text:PDF
GTID:2348330515967998Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of cloud computing technology,cloud computing services are widely used in commercial,financial,national e-government and other fields,and have a significant impact on people's daily life and production activities.Cloud computing is widely used in virtualization,resource pooling,outsourcing and other technology to improve resource utilization and save the users spending,but the technology has weakened the user to control the data on their own,the weakening of the cloud boundary control,the security problems in cloud environment have become increasingly prominent.In view of the problems in the cloud environment,this paper proposes a trusted network connection architecture based on network behavior security attribute measurement according to the three yuan three layer network connection architecture TNCA TNCA-AM.Based on the sensitivity of network behavior,a method of multiple security attribute measurement is proposed,and then a cloud tenant property model is proposed.Under the guidance of TNCA-AM framework,this paper designs a set of trusted network connection protocol for cloud environment.The main innovations of this paper include two aspects.First of all,the traditional network connection architecture is analyzed,based on the traditional trusted network connection architecture and lack of sustainability measurement and lack of fine-grained access control limitations of two show,according to China's three yuan of three layer network connection architecture TNCA,proposed on the basis of the network behavior sensitivity of multiple measurement methods security attribute measures,put forward a kind of trusted network connection architecture support attribute measures TNCA-AM,presents a framework of the architecture,function entity,component description,presents a framework of the connection process steps,analysis of the traditional network connection framework and the advantages and disadvantages of the proposed framework.Secondly,according to the TNCA-AM framework,this paper designs a set of trusted network connection protocol which is suitable for cloud environment.In order to realize the attribute collection,dynamic link protocol measurement,personal certificate code verification function,this paper proposes a trusted terminal auxiliary module TTAM,auxiliary remote attestation process,on this basis,the paper describes the specific steps of trusted network connection protocol,and gives the three party communication process detailed map.For the first time,the thesis applies BAN logic to prove the protocol formally,find the protocol flaw,and ensure the correctness and security of the protocol.At last,this paper gives the application in trusted cloud environment connection framework and trusted connection agreements for the design of the prototype system,the system structure design are given,and access to a trusted connection stage for the code implementation and testing.
Keywords/Search Tags:cloud computing, attribute metrics, trusted network connections, trusted connection protocols, BAN logic
PDF Full Text Request
Related items