Font Size: a A A

The Research And Implementation Of Cryptographic Aigorithim Model In Clod Computing Environment

Posted on:2017-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y L LiFull Text:PDF
GTID:2428330488953263Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing is one of today's most exciting technologies due to its cost-reduction,flexibility,and scalability.In the last few years,cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry.But at present,cloud computing is faced with a lot of critical problems.The security problem is the biggest one.And with the widespread of cloud computing,the security problem is becoming more and more important even can restrict the development of cloud computing.Also cloud computing need powerful computing speed and high reliability.For above problems and requirements,this paper make the research and implementation of cipher algorithms model under cloud computing environment.The paper include three parts,the design and implementation of virtual machine cipher card driver based on shared memory and eventfd interrupt,the accelerate program and implementation of OpenSSL based on high speed cipher card.the design and implementation of crypto-operations fault-tolerant under cloud computing environment.Virtualization is one of the key technique of cloud computing.Now insert the password card into the host machine,how the virtual machine to access and use the card.Due to the security issues,we use shared memory and interrupt to realize the communication between host machine and virtual machines instead of through the network.This paper exploits a C language call library to achieve the communication between hosts and guests.The original application layer security libraries and softwanre tools such as OpenSSL,IPSec VPN and PGP and so on,all use the sofewanre tools to complete the crypto-operation.Now Itransplant them from softwanre to hardware and use the cipher card to complete the crypto-operation.All the crypto-operations are completed in the card.In order to improve the encryption security,all the private keys are stayed in the card and cannot leave card.It also can improve the computing speed by useing the hardware.I first chose the OpenSSL to transplant becase of it is most widely-used.For asymmetric cryptographic algorithms,the encryption speed of the hardware is much faster than the software.So in this paper ? choose two main asymmetric cryptographic algorithms RSA and ECC to tranplant.The design and implementation of crypto-operations fault-tolerant under the cloud computing environment.The cipher cards are widely used in all kinds of business occasions such as banks or web servers.But the computing results of the cipher cards are not always trusted by the users.If the card generate some error,it will lead to enormous losses.So the cipher card should have high ability of fault-tolerant.In this paper,I use the redundancy to realize the design and implementation of crypto-operations fault-tolerant...
Keywords/Search Tags:Cloud computing, Virtual machine cipher card, Shared memory, Openssl, High speed cipher card, Fault-tolerant
PDF Full Text Request
Related items