Font Size: a A A

Research On Java Security Operation Technology Based On Software Watermark In Cloud Platform

Posted on:2019-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:G S HeFull Text:PDF
GTID:2348330569995533Subject:Engineering
Abstract/Summary:PDF Full Text Request
The security of cloud computing not only affects people's work and life,but also threatens the security of national defense.Java technology is widely used in cloud computing and we must pay attention to its security.Software watermarking is a kind of technology that protects the security of software.With reference to the related literature,it is found that the current research on this technology is mainly on the theoretical level of the algorithm.According to the application scenario in the cloud computing,my work improves the existing software watermarking algorithm and broadens the scope of application of the watermark.The main work is as follows:The current research on software watermarking is mainly about the improvement and implementation of a single algorithm.This article analyzes and compares common types of Java software watermarking algorithms.After considering the security and universality of the watermark,it is found that the virtual method software watermarking algorithm can better protect the security of Java software.Some scholars have applied virtual method software watermarking algorithms to software copyright protection.Watermarks are embedded via encoded ByteCode instructions or replacement instruction operands,but such watermarks are easily found by the hexadecimal editor.In this paper,the virtual method software watermarking algorithm is combined with the big integer factorization problem.The public key is used as the watermark and the fragment is embedded into the program.When watermarks are extracted,the watermarks in the tiles are synthesized.This method not only improves the concealment of the watermark and the ability to resist deformation attacks,but also weakens the chance of the watermark.The sandbox is the core of the Java security model.The security manager can limit the Java software at the API level based on the code source,permissions,and other elements,but it has security risks.This article writes a class loader that verifies the watermark by inheriting the ClassLoader class.Before loading the Byte Code file,the custom class loader extracts the virtual method software watermark from the file and verifies the validity of the software.Before the sandbox restricts the software to use the API,this method can identify and limit the software and reduce the security risks of the system.For this application,this paper adjusts the watermark algorithm encoding method,directly use the ByteCode instructions to identify the security software,improve the watermark's concealment.By coding,an improved virtual method software watermarking algorithm and two custom watermark class loaders are implemented.This paper analyzes the security threats of cloud computing and builds an attack model.It designs a Java security operation program using software watermarking technology and implements the key technologies of the solution.Finally,it conducts tests.The test results and analysis show that the improved virtual method software watermarking algorithm can embed and extract the watermark correctly,and the security is better.A custom watermark-aware class loader correctly identifies illegal software and handles exceptions.
Keywords/Search Tags:cloud security, software watermarking, software copyright, custom class loader
PDF Full Text Request
Related items