Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/60222
|
Title: | 混合雲之帳號與檔案內容權限管理與同步系統之實作-以Google Docs及Hadoop為例 Developing account and file synchronization in hybrid cloud platform-on example of google docs, hadoop and local hosts |
Authors: | 翁雋傑 |
Contributors: | 姜國輝 翁雋傑 |
Keywords: | 雲端運算 混合雲 公有雲 資訊安全 檔案同步 檔案權限管理 Cloud Computing Hybrid cloud Public Cloud Information Security File Synchronization Account Synchronization Permission Management |
Date: | 2011 |
Issue Date: | 2013-09-04 17:00:23 (UTC+8) |
Abstract: | 繼網際網路蓬勃發展後,人們的工作與生活更為便利。雲端運算問世之後,更多企業與個人將雲端運算做資料備份與發佈的平台。企業使用雲端的方式有以下三種:即公有雲、私有雲及混合雲。企業使用公有雲(Public Cloud)將服務與資料儲存交由雲端提供商託管,例如使用Google Docs、G-mail,以減少企業內部的成本。企業亦可建置私有雲(Private Cloud),以提供檔案備援與內部服務。另外,企業可結合公有雲與私有雲以構成混合雲(Hybrid Cloud),即使用公有雲儲存敏感度不高之資料並將敏感度較高的資料存至私有雲或本地端。 本研究將探討企業在使用混合雲時遇到的帳號以及檔案內容與授權問題,實作上公有雲應用服務以Google Docs為例、私有雲以Hadoop為例、本地端則以Linux-base電腦為例。本研究使用開放標準OpenID 與O’Auth達到對公有雲的帳號認證、檔案授權,以開發出一個跨本地端電腦或私有雲與公有雲帳號與檔案內容權限之管理與同步系統。本系統可解決在公有雲、私有雲與企業內部系統多重帳號的困擾與企業人員外部存取與內部存取時的權限不足或檔案版本不同的問題。 Drawing on the rapidly growing Internet technology, people now work and live in a more convenient way. Due to the progress of cloud computing, more and more companies as well as people are using cloud computing as a platform in order to backup and publish data. There are three ways that how enterprises deploy cloud computing: public cloud, private cloud and hybrid cloud. In order to reduce costs, enterprises now days store their data using public cloud and entrust to the public cloud providers, such as using Google Docs, G-mail. Enterprises can also build private clouds to provide files and internal services backup. In addition, enterprises are able to combine public cloud and private cloud into hybrid cloud. We are used to store less sensitive data on the public cloud, while using private cloud or local storage to store highly sensitive data. This study aims to design a system that can solve the problems regarding authentication, file content synchronization and authorization, while enterprises benefit by using hybrid cloud storage. System is designed by taking Google Docs as an example for the public cloud, Hadoop as the example for private cloud, and Linux-base computer as an example for local storage. This research addresses the open standard, namely: “OpenID” and “O’Auth”, in order to solve data content and non-consistency permission between public cloud, private cloud and local hosts. |
Reference: | 中文參考資料 [1] 王唯達, “SaaS雲端運算之分散式異質資源整合與研究:以台灣文學館電子資源整合查詢為例”. 國立臺南大學資訊工程學系碩士論文, 2010/07. [2] 王贊鑌, “具覺察節點能力之製程平行模擬機制”. 國立高雄第一科技大學系統資訊與控制研究所碩士論文,2009/07. [3] 伍思霖, “雲端運算環境之高品質多媒體服務設計”. 國立東華大學資訊工程學系碩士論文, 2010/06. [4] 胡志凱, “雲端運算中動態調整虛擬機器運算資源機制”. 大同大學資訊工程研究所碩士論文, 2010/07. [5] 許來國, “整合OpenID與RIA技術之軟體工程線上考試系統”,國立中央大學資訊工程碩士論文,2010/07. [6] 陳秉祥, “雲端運算-以蛋白質欽源分析應用為例”, 崑山科技大學資訊管理所碩士論文, 2010/06. [7] 黃勝榮, “基於雲端服務之公文線上簽核資安偵測系統”, 國立高雄應用科技大學電子工程研究所碩士論文, 2010/06. [8] 劉家驊、洪士凱, “雲端運算資料安全防護機制之研究”. Proc. of the 2010 Conference on Computer Vision, Image Processing and Information Technology,Ching Yun University, Zhongli, Jun. 9, 2010. [9] 姜國輝、翁雋傑, “以資訊安全為主的雲端檔案權限管理與同步化之研究”. 國科會成果報告, 2010. 英文參考資料 [10] “Cloud Computing”, Library Technology Reports. Chicago: May/Jun 2009. Vol. 45, Iss. 4; p. 10 (3 pages). [11] “report cites privacy concerns in cloud computing”, Newsletter on Intellectual Freedom. Chicago: May 2009. Vol. 58, Iss. 3; p. 74 (3 pages). [12] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems" ,ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009. [13] Chen-Pu Lin, “P2P Blog System with OpenID Integration”, Institute of Computer Science and Engineering, National Chiao Tung University, 2008 June. [14] Harry Katzan Jr, “On The Privacy Of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1 (12 pages). [15] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009. [16] Ling Qian, Zhiguo Luo, Yujian Du and Leitao Guo, “Cloud Computing: An Overview”, Lecture Notes in Computer Science, 2009, Volume 5931/2009, 626-631, DOI: 10.1007/978-3-642-10665-1_63. [17] Peter Mell, Tim Grance, “NIST Definition of Cloud Computing v15”, National Institute of Standards and Technology, Information Technology Laboratory. [18] Qi Zhang, Lu Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications Volume 1, Number 1, 7-18, DOI: 10.1007/s13174-010-0007-6. [19] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, “The Google File System”, Google: 2003. [20] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22 (8 pages). [21] Celesti, A., Tusa, F., Villari, M., Puliafito, A., “How to Enhance Cloud Architectures to Enable Cross-Federation”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, July 2010, p.337 – p.345. [22] Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” , Lecture Notes in Computer Science, 2009, Volume 5931/2009, 157-166, DOI: 10.1007/978-3-642-10665-1_14. |
Description: | 碩士 國立政治大學 資訊管理研究所 98356031 100 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0098356031 |
Data Type: | thesis |
Appears in Collections: | [資訊管理學系] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
603101.pdf | | 2321Kb | Adobe PDF2 | 653 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|