A Study on the Application of Kerberos in Cloud Computing

碩士 === 中國文化大學 === 機械工程學系數位機電碩士班 === 102 === Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a...

Full description

Bibliographic Details
Main Authors: Wan, Ming-Feng, 萬明峰
Other Authors: Sun, Jenn-Dong
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/69732649394026819542
Description
Summary:碩士 === 中國文化大學 === 機械工程學系數位機電碩士班 === 102 === Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. Because it’s an open source, people can build a private cloud to perform distributed computing. However, as the use of cloud computing becomes very convenient, information security is more important. In order to provide secure utilization of Hadoop, an identification authentication scheme has been proposed in this study. To experiment on our proposed scheme, Linux operating system has been adopted as the platform in this study. It is implemented based on Linux KVM(Kernel-based Virtual Machine) to simulate cloud computing with multi-clients system. In the system, Hadoop is used as a cloud computing platform. After then, Kerberos 5 has been implemented on this system for performing authentication of users’ identification. In order to provide assurance of information security, some analysis is performed based on the implemented cloud computing system. The enhancement of information security is also proposed to remedy the shortcoming of the implemented cloud computing system. Experimental results demonstrate the feasibility of our proposed scheme and it is validated for physical applications.