Font Size: a A A

Research On Platform Credibility Authentication In Cloud Computing Environment

Posted on:2017-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:J X ChenFull Text:PDF
GTID:2358330482991347Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The Cloud computing as a more popular information technology,whether it is government department or major application vendors,even academic fields have a strong interesting.Popular speaking, it forms a huge virtual resource pool of shared resources,the traditional IT resources such as servers, computing platform, application software are linked and through web technology to provide on-demand IT services for users. Cloud computing eliminates the high number of IT infrastructure maintenance costs of small and medium enterprises, which are used to invest in their core business development. The development of the concept of cloud computing accord with requirements about the current business model and service model needs to change, It is likely to promote another technological revolution success in the field of information to human.The Cloud computing due to its some own characteristics, so that it is facing many unknown security risks; especially due to the high concentration of IT cloud computing resources, information resources, user resources, it brings security risks much higher than traditional applications. Cloud computing applications enable critical data and business applications of companies in the midst of the cloud service provider's cloud computing system, Cloud services providers will need to implement strict security management and access control policies, avoiding users and internal staff and external attacker to steal and abuse user data. Also with the network information security situation is worsening, traditional network security thinking and system has been unable to meet the increasingly complex security needs, in the face of malicious Internet attacks and threats,need to have new defense thought to compete with. Currently, the main research of cloud computing security is protecting cloud computing applications, including cloud computing platform system security, security of data storage and isolation, user access authentication, information transmission security, network attack protection and multiple security levels.Based on many issues that cloud computing security need to study raised,reading books about cloud computing security. For settle the cloud computing platform security certification, through the platform remote authentication can try to solve this problem. Therefore, the paper research the platform remote certification related subjects. Focus on using Credibility-based platform remote attestation program construct a model certification credibility platform in the cloud computing environment.And hope that through the efforts in this direction to provide a new method of thinking in order to solve security issues related to cloud computing.In this paper, it use remote attestation of trusted computing idea, proposed security architecture authentication model between platforms, wishes to adopt the. Firstly, introduce the cloud-related security issues, outlined cloud computing security framework, remote attestation of trusted computing, cloud computing platforms and other related concepts. Remote Attestation thinking can provide theoretical support for solving authentication problems.Secondly, it elaborate the theory and technology of certification model. Such as remote attestation, digital signature, RSA algorithm, Hadoop distributed platforms. Certification model make remote attestation as a basis, use trusted remote platform proof that some scholars proposed: An improved trusted attestation program based on component and module properties and a trusted attestation program based on System behavior. By the above method, complete trusted measurement process.In the certification model, remote attestation method combined with the RSA algorithm and measure based on component and modules. Complete platform integrity measurement and remote authentication through the above process.It analysis authentication model some functions through the simulation again. The simulation results show that the RSA algorithm has higher efficiency in the model. Measure speed based component modules attribute does not affect the efficiency of the system.Thereby it increase the capacity of processing data in the cloud computing model environmental certification.Finally, summarizes and analyzes the shortcomings of security model. Summary and outlook the key research directions...
Keywords/Search Tags:Cloud computing security, Remote attestation, System behavior, Efficiency
PDF Full Text Request
Related items