Font Size: a A A

Design And Implementation Of Cloud Security Based On Massive Data

Posted on:2019-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y H FangFull Text:PDF
GTID:2428330590959961Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the network technology and cloud computing technology,cloud computing is also more and more known to people.Many people believe that cloud computing will become the third revolution in the IT field after the advent of personal computers and the birth and development of the internet.Due to a large number of application and promotion of cloud computing,security issues have become increasingly prominent in the cloud environment.How to ensure the legitimate users of the cloud environment to be able to correct and reliable access to resources,how to ensure the security of information stored in the cloud environment,has become an important task in the study of cloud computing security.General information security includes encryption and authentication,access control and so on.Access control is an important measure to protect computer resources from being deliberately deleted,damaged or changed by illegal persons.Identity authentication technology is the cornerstone of the protection of information security.Encryption technology runs through the data transmission,storage and so on every link.This thesis mainly completed the following work: 1,Introduced the current development of cloud security at home and abroad,the current problems and the corresponding solutions.2,For the existence of some of the cloud platform security design solutions.3,The Kerberos protocol is introduced,the whole process of its identity authentication,to achieve the identity authentication cloud platform.4,Using the role based access control(RBAC)model to achieve the cloud platform's access control function.5,DES,RSA and other encryption algorithms are introduced and applied to identity authentication,access control,data transmission and data storage stage to improve the security of the cloud platform.
Keywords/Search Tags:Cloud Computing, Security, Identity Authentication, Access Control, Encryption
PDF Full Text Request
Related items