Dissertation > Excellent graduate degree dissertation topics show

Research on security model based on trust computing cloud

Author: ZhangYanDong
Tutor: ZhangYongSheng
School: Shandong Normal University
Course: Applied Computer Technology
Keywords: Cloud Computing Access Control Trust Security Model SSO authentication
CLC: TP309
Type: Master's thesis
Year: 2014
Downloads: 28
Quote: 0
Read: Download Dissertation


Cloud Computing is a new booming calculation method and its rising foundation is theInternet. In this way, the users need to apply for the resources, and then obtain hardware andsoftware resources and information services from cloud computing platform. Because cloudcomputing technology has a good development prospects, the major traditional IT companieshave introduced their own cloud computing platform, trying to seize the cloud computing market.However, cloud security is always a development obstacle which cloud service providers mustface with, and it is closely related to the development prospects of cloud computing. It can besaid, without the security, application and popularization of cloud computing is impossible.While traditional security solutions to a certain extent solve the security issues in cloudcomputing, but migrating this set of solutions exactly to the cloud platform is absolutelyundesirable. Due to the new features such as the high degree of virtualization, deploymentcomplexity and high scalability, we have to make research on security mechanisms which isapplicable to cloud computing. Trust problem is one of the biggest obstacles with which theprocess of promotion of cloud computing face, namely whether cloud users and cloud serviceproviders can trust each other.In response to the problems above, we propose appropriate solutions, the main contents aresummarized as follows:1. Analyzes the cloud computing platform and its characteristics, dissect its developmentadvantages and service patterns, discusses the special security threats faced by cloud computing,analyzes virtualization technology, trusted computing, access control and a series of coretechnology which can help the cloud computing platforms improve its security. In addition, makea thorough exposition discuss on the definition of trust, its features, and computing methods.Discusses and analyzes the trust value calculation of the classic trust model, lays special stresson analyzing the necessity of introducing trust mechanism to the cloud environment.2. For dynamic and high scalability features of cloud computing environments, by means offuzzy logic thoughts, this paper proposed cloud platform evaluation model named TBFEM,which based on fuzzy trust. This model uses fuzzy comprehensive evaluation method to calculatethe trust value, while cloud services providers establish fuzzy control rules, grant the cloud usersappropriate permissions according to fuzzy cloud judgment. In the calculation of the trust value,we introduce the time factor, so that the model can better adapt the dynamic cloud computingenvironments access control requirements. By establishing a two-way trust evaluation, it caneffectively improve the security of cloud computing platforms.3for the cloud computing platform has a huge scale deployments and offers many types ofservices, and in many practical applications services may belong to different autonomous domain,and in many cases cloud users need to mobilize more resources situation together to complete atask, this paper presents a single sign-on model to simplify the user’s operating experience,switch between different autonomous domains without repeatedly entering authenticationinformation passively waiting for autonomous return message authentication, and go apply for the necessary services. Against the deficiency of existing single sign-on model, the paperintroduce Security Assertion Markup Language SAML to single sign-on design for cloudcomputing environments, strengthening protection for cloud computing resources to a certainextent, improve the efficiency and flexibility of authentication in the cloud.

Related Dissertations

  1. Research on the Situation of Alienation and the Relationship among Alienation, Family Cohesion, Family Adaptability and Interpersonal Trust for College Students,B844.2
  2. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  3. Study on the Access Control of the Court Information System,TP309
  4. The Establishment of Grid Platform on Agricultural Supply Chain System,S126
  5. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  6. Discussion of Real Estate Transactions Made in Good Faith in the System,D923.2
  7. The Research of Credit Management Countermeasure to Network Group Buying in China,F203
  8. A Design Study of PLC Elevator Access Control System Based on RFID,TP273.5
  9. University Office System Design and Implementation,TP311.52
  10. The Research on Cloud Computing for the Dynamic Fuzzy Measurement Method,TP274
  11. Design and Implementation of Online Shopping Prototype System Based on Hadoop,TP311.52
  12. Research on Model of Public Trust in Governments,D630
  13. Design of the Mobile Learning System Based on Hadoop,G434
  14. UCON-Based Access Control Model and Application in IoT Environment,TP393.08
  15. The Trust Protection Principle in the Judicial Practice and Perfect,D925.3
  16. Discussion on the Improvement of Government’s Public Trust Based on the Perspective of the Development of Flexible Leadership,D630
  17. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  18. Web application system design based on Google's cloud computing platform and,TP393.09
  19. Research on Automated Trust Negotiation Framework and A Prototype Design,TP393.08
  20. The Research on Localization and Target Tracking in Wireless Sensor Network,TN929.5
  21. Research of Scheduling Algorithm in Telecom Business Supporting Based on Cloud Computing Platform,TP301.6

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile