Font Size: a A A

Research And Analysis Of Cloud Computing Network Security Situation Assessment

Posted on:2015-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhangFull Text:PDF
GTID:2298330467463147Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and Internet technology, the need for data processing efficiency is much higher. On the one hand, the researchers keep on researching the super computer to improve the computing capacity. On the other hand, researchers cascade several single computers to achieve parallel processing and finish task together. Because the latter technique is not strict to the requirement of single computer performance, and is easy to build the experimental environment, so it attracts lots of attentions of researchers around the world. Cloud computing is developed based on the above concept. As a kind of new distributed computing model, it has strong computing power and storage capacity, and has been widely uesed at present. However, the communication of nodes in the cloud computing system is based on the link and open character of the Internet, so cloud computing jobs are always suffered from network attacks. Therefore, the security of cloud computing is very urgent to be solved. In order to ensure the security of cloud computing system, we need to take the safety assessment of situation, and grasp the safety status of the overall system in real-time. When the system is under threat, we can find the threat quickly and take corresponding responds to prevent the threat from further development.This paper analyses the characteristics of cloud computing and cloud computing security problems, and put forward a cloud computing network security assessment system based on the traditional network security assessment technology, gray theory and hierarchical analysis method. The system includes the factor extraction of the network security, the design of the network security assessment model and the calculation of network security in values format. This paper also discusses how to embeded the cloud model into cloud computing network security prediction system effectively with improving the original cloud model mapping algorithm, and proves the validity of the improved algorithm.This paper verified the effectiveness of cloud computing network security assessment system and the cloud computing network security prediction system by a series of experiments. Aiming at solving the possible security problems when users logining in the cloud computing services, this paper also proposes a dynamic double factor authentication method based on the existing user authentication technology.
Keywords/Search Tags:cloud computing network, security security, assessmentsecurity prediction
PDF Full Text Request
Related items