Skip navigation
Run Run Shaw Library City University of Hong KongRun Run Shaw Library

Please use this identifier to cite or link to this item: http://dspace.cityu.edu.hk/handle/2031/6351
Title: Mobile Client for Cloud Computing Platform
Authors: Chu, Sai Kit
Department: Department of Electronic Engineering
Issue Date: 2011
Supervisor: Supervisor: Dr. Cheng, L M; Assessor: Dr. Lau, W H
Abstract: Nowadays, the cloud computing technology brings a lot of advantages to the enterprises and organizations. In addition, the smart phones are popular, easy to use and acceptable in the society, e.g. iPhone, Android, Windows Mobile and etc. With these advantages, using smart phone and handheld devices to fetch information from cloud computing platform is a trend. No more application installs into these devices in the future, they only need to connect to the Internet to get applications. But there are some security problems when these devices access to the cloud computing platform, such as no data encryption, authentication for user and privilege control. The project aims to emulate the problems in the environment when users connect to the access control system and use different approaches to enhance the higher security level. The project is mainly considered the security which is great concern for the business. So, there are three methods used in the project to solve the security problems. The information is encrypted using Secure Sockets Layer (SSL) protocol. And, Lightweight Directory Access Protocol (LDAP) server is installed in the Linux system to provide authentication for users. Finally, privilege control on the MySQL server authorizes users with different permissions to access system resources. A mobile application running on iPhone is developed; it can monitor the access control system and create new users for the access control system. Moreover, it can also control the door operation through the middleware. The OpenLDAP, MySQL, Java-based middleware are also configured on cloud computing platform for emulation. Finally, the security problems are solved by these three methods.
Appears in Collections:Electrical Engineering - Undergraduate Final Year Projects 

Files in This Item:
File SizeFormat 
fulltext.html146 BHTMLView/Open
Show full item record


Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.

Send feedback to Library Systems
Privacy Policy | Copyright | Disclaimer