Font Size: a A A

Research On Trusted Security Mechanism Of Cloud Computing Platform

Posted on:2018-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q TangFull Text:PDF
GTID:2348330539975140Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer technology and network technology,the cloud computing technology has been widely promoted and developed.There are a lot of challenges to application security,for the flexibility,openness and public availability of the cloud computing environment.More and more trusted computing is used in the information security after trusted computing technology appeared,and the technology of ensuring system and hardware security become more and more mature.Combining the trusted computing technology,how to solve the cloud computing and data safety problem becomes a major research direction.This paper is based on trusted computing technology and virtualization technology,to study the trusted security mechanism of cloud computing platform from two aspects.On one hand,a real-time measure security mechanism based on trusted computing is proposed.It is necessary to define the measurement rules and the metric semantics for the need of the measurement of the application load and the operation process.With real-time metric modules and security policy rules,we can make a real-time measurement of process elements.With the virtual machine detection system and integrity assessment system,we can carry out a real-time monitor and detection of the loaded state and running state of the application as well as the change of detection process state.So that we can make a real-time integrity estimation of the process the evaluation of the process to ensure the trusted transition of the application and the trusted execution of the system.On the other hand,a security mechanism of role-based data isolation access is proposed.With the virtualization technology,cloud computing platform can isolate the data so that the users can get it through a role-based accessment.In addition,due to a comprehensive verification of the trust certificate and the trust level of the users,as well as a real-time monitoring of the user access behaviors,the cloud computing platform provides a more secure operating environment.As a result,we can ensure the safety of the storage,isolation and access of the data in the cloud computing platform.Only if we can ensure the trust of cloud computing platform and its data with the help of trusted computing technology and virtual technology,can we truly trust the cloud computing platform and get trust from our clients.The research results of this paper not only provide some support for the research of cloud computing safety,but also provide some reference for the research of reliable computing safety technology.
Keywords/Search Tags:cloud computing platform, trusted computing technology, virtualization technology, data isolation, role assignment
PDF Full Text Request
Related items