A Study on Security Mechanisms of Cloud Computing Applications

博士 === 國立中興大學 === 資訊科學與工程學系所 === 101 === A cloud computing providing on-demand services on the Internet has a collection of servers. The contributed resources, such as storage and computing power, from servers are implicitly merged as one huge resource and shared among users. Many IT shops will beg...

Full description

Bibliographic Details
Main Authors: Jun-Chao Lu, 呂俊超
Other Authors: Jinn-Ke Jan
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/03751048022903325675
id ndltd-TW-101NCHU5394082
record_format oai_dc
spelling ndltd-TW-101NCHU53940822016-07-16T04:11:23Z http://ndltd.ncl.edu.tw/handle/03751048022903325675 A Study on Security Mechanisms of Cloud Computing Applications 雲端服務應用之安全機制研究 Jun-Chao Lu 呂俊超 博士 國立中興大學 資訊科學與工程學系所 101 A cloud computing providing on-demand services on the Internet has a collection of servers. The contributed resources, such as storage and computing power, from servers are implicitly merged as one huge resource and shared among users. Many IT shops will begin to take a hard look at cloud computing on their capabilities and operations in their next round of infrastructure improvements in an incremental fashion. Cloud computing may offer such significant and easily accessed economic advantages that it has a good chance of being adopted a bit faster than usual. However, sensitive data processed outside the companies brings with an inherent level of risk, because outsourced services bypass the “physical, logical and personnel controls” over in-house programs. Not all the cloud services provide enough flexibility or security control. We proposed the related security mechanisms, which provide security protection of cloud computing with efficiency and practically. For a user, we propose a cloud authentication architecture to provide a trust authentication infrastructure. In this design, user’s sensitive information will not leak to services provider. Moreover, user can roaming in various services providers without re-registration and re-authentication. This design is a foundation for meshing-up a trust and anonymous cloud. For the business, we presents a secure negotiable transactions model based on the infrastructure of mobile agent technology on the cloud. This study reviews the security issues of the mobile agent paradigm for electronic commerce applications. And overcome this disadvantage by a trusted agent home to protect privacy. Moreover, a fair contract negotiation is discussed in this study, that it can effective reduce the risk of online service transaction. For the medical cloud, we propose an electronic health record sharing and integration system in medical clouds and analyze the arising security and privacy issues in access and management of electronic health records. Sharing medical information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. Cloud computing paradigm is one of the popular health IT infrastructures for facilitating electronic health record sharing and integration. Our design proposed a method to make authorized doctor can get the patient’s medical record on the cloud. This design improve the security and privacy on the medical cloud. Jinn-Ke Jan 詹進科 2013 學位論文 ; thesis 74 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立中興大學 === 資訊科學與工程學系所 === 101 === A cloud computing providing on-demand services on the Internet has a collection of servers. The contributed resources, such as storage and computing power, from servers are implicitly merged as one huge resource and shared among users. Many IT shops will begin to take a hard look at cloud computing on their capabilities and operations in their next round of infrastructure improvements in an incremental fashion. Cloud computing may offer such significant and easily accessed economic advantages that it has a good chance of being adopted a bit faster than usual. However, sensitive data processed outside the companies brings with an inherent level of risk, because outsourced services bypass the “physical, logical and personnel controls” over in-house programs. Not all the cloud services provide enough flexibility or security control. We proposed the related security mechanisms, which provide security protection of cloud computing with efficiency and practically. For a user, we propose a cloud authentication architecture to provide a trust authentication infrastructure. In this design, user’s sensitive information will not leak to services provider. Moreover, user can roaming in various services providers without re-registration and re-authentication. This design is a foundation for meshing-up a trust and anonymous cloud. For the business, we presents a secure negotiable transactions model based on the infrastructure of mobile agent technology on the cloud. This study reviews the security issues of the mobile agent paradigm for electronic commerce applications. And overcome this disadvantage by a trusted agent home to protect privacy. Moreover, a fair contract negotiation is discussed in this study, that it can effective reduce the risk of online service transaction. For the medical cloud, we propose an electronic health record sharing and integration system in medical clouds and analyze the arising security and privacy issues in access and management of electronic health records. Sharing medical information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. Cloud computing paradigm is one of the popular health IT infrastructures for facilitating electronic health record sharing and integration. Our design proposed a method to make authorized doctor can get the patient’s medical record on the cloud. This design improve the security and privacy on the medical cloud.
author2 Jinn-Ke Jan
author_facet Jinn-Ke Jan
Jun-Chao Lu
呂俊超
author Jun-Chao Lu
呂俊超
spellingShingle Jun-Chao Lu
呂俊超
A Study on Security Mechanisms of Cloud Computing Applications
author_sort Jun-Chao Lu
title A Study on Security Mechanisms of Cloud Computing Applications
title_short A Study on Security Mechanisms of Cloud Computing Applications
title_full A Study on Security Mechanisms of Cloud Computing Applications
title_fullStr A Study on Security Mechanisms of Cloud Computing Applications
title_full_unstemmed A Study on Security Mechanisms of Cloud Computing Applications
title_sort study on security mechanisms of cloud computing applications
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/03751048022903325675
work_keys_str_mv AT junchaolu astudyonsecuritymechanismsofcloudcomputingapplications
AT lǚjùnchāo astudyonsecuritymechanismsofcloudcomputingapplications
AT junchaolu yúnduānfúwùyīngyòngzhīānquánjīzhìyánjiū
AT lǚjùnchāo yúnduānfúwùyīngyòngzhīānquánjīzhìyánjiū
AT junchaolu studyonsecuritymechanismsofcloudcomputingapplications
AT lǚjùnchāo studyonsecuritymechanismsofcloudcomputingapplications
_version_ 1718350937425182720