Font Size: a A A

A Cloud Application Parameter Identification And Encryption System Based On CASB

Posted on:2020-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:L G DengFull Text:PDF
GTID:2428330599458592Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of cloud computing enables enterprises to quickly create their own network services,including corporate websites,data storage,etc.,but enterprise data is also exposed to the risk of illegal access due to cloud service provider integrity issues and cloud environment security issues.When business migrates to the cloud environment,the security of data is an issue that enterprises and cloud service providers need to consider.Firstly,the thesis studies the concept of cloud access security broker(CASB)technology,designs and implements the prototype system of the technology.The CASB system is divided into a cloud application agent module,a proxy system authentication module,a system management module and a data encryption module,respectively providing cloud application proxy,identity authentication,visual management and data encryption security services.In the aspect of cloud data protection,through the improvement of domestic company solutions,a cloud application parameter identification scheme was designed to realize the automatic identification of cloud application parameters that enterprises pay attention to.The scheme is applied to the CASB designed in this paper.The system management module obtains the cloud application parameter analysis result and configures the cloud application parameters.The CASB system encrypts the parameter values of the configuration parameters by parsing the data of cloud application translating,realizing the protection of the enterprise data.The final test indicates the feasibility of the system design.After the CASB system integrates the cloud application parameter identification scheme,the application parameters of the enterprise and the cloud application in the data interaction process can be effectively analyzed.The CASB system applies to the cloud application.After the parameters are configured,the cloud application parameters can be effectively identified and the encryption module encryption can be invoked to implement encryption protection of the user data in the cloud.
Keywords/Search Tags:Cloud computing, CASB, Parameter identification, Encryption
PDF Full Text Request
Related items