English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113160/144130 (79%)
Visitors : 50754865      Online Users : 528
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/60222
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/60222


    Title: 混合雲之帳號與檔案內容權限管理與同步系統之實作-以Google Docs及Hadoop為例
    Developing account and file synchronization in hybrid cloud platform-on example of google docs, hadoop and local hosts
    Authors: 翁雋傑
    Contributors: 姜國輝
    翁雋傑
    Keywords: 雲端運算
    混合雲
    公有雲
    資訊安全
    檔案同步
    檔案權限管理
    Cloud Computing
    Hybrid cloud
    Public Cloud
    Information Security
    File Synchronization
    Account Synchronization
    Permission Management
    Date: 2011
    Issue Date: 2013-09-04 17:00:23 (UTC+8)
    Abstract: 繼網際網路蓬勃發展後,人們的工作與生活更為便利。雲端運算問世之後,更多企業與個人將雲端運算做資料備份與發佈的平台。企業使用雲端的方式有以下三種:即公有雲、私有雲及混合雲。企業使用公有雲(Public Cloud)將服務與資料儲存交由雲端提供商託管,例如使用Google Docs、G-mail,以減少企業內部的成本。企業亦可建置私有雲(Private Cloud),以提供檔案備援與內部服務。另外,企業可結合公有雲與私有雲以構成混合雲(Hybrid Cloud),即使用公有雲儲存敏感度不高之資料並將敏感度較高的資料存至私有雲或本地端。
    本研究將探討企業在使用混合雲時遇到的帳號以及檔案內容與授權問題,實作上公有雲應用服務以Google Docs為例、私有雲以Hadoop為例、本地端則以Linux-base電腦為例。本研究使用開放標準OpenID 與O’Auth達到對公有雲的帳號認證、檔案授權,以開發出一個跨本地端電腦或私有雲與公有雲帳號與檔案內容權限之管理與同步系統。本系統可解決在公有雲、私有雲與企業內部系統多重帳號的困擾與企業人員外部存取與內部存取時的權限不足或檔案版本不同的問題。
    Drawing on the rapidly growing Internet technology, people now work and live in a more convenient way. Due to the progress of cloud computing, more and more companies as well as people are using cloud computing as a platform in order to backup and publish data.
    There are three ways that how enterprises deploy cloud computing: public cloud, private cloud and hybrid cloud. In order to reduce costs, enterprises now days store their data using public cloud and entrust to the public cloud providers, such as using Google Docs, G-mail. Enterprises can also build private clouds to provide files and internal services backup. In addition, enterprises are able to combine public cloud and private cloud into hybrid cloud. We are used to store less sensitive data on the public cloud, while using private cloud or local storage to store highly sensitive data.
    This study aims to design a system that can solve the problems regarding authentication, file content synchronization and authorization, while enterprises benefit by using hybrid cloud storage. System is designed by taking Google Docs as an example for the public cloud, Hadoop as the example for private cloud, and Linux-base computer as an example for local storage. This research addresses the open standard, namely: “OpenID” and “O’Auth”, in order to solve data content and non-consistency permission between public cloud, private cloud and local hosts.
    Reference: 中文參考資料
    [1] 王唯達, “SaaS雲端運算之分散式異質資源整合與研究:以台灣文學館電子資源整合查詢為例”. 國立臺南大學資訊工程學系碩士論文, 2010/07.
    [2] 王贊鑌, “具覺察節點能力之製程平行模擬機制”. 國立高雄第一科技大學系統資訊與控制研究所碩士論文,2009/07.
    [3] 伍思霖, “雲端運算環境之高品質多媒體服務設計”. 國立東華大學資訊工程學系碩士論文, 2010/06.
    [4] 胡志凱, “雲端運算中動態調整虛擬機器運算資源機制”. 大同大學資訊工程研究所碩士論文, 2010/07.
    [5] 許來國, “整合OpenID與RIA技術之軟體工程線上考試系統”,國立中央大學資訊工程碩士論文,2010/07.
    [6] 陳秉祥, “雲端運算-以蛋白質欽源分析應用為例”, 崑山科技大學資訊管理所碩士論文, 2010/06.
    [7] 黃勝榮, “基於雲端服務之公文線上簽核資安偵測系統”, 國立高雄應用科技大學電子工程研究所碩士論文, 2010/06.
    [8] 劉家驊、洪士凱, “雲端運算資料安全防護機制之研究”. Proc. of the 2010 Conference on Computer Vision, Image Processing and Information Technology,Ching Yun University, Zhongli, Jun. 9, 2010.
    [9] 姜國輝、翁雋傑, “以資訊安全為主的雲端檔案權限管理與同步化之研究”. 國科會成果報告, 2010.

    英文參考資料
    [10] “Cloud Computing”, Library Technology Reports. Chicago: May/Jun 2009. Vol. 45, Iss. 4; p. 10 (3 pages).
    [11] “report cites privacy concerns in cloud computing”, Newsletter on Intellectual Freedom. Chicago: May 2009. Vol. 58, Iss. 3; p. 74 (3 pages).
    [12] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems" ,ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009.
    [13] Chen-Pu Lin, “P2P Blog System with OpenID Integration”, Institute of Computer Science and Engineering, National Chiao Tung University, 2008 June.
    [14] Harry Katzan Jr, “On The Privacy Of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1 (12 pages).
    [15] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.
    [16] Ling Qian, Zhiguo Luo, Yujian Du and Leitao Guo, “Cloud Computing: An Overview”, Lecture Notes in Computer Science, 2009, Volume 5931/2009, 626-631, DOI: 10.1007/978-3-642-10665-1_63.
    [17] Peter Mell, Tim Grance, “NIST Definition of Cloud Computing v15”, National Institute of Standards and Technology, Information Technology Laboratory.
    [18] Qi Zhang, Lu Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications Volume 1, Number 1, 7-18, DOI: 10.1007/s13174-010-0007-6.
    [19] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, “The Google File System”, Google: 2003.
    [20] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22 (8 pages).
    [21] Celesti, A., Tusa, F., Villari, M., Puliafito, A., “How to Enhance Cloud Architectures to Enable Cross-Federation”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, July 2010, p.337 – p.345.
    [22] Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” , Lecture Notes in Computer Science, 2009, Volume 5931/2009, 157-166, DOI: 10.1007/978-3-642-10665-1_14.
    Description: 碩士
    國立政治大學
    資訊管理研究所
    98356031
    100
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0098356031
    Data Type: thesis
    Appears in Collections:[資訊管理學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    603101.pdf2321KbAdobe PDF2653View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback