Server Authentication Mechanism In Cloud Computing Environment
碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === With rapidly growing demand on internet usage, the work loads for servers have been increasing accordingly. The concept of Cloud Computing has been proposed with response to this situation, and the advancement in technology and application of cloud computing...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/13967545159800779318 |
id |
ndltd-TW-099SHU05396023 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099SHU053960232016-04-24T04:22:49Z http://ndltd.ncl.edu.tw/handle/13967545159800779318 Server Authentication Mechanism In Cloud Computing Environment 雲端網路環境的伺服器認證機制 Wei-tan Hsiao 蕭惟丹 碩士 世新大學 資訊管理學研究所(含碩專班) 99 With rapidly growing demand on internet usage, the work loads for servers have been increasing accordingly. The concept of Cloud Computing has been proposed with response to this situation, and the advancement in technology and application of cloud computing have become the current trend for internet usage. Cloud computing is a distributed networking framework, and the server under this construct plays a crucial role. These servers handle huge amount of data processing and are more powerful and extensive in function compared to older generation servers. Cloud computing utilizes new concepts, advanced technologies, and the function of scattered distributed networking; however, only a few researchers focused on the secure socket layer of servers in different safety domains, and this is extremely important in servers that carries powerful data processing capability. There are two steps in the procedure inside our proposed mechanism including: The certification process in between servers and inside the Cloud Federation Manager ,and the certification process in between different Cloud Federation Managers via Kerberos Distribution Center (KDC). First, the servers get certified inside its Cloud Federation Manager, and then proceed to the reciprocal certifications with other Cloud Federation Managers in order to save and exchange resources in between different Cloud Federation Managers. We proposed to use Time Stamp and Asymmetrical Encryption in our proposed mechanism to prevent malicious safety attacks and to ensure security during certification procedures Ming-Huang Guo Horng-Twu Liaw 郭明煌 廖鴻圖 2011 學位論文 ; thesis 69 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === With rapidly growing demand on internet usage, the work loads for servers have been increasing accordingly. The concept of Cloud Computing has been proposed with response to this situation, and the advancement in technology and application of cloud computing have become the current trend for internet usage. Cloud computing is a distributed networking framework, and the server under this construct plays a crucial role. These servers handle huge amount of data processing and are more powerful and extensive in function compared to older generation servers. Cloud computing utilizes new concepts, advanced technologies, and the function of scattered distributed networking; however, only a few researchers focused on the secure socket layer of servers in different safety domains, and this is extremely important in servers that carries powerful data processing capability.
There are two steps in the procedure inside our proposed mechanism including: The certification process in between servers and inside the Cloud Federation Manager ,and the certification process in between different Cloud Federation Managers via Kerberos Distribution Center (KDC). First, the servers get certified inside its Cloud Federation Manager, and then proceed to the reciprocal certifications with other Cloud Federation Managers in order to save and exchange resources in between different Cloud Federation Managers. We proposed to use Time Stamp and Asymmetrical Encryption in our proposed mechanism to prevent malicious safety attacks and to ensure security during certification procedures
|
author2 |
Ming-Huang Guo |
author_facet |
Ming-Huang Guo Wei-tan Hsiao 蕭惟丹 |
author |
Wei-tan Hsiao 蕭惟丹 |
spellingShingle |
Wei-tan Hsiao 蕭惟丹 Server Authentication Mechanism In Cloud Computing Environment |
author_sort |
Wei-tan Hsiao |
title |
Server Authentication Mechanism In Cloud Computing Environment |
title_short |
Server Authentication Mechanism In Cloud Computing Environment |
title_full |
Server Authentication Mechanism In Cloud Computing Environment |
title_fullStr |
Server Authentication Mechanism In Cloud Computing Environment |
title_full_unstemmed |
Server Authentication Mechanism In Cloud Computing Environment |
title_sort |
server authentication mechanism in cloud computing environment |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/13967545159800779318 |
work_keys_str_mv |
AT weitanhsiao serverauthenticationmechanismincloudcomputingenvironment AT xiāowéidān serverauthenticationmechanismincloudcomputingenvironment AT weitanhsiao yúnduānwǎnglùhuánjìngdecìfúqìrènzhèngjīzhì AT xiāowéidān yúnduānwǎnglùhuánjìngdecìfúqìrènzhèngjīzhì |
_version_ |
1718231857841045504 |