A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation
博士 === 大同大學 === 資訊工程學系(所) === 102 === Services provided over the Internet are permeated with a number of risks, including system intrusion under false identification, theft of sensitive and private data, and sniffing of data in transmission, just to name a few. Meanwhile, issues such as data isolati...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/89129510239886273965 |
id |
ndltd-TW-102TTU05392007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102TTU053920072016-02-21T04:20:47Z http://ndltd.ncl.edu.tw/handle/89129510239886273965 A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation 雲端環境中資料安全存取模型及其績效評估 Yong-Kuei Liu 劉用貴 博士 大同大學 資訊工程學系(所) 102 Services provided over the Internet are permeated with a number of risks, including system intrusion under false identification, theft of sensitive and private data, and sniffing of data in transmission, just to name a few. Meanwhile, issues such as data isolation and access efficiency in the cloud environment are yet to be resolved. This explains the sustained reservation of businesses over cloud-based services or applications. Users of cloud computing are most concerned with whether cloud providers have the capacity to secure clients’ data and prevent access to or damage of data by unauthorized users. This research proposes a new method to prevent potential risks related to cloud access by creating a “secure data access model for cloud environment”, designed to make access to distributed database more secure and efficient. The model incorporates active identity authentication, secure isolation and data exchange, prioritized multi-level scheduling control, distributed access and encryption/decryption technologies. With this model, users must pass private cloud active authentication before receiving an authorization code. Users’ data will be encrypted and sent to an independent channel for secure isolation and data exchange before users can enter the private cloud and be granted access rights for transaction. Prioritized multi-level secure scheduling for secure distributed data access is recommended to boost transaction efficiency. We upgraded Altruistic Locking (AL) to Prioritized AL. We discussed its nature and proved that Prioritized AL-based scheduling can be serialized. Experiments show that scheduling policy increases the efficiency of access to distributed databases. The combination and simulation of priority and multi-level security through views can achieve secure data access. The results of this research indicate that control of the “read” function is the premise of good access control and the solution to most threats of improper access, and good scheduling serialization of the “write” function is an effective way to prevent deadlocks. This research reveals that this secure data access architecture in the cloud environment is effective in preventing unauthorized access, improving transaction concurrency, and promoting data access efficiency. Experiments of this research show active authentication in the private cloud and secure isolation are able to seclude threats from the public cloud; prioritized multi-level security in combination with distributed database facilitates faster and more effective transaction through AL, reducing the time to commit transactions and rollbacks and preventing deadlocks. Based on the comparison between two experiment groups, Prioritized AL proves to perform better than conventional two-phase locking, and AL as the scheduling mechanism is able to achieve better efficiency. The usability of the architecture proposed in this research is therefore evident. Prof. Patrick S. Chen 陳志誠 2014 學位論文 ; thesis 115 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
博士 === 大同大學 === 資訊工程學系(所) === 102 === Services provided over the Internet are permeated with a number of risks, including system intrusion under false identification, theft of sensitive and private data, and sniffing of data in transmission, just to name a few. Meanwhile, issues such as data isolation and access efficiency in the cloud environment are yet to be resolved. This explains the sustained reservation of businesses over cloud-based services or applications. Users of cloud computing are most concerned with whether cloud providers have the capacity to secure clients’ data and prevent access to or damage of data by unauthorized users.
This research proposes a new method to prevent potential risks related to cloud access by creating a “secure data access model for cloud environment”, designed to make access to distributed database more secure and efficient. The model incorporates active identity authentication, secure isolation and data exchange, prioritized multi-level scheduling control, distributed access and encryption/decryption technologies. With this model, users must pass private cloud active authentication before receiving an authorization code. Users’ data will be encrypted and sent to an independent channel for secure isolation and data exchange before users can enter the private cloud and be granted access rights for transaction.
Prioritized multi-level secure scheduling for secure distributed data access is recommended to boost transaction efficiency. We upgraded Altruistic Locking (AL) to Prioritized AL. We discussed its nature and proved that Prioritized AL-based scheduling can be serialized. Experiments show that scheduling policy increases the efficiency of access to distributed databases. The combination and simulation of priority and multi-level security through views can achieve secure data access. The results of this research indicate that control of the “read” function is the premise of good access control and the solution to most threats of improper access, and good scheduling serialization of the “write” function is an effective way to prevent deadlocks.
This research reveals that this secure data access architecture in the cloud environment is effective in preventing unauthorized access, improving transaction concurrency, and promoting data access efficiency. Experiments of this research show active authentication in the private cloud and secure isolation are able to seclude threats from the public cloud; prioritized multi-level security in combination with distributed database facilitates faster and more effective transaction through AL, reducing the time to commit transactions and rollbacks and preventing deadlocks. Based on the comparison between two experiment groups, Prioritized AL proves to perform better than conventional two-phase locking, and AL as the scheduling mechanism is able to achieve better efficiency. The usability of the architecture proposed in this research is therefore evident.
|
author2 |
Prof. Patrick S. Chen |
author_facet |
Prof. Patrick S. Chen Yong-Kuei Liu 劉用貴 |
author |
Yong-Kuei Liu 劉用貴 |
spellingShingle |
Yong-Kuei Liu 劉用貴 A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
author_sort |
Yong-Kuei Liu |
title |
A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
title_short |
A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
title_full |
A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
title_fullStr |
A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
title_full_unstemmed |
A Secure Data Access Model in Cloud Computing Environment and Its Performance Evaluation |
title_sort |
secure data access model in cloud computing environment and its performance evaluation |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/89129510239886273965 |
work_keys_str_mv |
AT yongkueiliu asecuredataaccessmodelincloudcomputingenvironmentanditsperformanceevaluation AT liúyòngguì asecuredataaccessmodelincloudcomputingenvironmentanditsperformanceevaluation AT yongkueiliu yúnduānhuánjìngzhōngzīliàoānquáncúnqǔmóxíngjíqíjīxiàopínggū AT liúyòngguì yúnduānhuánjìngzhōngzīliàoānquáncúnqǔmóxíngjíqíjīxiàopínggū AT yongkueiliu securedataaccessmodelincloudcomputingenvironmentanditsperformanceevaluation AT liúyòngguì securedataaccessmodelincloudcomputingenvironmentanditsperformanceevaluation |
_version_ |
1718193182105141248 |