學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 混合雲之帳號與檔案內容權限管理與同步系統之實作-以Google Docs及Hadoop為例
Developing account and file synchronization in hybrid cloud platform-on example of google docs, hadoop and local hosts
作者 翁雋傑
貢獻者 姜國輝
翁雋傑
關鍵詞 雲端運算
混合雲
公有雲
資訊安全
檔案同步
檔案權限管理
Cloud Computing
Hybrid cloud
Public Cloud
Information Security
File Synchronization
Account Synchronization
Permission Management
日期 2011
上傳時間 4-Sep-2013 17:00:23 (UTC+8)
摘要 繼網際網路蓬勃發展後,人們的工作與生活更為便利。雲端運算問世之後,更多企業與個人將雲端運算做資料備份與發佈的平台。企業使用雲端的方式有以下三種:即公有雲、私有雲及混合雲。企業使用公有雲(Public Cloud)將服務與資料儲存交由雲端提供商託管,例如使用Google Docs、G-mail,以減少企業內部的成本。企業亦可建置私有雲(Private Cloud),以提供檔案備援與內部服務。另外,企業可結合公有雲與私有雲以構成混合雲(Hybrid Cloud),即使用公有雲儲存敏感度不高之資料並將敏感度較高的資料存至私有雲或本地端。
本研究將探討企業在使用混合雲時遇到的帳號以及檔案內容與授權問題,實作上公有雲應用服務以Google Docs為例、私有雲以Hadoop為例、本地端則以Linux-base電腦為例。本研究使用開放標準OpenID 與O’Auth達到對公有雲的帳號認證、檔案授權,以開發出一個跨本地端電腦或私有雲與公有雲帳號與檔案內容權限之管理與同步系統。本系統可解決在公有雲、私有雲與企業內部系統多重帳號的困擾與企業人員外部存取與內部存取時的權限不足或檔案版本不同的問題。
Drawing on the rapidly growing Internet technology, people now work and live in a more convenient way. Due to the progress of cloud computing, more and more companies as well as people are using cloud computing as a platform in order to backup and publish data.
There are three ways that how enterprises deploy cloud computing: public cloud, private cloud and hybrid cloud. In order to reduce costs, enterprises now days store their data using public cloud and entrust to the public cloud providers, such as using Google Docs, G-mail. Enterprises can also build private clouds to provide files and internal services backup. In addition, enterprises are able to combine public cloud and private cloud into hybrid cloud. We are used to store less sensitive data on the public cloud, while using private cloud or local storage to store highly sensitive data.
This study aims to design a system that can solve the problems regarding authentication, file content synchronization and authorization, while enterprises benefit by using hybrid cloud storage. System is designed by taking Google Docs as an example for the public cloud, Hadoop as the example for private cloud, and Linux-base computer as an example for local storage. This research addresses the open standard, namely: “OpenID” and “O’Auth”, in order to solve data content and non-consistency permission between public cloud, private cloud and local hosts.
參考文獻 中文參考資料
[1] 王唯達, “SaaS雲端運算之分散式異質資源整合與研究:以台灣文學館電子資源整合查詢為例”. 國立臺南大學資訊工程學系碩士論文, 2010/07.
[2] 王贊鑌, “具覺察節點能力之製程平行模擬機制”. 國立高雄第一科技大學系統資訊與控制研究所碩士論文,2009/07.
[3] 伍思霖, “雲端運算環境之高品質多媒體服務設計”. 國立東華大學資訊工程學系碩士論文, 2010/06.
[4] 胡志凱, “雲端運算中動態調整虛擬機器運算資源機制”. 大同大學資訊工程研究所碩士論文, 2010/07.
[5] 許來國, “整合OpenID與RIA技術之軟體工程線上考試系統”,國立中央大學資訊工程碩士論文,2010/07.
[6] 陳秉祥, “雲端運算-以蛋白質欽源分析應用為例”, 崑山科技大學資訊管理所碩士論文, 2010/06.
[7] 黃勝榮, “基於雲端服務之公文線上簽核資安偵測系統”, 國立高雄應用科技大學電子工程研究所碩士論文, 2010/06.
[8] 劉家驊、洪士凱, “雲端運算資料安全防護機制之研究”. Proc. of the 2010 Conference on Computer Vision, Image Processing and Information Technology,Ching Yun University, Zhongli, Jun. 9, 2010.
[9] 姜國輝、翁雋傑, “以資訊安全為主的雲端檔案權限管理與同步化之研究”. 國科會成果報告, 2010.

英文參考資料
[10] “Cloud Computing”, Library Technology Reports. Chicago: May/Jun 2009. Vol. 45, Iss. 4; p. 10 (3 pages).
[11] “report cites privacy concerns in cloud computing”, Newsletter on Intellectual Freedom. Chicago: May 2009. Vol. 58, Iss. 3; p. 74 (3 pages).
[12] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems" ,ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009.
[13] Chen-Pu Lin, “P2P Blog System with OpenID Integration”, Institute of Computer Science and Engineering, National Chiao Tung University, 2008 June.
[14] Harry Katzan Jr, “On The Privacy Of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1 (12 pages).
[15] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.
[16] Ling Qian, Zhiguo Luo, Yujian Du and Leitao Guo, “Cloud Computing: An Overview”, Lecture Notes in Computer Science, 2009, Volume 5931/2009, 626-631, DOI: 10.1007/978-3-642-10665-1_63.
[17] Peter Mell, Tim Grance, “NIST Definition of Cloud Computing v15”, National Institute of Standards and Technology, Information Technology Laboratory.
[18] Qi Zhang, Lu Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications Volume 1, Number 1, 7-18, DOI: 10.1007/s13174-010-0007-6.
[19] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, “The Google File System”, Google: 2003.
[20] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22 (8 pages).
[21] Celesti, A., Tusa, F., Villari, M., Puliafito, A., “How to Enhance Cloud Architectures to Enable Cross-Federation”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, July 2010, p.337 – p.345.
[22] Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” , Lecture Notes in Computer Science, 2009, Volume 5931/2009, 157-166, DOI: 10.1007/978-3-642-10665-1_14.
描述 碩士
國立政治大學
資訊管理研究所
98356031
100
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0098356031
資料類型 thesis
dc.contributor.advisor 姜國輝zh_TW
dc.contributor.author (Authors) 翁雋傑zh_TW
dc.creator (作者) 翁雋傑zh_TW
dc.date (日期) 2011en_US
dc.date.accessioned 4-Sep-2013 17:00:23 (UTC+8)-
dc.date.available 4-Sep-2013 17:00:23 (UTC+8)-
dc.date.issued (上傳時間) 4-Sep-2013 17:00:23 (UTC+8)-
dc.identifier (Other Identifiers) G0098356031en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/60222-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊管理研究所zh_TW
dc.description (描述) 98356031zh_TW
dc.description (描述) 100zh_TW
dc.description.abstract (摘要) 繼網際網路蓬勃發展後,人們的工作與生活更為便利。雲端運算問世之後,更多企業與個人將雲端運算做資料備份與發佈的平台。企業使用雲端的方式有以下三種:即公有雲、私有雲及混合雲。企業使用公有雲(Public Cloud)將服務與資料儲存交由雲端提供商託管,例如使用Google Docs、G-mail,以減少企業內部的成本。企業亦可建置私有雲(Private Cloud),以提供檔案備援與內部服務。另外,企業可結合公有雲與私有雲以構成混合雲(Hybrid Cloud),即使用公有雲儲存敏感度不高之資料並將敏感度較高的資料存至私有雲或本地端。
本研究將探討企業在使用混合雲時遇到的帳號以及檔案內容與授權問題,實作上公有雲應用服務以Google Docs為例、私有雲以Hadoop為例、本地端則以Linux-base電腦為例。本研究使用開放標準OpenID 與O’Auth達到對公有雲的帳號認證、檔案授權,以開發出一個跨本地端電腦或私有雲與公有雲帳號與檔案內容權限之管理與同步系統。本系統可解決在公有雲、私有雲與企業內部系統多重帳號的困擾與企業人員外部存取與內部存取時的權限不足或檔案版本不同的問題。
zh_TW
dc.description.abstract (摘要) Drawing on the rapidly growing Internet technology, people now work and live in a more convenient way. Due to the progress of cloud computing, more and more companies as well as people are using cloud computing as a platform in order to backup and publish data.
There are three ways that how enterprises deploy cloud computing: public cloud, private cloud and hybrid cloud. In order to reduce costs, enterprises now days store their data using public cloud and entrust to the public cloud providers, such as using Google Docs, G-mail. Enterprises can also build private clouds to provide files and internal services backup. In addition, enterprises are able to combine public cloud and private cloud into hybrid cloud. We are used to store less sensitive data on the public cloud, while using private cloud or local storage to store highly sensitive data.
This study aims to design a system that can solve the problems regarding authentication, file content synchronization and authorization, while enterprises benefit by using hybrid cloud storage. System is designed by taking Google Docs as an example for the public cloud, Hadoop as the example for private cloud, and Linux-base computer as an example for local storage. This research addresses the open standard, namely: “OpenID” and “O’Auth”, in order to solve data content and non-consistency permission between public cloud, private cloud and local hosts.
en_US
dc.description.tableofcontents 致謝 I
中文摘要 II
Abstract III
目錄 i
表目錄 iv
圖目錄 v
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機 2
1-3 研究目的 3
1-4 研究流程 3
第二章 文獻探討 5
2-1 雲端運算 5
2-1.1 雲端運算類型 5
2-1.2 雲端運算種類 6
2-1.3 雲端運算之認證安全、授權控制與檔案同步等相關安全議題 8
2-2 Hadoop Distribute File Systems (HDFS) 12
2-3 VMware vShield 13
2-4 檔案系統與檔案權限 14
2-4.1 Google Docs帳號與檔案權限控管 14
2-4.2 Linux與Hadoop的檔案權限表達方式 16
2-4.3 權限同步的風險及問題 18
2-5 OpenID與O’Auth 19
2-5.1 OpenID 19
2-5.2 O’Auth 21
2-5.3 OpenID 與 O’Auth 之分際 22
2-6 小結 22
第三章 系統設計與架構 24
3-1 系統概述 24
3-2 系統環境 24
3-3 系統架構 25
3-4 系統帳號與各端帳號的管理及同步 26
3-5 系統流程 28
3-6 使用者特性 29
3-7 操作概念 29
3-8 研究限制 30
第四章 系統開發與實作 31
4-1 私有雲及本地端系統傳訊之方法 31
4-1.1 以Socket實作檔案同步 31
4-1.2 以AMQP實作檔案同步 32
4-2 系統身分認證之實作 33
4-2.1 使用者對系統註冊並認領帳號 33
4-2.2 使用者改變檔案內容之認證 33
4-3 系統與私有雲(Hadoop)及本地端檔案同步之實作 34
4-4 系統與公有雲(Google Docs)檔案同步之實作 35
4-5 權限同步之實作 37
第五章 系統測試 38
5-1 測試範圍 38
5-2 測試接受準則 38
5-3 測試環境 39
5-3.1 硬體規格 39
5-3.2 軟體規格 39
5-3.3 測試資料來源 40
5-4 測試方法 40
5-4.1 監控模組測試 40
5-4.2 身分認證模組之測試 42
5-4.3 檔案同步之測試 42
5-4.4 接受測試 43
5-5 測試結果與分析 44
5-5.1 測試結果 44
5-5.2 測試結果之建議 45
第六章 結論與未來展望 47
6-1 結論 47
6-2 未來展望 48
第七章 參考文獻 49
zh_TW
dc.format.extent 2377032 bytes-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0098356031en_US
dc.subject (關鍵詞) 雲端運算zh_TW
dc.subject (關鍵詞) 混合雲zh_TW
dc.subject (關鍵詞) 公有雲zh_TW
dc.subject (關鍵詞) 資訊安全zh_TW
dc.subject (關鍵詞) 檔案同步zh_TW
dc.subject (關鍵詞) 檔案權限管理zh_TW
dc.subject (關鍵詞) Cloud Computingen_US
dc.subject (關鍵詞) Hybrid clouden_US
dc.subject (關鍵詞) Public Clouden_US
dc.subject (關鍵詞) Information Securityen_US
dc.subject (關鍵詞) File Synchronizationen_US
dc.subject (關鍵詞) Account Synchronizationen_US
dc.subject (關鍵詞) Permission Managementen_US
dc.title (題名) 混合雲之帳號與檔案內容權限管理與同步系統之實作-以Google Docs及Hadoop為例zh_TW
dc.title (題名) Developing account and file synchronization in hybrid cloud platform-on example of google docs, hadoop and local hostsen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 中文參考資料
[1] 王唯達, “SaaS雲端運算之分散式異質資源整合與研究:以台灣文學館電子資源整合查詢為例”. 國立臺南大學資訊工程學系碩士論文, 2010/07.
[2] 王贊鑌, “具覺察節點能力之製程平行模擬機制”. 國立高雄第一科技大學系統資訊與控制研究所碩士論文,2009/07.
[3] 伍思霖, “雲端運算環境之高品質多媒體服務設計”. 國立東華大學資訊工程學系碩士論文, 2010/06.
[4] 胡志凱, “雲端運算中動態調整虛擬機器運算資源機制”. 大同大學資訊工程研究所碩士論文, 2010/07.
[5] 許來國, “整合OpenID與RIA技術之軟體工程線上考試系統”,國立中央大學資訊工程碩士論文,2010/07.
[6] 陳秉祥, “雲端運算-以蛋白質欽源分析應用為例”, 崑山科技大學資訊管理所碩士論文, 2010/06.
[7] 黃勝榮, “基於雲端服務之公文線上簽核資安偵測系統”, 國立高雄應用科技大學電子工程研究所碩士論文, 2010/06.
[8] 劉家驊、洪士凱, “雲端運算資料安全防護機制之研究”. Proc. of the 2010 Conference on Computer Vision, Image Processing and Information Technology,Ching Yun University, Zhongli, Jun. 9, 2010.
[9] 姜國輝、翁雋傑, “以資訊安全為主的雲端檔案權限管理與同步化之研究”. 國科會成果報告, 2010.

英文參考資料
[10] “Cloud Computing”, Library Technology Reports. Chicago: May/Jun 2009. Vol. 45, Iss. 4; p. 10 (3 pages).
[11] “report cites privacy concerns in cloud computing”, Newsletter on Intellectual Freedom. Chicago: May 2009. Vol. 58, Iss. 3; p. 74 (3 pages).
[12] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, "A Taxonomy and Survey of Cloud Computing Systems" ,ncm, pp.44-51, 2009 Fifth International Joint Conference on INC, IMS and IDC, 2009.
[13] Chen-Pu Lin, “P2P Blog System with OpenID Integration”, Institute of Computer Science and Engineering, National Chiao Tung University, 2008 June.
[14] Harry Katzan Jr, “On The Privacy Of Cloud Computing”, International Journal of Management and Information Systems. Littleton: Second Quarter 2010. Vol. 14, Iss. 2; p. 1 (12 pages).
[15] Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE DOI 10.1109/ICWS, 2009.
[16] Ling Qian, Zhiguo Luo, Yujian Du and Leitao Guo, “Cloud Computing: An Overview”, Lecture Notes in Computer Science, 2009, Volume 5931/2009, 626-631, DOI: 10.1007/978-3-642-10665-1_63.
[17] Peter Mell, Tim Grance, “NIST Definition of Cloud Computing v15”, National Institute of Standards and Technology, Information Technology Laboratory.
[18] Qi Zhang, Lu Cheng, Raouf Boutaba, “Cloud computing: state-of-the-art and research challenges”, Journal of Internet Services and Applications Volume 1, Number 1, 7-18, DOI: 10.1007/s13174-010-0007-6.
[19] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, “The Google File System”, Google: 2003.
[20] W Michael Ryan, Christopher M Loeffler, “Insights into Cloud Computing” Intellectual Property & Technology Law Journal. Clifton: Nov 2010. Vol. 22, Iss. 11; p. 22 (8 pages).
[21] Celesti, A., Tusa, F., Villari, M., Puliafito, A., “How to Enhance Cloud Architectures to Enable Cross-Federation”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, July 2010, p.337 – p.345.
[22] Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang, “Identity-Based Authentication for Cloud Computing” , Lecture Notes in Computer Science, 2009, Volume 5931/2009, 157-166, DOI: 10.1007/978-3-642-10665-1_14.
zh_TW