Font Size: a A A

Research And Application Of Cloud Safety Technology

Posted on:2018-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:B HuFull Text:PDF
GTID:2348330542459940Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Due to the rapid growth of Internet data volume,the physical limitations of single-node computing capability,the rapid popularization of mobile intelligent terminals,and the continuous increase of access bandwidth,the rapid development and gradual maturity of such cloud computing models have been promoted.With the development of the cloud model,especially the development of public cloud and hybrid cloud,how to systematically solve the security problem of the cloud system has become one of the biggest obstacles to the development and popularization of cloud computing.At the same time,it is also a cloud calculate one of the most challenging issues for providers.If we can systematically solve the security problems in the cloud computing,especially in the hybrid cloud,including privacy,it will undoubtedly be of great help to the promotion of cloud computing.This article studies,designs,and ultimately implements a secure cloud system that supports heterogeneous applications.First of all,by analyzing various special requirements and current situation of cloud system,this paper summarizes the existing problems of the existing system,puts forward the necessity of this research,and then introduces the related technologies of cloud system,combined with the functional requirements and network host performance needs,proposed the demand analysis of the new cloud standard framework.Then combined with the design method of UML modeling,the system is designed with detailed functional modules.Functional modules include working mode selection,passive link mode worker,active connection mode worker,security check,management data sender,local filtering,management data collector,offline data cache and so on.Secondly,aiming at the diversity of applications in the cloud,this paper studies how to ensure the security isolation between various applications and prevent the illegal access including cloud and cloud in time to ensure the security of heterogeneous applications.Public cloud and private cloud exist in the cloud at the same time.Different access mechanisms are set up for different users.At the same time,it guarantees that the application does not affect the efficiency of the application itself and can support various applications to deploy to the cloud platform in a safe and fast manner and concentrate all the resources in the cloud To the resource pool,unified management and distribution in accordance with the needs of each application.The result of running shows that the system has better stability and safety.Finally,the system tests and summarizes respectively from the aspects of stability,efficiency,communication security,data security,network isolation and load balancing.According to the analysis of multiple groups of complete and detailed experimental results,it is found that the system has high performance and efficiency.In addition,the system has also been running for a few months at Shanda Network,undergoing long-term stable operations and stress tests,respectively,and found that the system is operating relatively stable.All the implementations of this system are based on distributed architecture with high scalability.From the analysis of the running cluster status of distributed clusters,the load distribution is more balanced and more suitable for the new computing environment of cloud model.
Keywords/Search Tags:Cloud Computing, Cloud Security, Virtualization, Clusters
PDF Full Text Request
Related items