Font Size: a A A

Research On Trusted Computing And Network Security For High Reliability Clusters

Posted on:2018-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:M YouFull Text:PDF
GTID:2348330518481979Subject:Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of global information, network security has become a global challenge due to using the internet as an important engine to enhance the economy development. Network security and information technology complements each other. Especially, network security technology promotes the development of information security. With the coming of large data age, focusing on the network mechanism and strengthen security protection,will inhibit the network innovation and will also reduce the overall efficiency of the internet applications. Therefore, how to rationally use trusted computing technology to protect information security, and how to use efficient and safe method to promote the applications of large data technology,become the focus of network security research.The business traffic of the internet requires the support which from high-performance and high reliable server framework. In other words, to support large data applications and high-performance computing, a corresponding platform of high-performance trusted service cluster is needed. For the architecture of highly trusted service cluster,it is urgent to study its security mechanism and security strategy.Trusted computing technology refers to the technical aspects of guaranteeing the security of data transmission by effectively conducting intervention control,setting security mechanism, security policy and security service, etc. Trusted computing technology is aimed at the security of network issues. Its aim is to establish an active defense system. In addition,users in the cloud computing environment have a significant impact on the security of cloud data. User behavior security authentication is an effective way to ensure the safe operation of cloud service system. How to use trusted computing and security strategy that based on network technology to realize effective security construction for user behavior is an important challenge.This thesis focuses on trusted computing technologies that taking behavior security as a starting point. Its integrity and authenticity have been explored. First of all, through the analysis and comparison of several types of encryption algorithms, the encryption characteristics of various algorithms and the application of different security encryption are summarized; Then, the security mechanism of high reliability cluster architecture is introduced in detail, as well as the encryption technology, the security of the trusted computing technology, network security technology and reliable cluster technology, etc. SSL VPN (Secure Sockets Layer Virtual Private Network) and SSH (Secure Shell) are used to control the outside and internal network,respectively. This dual security access mechanism is built to protect the cluster access security. OS SIM (Open Secure Security Information Management)platform is appilied to check the user's behavior. Our proposed architecture in a certain extent is successful to defend the cluster security. Our research provides a reference for the future establishment of active defense system for cyberspace security.
Keywords/Search Tags:Trusted Computing Technology, Highly reliable cluster architecture, SSL VPN, SSH, OSSIM
PDF Full Text Request
Related items