CityU Institutional Repository >
4_Student Final Year Projects >
Electronic Engineering - Undergraduate Final Year Projects >
Please use this identifier to cite or link to this item:
|Title: ||Mobile Client for Cloud Computing Platform|
|Authors: ||Chu, Sai Kit|
|Department: ||Department of Electronic Engineering|
|Issue Date: ||2011|
|Supervisor: ||Supervisor: Dr. Cheng, L M; Assessor: Dr. Lau, W H|
|Abstract: ||Nowadays, the cloud computing technology brings a lot of advantages to the enterprises and organizations. In addition, the smart phones are popular, easy to use and acceptable in the society, e.g. iPhone, Android, Windows Mobile and etc. With these advantages, using smart phone and handheld devices to fetch information from cloud computing platform is a trend. No more application installs into these devices in the future, they only need to connect to the Internet to get applications.
But there are some security problems when these devices access to the cloud computing platform, such as no data encryption, authentication for user and privilege control.
The project aims to emulate the problems in the environment when users connect to the access control system and use different approaches to enhance the higher security level.
The project is mainly considered the security which is great concern for the business. So, there are three methods used in the project to solve the security problems. The information is encrypted using Secure Sockets Layer (SSL) protocol. And, Lightweight Directory Access Protocol (LDAP) server is installed in the Linux system to provide authentication for users. Finally, privilege control on the MySQL server authorizes users with different permissions to access system resources. A mobile application running on iPhone is developed; it can monitor the access control system and create new users for the access control system. Moreover, it can also control the door operation through the middleware. The OpenLDAP, MySQL, Java-based middleware are also configured on cloud computing platform for emulation. Finally, the security problems are solved by these three methods.|
|Appears in Collections:||Electronic Engineering - Undergraduate Final Year Projects|
Items in CityU IR are protected by copyright, with all rights reserved, unless otherwise indicated.