Font Size: a A A

Study On Cloud Security Certification Issues Based Remote Attestation

Posted on:2015-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y DuFull Text:PDF
GTID:2268330425496307Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Cloud computing is not only a technology, but also service mode, the mode of traditionalInternet services and applications are applications are changed by the cloud computing. It isthe further development of the distributed processing, parallel processing, and grid computing,and connect together of computing resources, storage resources and software resources, at thesame time, a huge pool of Shared virtual IT resources is formed which can provide service forremote computer users.The various advantages of cloud computing make it become a populartopic in the field of information technology at present. However, in recent years, with the rapiddevelopment of cloud computing, the incidents of cloud security happened constantly, whichcaused enormous losses for cloud computing service providers and the users. Therefore, it istime to solve the problems of the cloud computing.Cloud computing has changed the traditional network security service greatly, especiallythe mode of traditional network security service. It provides a new service model for networksecurity applications, and it makes network security itself as a service. However, due to thelack of the controllability of data, equipment and environment, it leads to distrust of the cloudcomputing, so a growing number of malicious attacks occurred, and it leads to serviceproviders distrust of the user’s identity. So it is the base of cloud computing to authenticate thedate and behavior. At present, there is a trend of using the concept of trusted computing tosolve the problem of cloud security. The authentication problem of cloud security can besolved through the remote attestation of trusted computing.In this paper, a method of remote attestation is proposed to solve the attestation ofcomponent property and system behavior. Firstly, this paper introduced the security issues incloud computing, and pointed out that the most basic security problem was authenticationabout component properties and system behavior. Besides, it introduced the research progressabout the problems at home and abroad, and proposed that using remote attestation to solvethis difficult problem according to the trend of research.Secondly, the related concepts of trusted computing and remote attestation wereintroduced in this paper, and the idea of remote proof protocol was elaborated. Mainly itintroduces the methods and structures about component properties and system behavior, andanalyzes the current method about component properties and system behavior. The paperimprovs the method, such as the problem of lack of information privacy protection, timedifference, low efficiency, lack of safety in the proof process, so it improvs the security of thecloud computing platform.Thirdly, it proved the safety of component properties and system behavior basedattestation. Corresponding security model is given, and analyzing its security though themethod, and proved its credibility though experiments. It analyzed all kinds of situation incomponent property based attestation and the probability of misjudgement in system behaviorbased attestation. Finally, the paper summarized the proof method, and analyzed the focus of the researchwork in the future.
Keywords/Search Tags:cloud security authentication, trusted computing, component property, systembehavior, remote attestation
PDF Full Text Request
Related items