A Study on the Application of Kerberos in Cloud Computing
碩士 === 中國文化大學 === 機械工程學系數位機電碩士班 === 102 === Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/69732649394026819542 |
id |
ndltd-TW-101PCCU0689018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101PCCU06890182015-10-13T23:37:36Z http://ndltd.ncl.edu.tw/handle/69732649394026819542 A Study on the Application of Kerberos in Cloud Computing Kerberos應用於雲端運算之研究 Wan, Ming-Feng 萬明峰 碩士 中國文化大學 機械工程學系數位機電碩士班 102 Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. Because it’s an open source, people can build a private cloud to perform distributed computing. However, as the use of cloud computing becomes very convenient, information security is more important. In order to provide secure utilization of Hadoop, an identification authentication scheme has been proposed in this study. To experiment on our proposed scheme, Linux operating system has been adopted as the platform in this study. It is implemented based on Linux KVM(Kernel-based Virtual Machine) to simulate cloud computing with multi-clients system. In the system, Hadoop is used as a cloud computing platform. After then, Kerberos 5 has been implemented on this system for performing authentication of users’ identification. In order to provide assurance of information security, some analysis is performed based on the implemented cloud computing system. The enhancement of information security is also proposed to remedy the shortcoming of the implemented cloud computing system. Experimental results demonstrate the feasibility of our proposed scheme and it is validated for physical applications. Sun, Jenn-Dong Tsai, Chang-Lung 孫振東 蔡昌隆 2014 學位論文 ; thesis 63 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中國文化大學 === 機械工程學系數位機電碩士班 === 102 === Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. Because it’s an open source, people can build a private cloud to perform distributed computing. However, as the use of cloud computing becomes very convenient, information security is more important. In order to provide secure utilization of Hadoop, an identification authentication scheme has been proposed in this study.
To experiment on our proposed scheme, Linux operating system has been adopted as the platform in this study. It is implemented based on Linux KVM(Kernel-based Virtual Machine) to simulate cloud computing with multi-clients system. In the system, Hadoop is used as a cloud computing platform. After then, Kerberos 5 has been implemented on this system for performing authentication of users’ identification. In order to provide assurance of information security, some analysis is performed based on the implemented cloud computing system. The enhancement of information security is also proposed to remedy the shortcoming of the implemented cloud computing system. Experimental results demonstrate the feasibility of our proposed scheme and it is validated for physical applications.
|
author2 |
Sun, Jenn-Dong |
author_facet |
Sun, Jenn-Dong Wan, Ming-Feng 萬明峰 |
author |
Wan, Ming-Feng 萬明峰 |
spellingShingle |
Wan, Ming-Feng 萬明峰 A Study on the Application of Kerberos in Cloud Computing |
author_sort |
Wan, Ming-Feng |
title |
A Study on the Application of Kerberos in Cloud Computing |
title_short |
A Study on the Application of Kerberos in Cloud Computing |
title_full |
A Study on the Application of Kerberos in Cloud Computing |
title_fullStr |
A Study on the Application of Kerberos in Cloud Computing |
title_full_unstemmed |
A Study on the Application of Kerberos in Cloud Computing |
title_sort |
study on the application of kerberos in cloud computing |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/69732649394026819542 |
work_keys_str_mv |
AT wanmingfeng astudyontheapplicationofkerberosincloudcomputing AT wànmíngfēng astudyontheapplicationofkerberosincloudcomputing AT wanmingfeng kerberosyīngyòngyúyúnduānyùnsuànzhīyánjiū AT wànmíngfēng kerberosyīngyòngyúyúnduānyùnsuànzhīyánjiū AT wanmingfeng studyontheapplicationofkerberosincloudcomputing AT wànmíngfēng studyontheapplicationofkerberosincloudcomputing |
_version_ |
1718086215128842240 |