English  |  正體中文  |  简体中文  |  Items with full text/Total items : 88295/117812 (75%)
Visitors : 23405170      Online Users : 125
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 期刊論文 >  Item 140.119/63601
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/63601

    Title: Authentication, Authorization and File Synchronization for Hybrid Cloud-The Development Centric to Google Apps, Hadoop and Linux Local Hosts
    Authors: 姜國輝
    Chiang ,Jonannes K.
    Contributors: 資管系
    Keywords: Hybrid cloud;Information Security;Synchronization;Access right management;ACL (Access Control List)
    Date: 2013.09
    Issue Date: 2014-01-28 11:47:31 (UTC+8)
    Abstract: With the benefit from public cloud, the SMBs are able to utilize their business information in lower cost but higher efficiency. Integrity between local storages and the clouds is a critical issue which often messes up the SMBs' digital assets in a hybrid cloud environment. The downside makes SMBs reluctant to embrace cloud technology, though they may benefit from it in the long-term. The drawback comes from two aspects: "the information chaos" and "the management crisis." The chaos originates from the possibility of information inconsistency among replicas in different places. The managerial crisis lies in the non-trustable access to the digital assets.This research aims to solve the Hybrid Cloud security control issues such as Identity Authentication as well as Access Right Authorization and consequent Synchronization of the file contents. The research refers to the de facto open standards, viz. OpenID and O'Auth to facilitate Account Authentication and Access Right Authorization etc for the Hybrid Cloud environment. The mechanisms are implemented for a cross-platform which encompasses Linux-based local hosts as well as MS-Windows-based computers, the private cloud based on Hadoop, and the Google Apps as the public cloud scenario. Users can launch the login from whatever a local host and then Google Apps, Facebook, etc., can deal with Access Right Permissions on the respective clouds. At last, we validate, according to CMMI, the functionality, reliability and integrity of the solutions to show the superiority and applicability of our approach.
    Relation: Journal of Internet Technology (JIT), 14(7),1141-1148
    Data Type: article
    DOI 連結: http://dx.doi.org/10.6138/JIT.2013.14.7.13
    DOI: 10.6138/JIT.2013.14.7.13
    Appears in Collections:[資訊管理學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    11411148.pdf1307KbAdobe PDF804View/Open

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback