期刊文献+

云内部安全通信模型研究 被引量:2

Research of secure communication model for interior cloud
下载PDF
导出
摘要 云计算是互联网发展的趋势,也是物联网应用的重要技术支撑。随着云计算的深入应用,云计算安全问题成为最引人关注的焦点之一。在分析云计算一般框架结构的基础上,根据云计算服务器可统一管理的特点,针对云内部的通信安全问题设计了一种云内部简单安全通信模型(SSCMIC),通过同步密钥流实现密文通信,以增强云的安全性。 Cloud computing is the trend of development of the Internet,and the important technical support of Internet of things as well.As the application of cloud computing getting deeper,the security of cloud computing becomes one of the most significant problems.Based on the analysis of the common frame of the cloud computing and the characteristic of the uniform management for cloud computing services,this paper designs a Simple Secure Communication Model for Interior Cloud(SSCMIC) aiming at the security of the communications interior the cloud.This model uses synchronous stream of keys to actualize communication with cryptograph,in order to enhance the security of the cloud.
作者 王舒榕 宗平
出处 《计算机工程与应用》 CSCD 北大核心 2011年第10期60-62,66,共4页 Computer Engineering and Applications
基金 江苏省科技厅科技支撑项目(No.BE2009157)
关键词 云计算 安全通信 同步 cloud computing safe communication synchronization
  • 相关文献

参考文献6

  • 1Stephen B.Google and the wisdom of clouds[N].Business Week, 2007-12-13.
  • 2Vaquero L M, Rodero-Merino L, et al.A break in the clouds: Towards a cloud defmition[J].ACM SIGCOMM Computer Communication Review, 2009,39( 1 ) : 50-55.
  • 3陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1310
  • 4Thomas C.Google and IBM partner to push cloud computing[N]. Information Week,2007-08-08.
  • 5Survey: Cloud computing "No Hype", but fear of security and control slowing adoption[EB/OL].http://www.circleid.com/posts/ 20090226_cloud._computing._hypc_security/.
  • 6Hwang K, Li D.Trusted cloud computing with secure resources and data coloring[J].Intemet Computing,2010(14) : 14-22.

二级参考文献29

  • 1Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 2Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 3Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 4Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 5Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 6Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 7Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 8Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 9Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.
  • 10Chang F, Dean J, Ghemawat S, Hsieh WC, Wallach DA, Burrows M, Chandra T, Fikes A, Gruber RE. Bigtable: A distributed storage system for structured data. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 205-218.

共引文献1309

同被引文献17

  • 1张学旺,唐贤伦.MD5算法及其在文件系统完整性保护中的应用[J].计算机应用,2003,23(z2):430-432. 被引量:20
  • 2张洪娜.云计算平台中数据存储与文件管理的研究[D].广东工业大学硕士学位论文,201l,5.
  • 3Richard Spillman. Classical and contemporary cryptology[M]. Tsinghua University Press, 2005.
  • 4Jay Heiser and Mark Nicolett. Assessing the Security Risks of Cloud Computing. 3 June 2008.
  • 5Xu CZ. Interactive Dynamic Load Balancing in Multicomputers. Journal of operational Research Society, 2004, 45 (7): 786-796.
  • 6A. Barak,A. Shiloh. The MOSIX2 Management System for Linux Clusters and Multi-Cluster Organizational Grids, 2007 : 1-8.
  • 7MUTTIK I, BARTON C. Cloud security technologies[J]. Information Security Technical Report, 2009,14 (1): 1-6.
  • 8段钢.加密与解密[M].北京:电子工业出版社,2000.
  • 9马光志,龚小翔.基于对等组的P2P安全通信机制[J].计算机应用研究,2007,24(12):186-188. 被引量:4
  • 10邹阿金,肖秀春.基于混沌控制系统的神经网络异步加密[J].计算机工程,2008,34(12):160-161. 被引量:7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部