English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46833/50693 (92%)
造訪人次 : 11843878      線上人數 : 448
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/27949


    題名: Kerberos應用於雲端運算之研究
    A Study on the Application of Kerberos in Cloud Computing
    作者: 萬明峰
    Wan, Ming-Feng
    貢獻者: 機械工程學系數位機電碩士班
    關鍵詞: 雲端運算
    資訊安全
    Cloud Computing
    Hadoop
    Kerberos
    日期: 2014-06
    上傳時間: 2014-09-04 10:28:30 (UTC+8)
    摘要: 近年來雲端運算之應用已成為趨勢,一些知名的雲端平台諸如Google App Engine、Yahoo Application Platform或Amazon Web Service皆是以Hadoop為發展雲端平台的基礎,Hadoop是依據Google發表的MapReduce所實作的分散式雲端系統,它是一個開源、且以Java為基礎的軟體框架,支援在分散式計算環境中處理大量的資料集。因此,人們可以輕易架設自己的私有雲以執行分散式運算,然而當雲端運算的使用變得很方便時,資訊安全顯得更重要。本論文即著眼於此,主要是在Hadoop操作平台之基礎上,考量安全性之需求而設計一具增強使用者身份鑑別(認證)機制之系統。
    本論文實驗系統係架構於Linux作業系統平台之上,再以Linux KVM(Kernel-based Virtual Machine)模擬多台電腦之雲端環境,並於此系統上使用Hadoop之雲端運算軟體。其後,再結合Kerberos第5版鑑別機制以模擬與實作雲端平台之使用者身分驗證系統以達到安全性之要求,實驗結果驗證確屬可行並具實用價值。

    Recently, the applications of cloud computing have become a trend. Some of well-known cloud platforms such as Google App Engine, Yahoo Application Platform and Amazon web Service are based on Hadoop software inspired by Google's MapReduce. Hadoop is a free, Java-based programming framework that supports the processing of large data sets in a distributed computing environment. Because it’s an open source, people can build a private cloud to perform distributed computing. However, as the use of cloud computing becomes very convenient, information security is more important. In order to provide secure utilization of Hadoop, an identification authentication scheme has been proposed in this study.
    To experiment on our proposed scheme, Linux operating system has been adopted as the platform in this study. It is implemented based on Linux KVM(Kernel-based Virtual Machine) to simulate cloud computing with multi-clients system. In the system, Hadoop is used as a cloud computing platform. After then, Kerberos 5 has been implemented on this system for performing authentication of users’ identification. In order to provide assurance of information security, some analysis is performed based on the implemented cloud computing system. The enhancement of information security is also proposed to remedy the shortcoming of the implemented cloud computing system. Experimental results demonstrate the feasibility of our proposed scheme and it is validated for physical applications.
    顯示於類別:[機械工程系暨機械工程學系數位機電研究所] 博碩士論文

    文件中的檔案:

    沒有與此文件相關的檔案.



    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋