Items with full text/Total items : 86525/115230 (75%)
Visitors : 23157752
Online Users : 537
Please use this identifier to cite or link to this item:
|Title: ||Authentication, Authorization and File Synchronization for Hybrid Cloud－The Development Centric to Google Apps, Hadoop and Linux Local Hosts|
Chiang ,Jonannes K.
|Keywords: ||Hybrid cloud;Information Security;Synchronization;Access right management;ACL (Access Control List)|
|Issue Date: ||2014-01-28 11:47:31 (UTC+8)|
|Abstract: ||With the benefit from public cloud, the SMBs are able to utilize their business information in lower cost but higher efficiency. Integrity between local storages and the clouds is a critical issue which often messes up the SMBs' digital assets in a hybrid cloud environment. The downside makes SMBs reluctant to embrace cloud technology, though they may benefit from it in the long-term. The drawback comes from two aspects: "the information chaos" and "the management crisis." The chaos originates from the possibility of information inconsistency among replicas in different places. The managerial crisis lies in the non-trustable access to the digital assets.This research aims to solve the Hybrid Cloud security control issues such as Identity Authentication as well as Access Right Authorization and consequent Synchronization of the file contents. The research refers to the de facto open standards, viz. OpenID and O'Auth to facilitate Account Authentication and Access Right Authorization etc for the Hybrid Cloud environment. The mechanisms are implemented for a cross-platform which encompasses Linux-based local hosts as well as MS-Windows-based computers, the private cloud based on Hadoop, and the Google Apps as the public cloud scenario. Users can launch the login from whatever a local host and then Google Apps, Facebook, etc., can deal with Access Right Permissions on the respective clouds. At last, we validate, according to CMMI, the functionality, reliability and integrity of the solutions to show the superiority and applicability of our approach.|
|Relation: ||Journal of Internet Technology (JIT), 14(7),1141-1148|
|Data Type: ||article|
|DOI 連結: ||http://dx.doi.org/10.6138/JIT.2013.14.7.13|
|Appears in Collections:||[資訊管理學系] 期刊論文|
Files in This Item:
All items in 政大典藏 are protected by copyright, with all rights reserved.