期刊文献+

一种云安全架构的解决方案 被引量:2

A Solution of the cloud Security Architecture
原文传递
导出
摘要 本文提出了一种云安全解决方法,是采用对称加密算法、组合密钥技术和加密芯片硬件设备来建立一个云计算的安全架构,与其他云安全解决方案相比,本云安全系统的安全等级较高,安全功能较强,能保证客户端与云计算平台之间的数据保密和完整性传输,保证云用户的程序运行安全和数据存储安全,实现云用户登录实名制,且满足规模化用户安全、快速登录,同时,能降低云安全系统的建设和维护成本。 a new solution of cloud security is proposed in this paper.It is used the security architecture of cloud computing based on symmetric encryption algorithm,combination key technology and encryption chip hardware.Compared with other cloud security solution,there are some advantages.The security level is higher.The security function is stronger.It is ensured the data is security and integrity transmission.It is guaranteed the security of program running and data storage of client.The real name and rapid login of user is realized,at the same time,the construction and maintenance costs of cloud security system are reduced.
出处 《网络安全技术与应用》 2011年第10期18-21,共4页 Network Security Technology & Application
关键词 身份认证 登录日志 组合密钥算法 对称加密算法 网闸 authentication login log combination key algorithm symmetric encryption algorithm gatekeeper
  • 相关文献

参考文献9

  • 1胡祥义.一种安全高效网络用户身份鉴别的方法.2009.
  • 2胡祥义.一种建立基于动态加密算法的VPN系统的方法.2008.
  • 3胡祥义.基于组合密钥的数字签名方法.2011.
  • 4胡祥义,赵桂芬.A CSK-based Solution for Person Authentication.The Seventh Wuhan International Conference on E-Business: Unlocking the Full Potential of Global Technology[C].2008.
  • 5胡祥义,李岩.对称密码技术在网络认证系统中的应用[J].网络安全技术与应用,2007(3):86-87. 被引量:5
  • 6南相浩.2005信息安全步入“信任”时代[J].计算机世界,2005,.
  • 7胡祥义,赵桂芬,徐冠宁..Hu Xiangyi, Zhao Guifen, XuGuanning. Security Scheme for Online Banking Based on Secret Key Encryption. The Second International Workshop on Knowledge Discovery and Data Mining[C], Moscow, Russia. 2009.
  • 8赵桂芬,胡祥义,李瑛,杜丽萍.Implementation and Testing of an Identity-based Authentication System. ISECS International Colloquium on Computing,Communication,Control, and Management[C].2009.
  • 9杜丽萍,胡祥义,李瑛,赵桂芬..A CSK Based SSL HANDSHAKE PROTOCOL.The IEEE International Conference on Network Infrastructure and Digital Content[C]. 2009.

二级参考文献1

共引文献4

同被引文献14

  • 1张大朋,蔡克,张敏,徐震.云计算数据安全支撑平台架构研究[J].计算机研究与发展,2011,48(S3):261-267. 被引量:11
  • 2Li H, Dai Y, Tian L,et al. Identity-based authentication forcloud computing[C]//In CloudCom,09: Proceedings of the1st International Conference on Cloud Computing,Beijing,china, 2008,9: 157-166.
  • 3Yan Liang, Rong Chun ming, Zhao Gan sen. Strengthencloud computing security with Federal identity managementusing hierarchical identity - based cryptography [ C] //Cloud-Com,09: proceedings of the 1st international conference oncloud computing, Beijing, China, 2009 : 167-177.
  • 4洪澄,张敏,冯登国.AB-ACCS:—种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Suppl) :259-265.
  • 5Atallah M J, Blanton M, Fazio N,et al. Dynamic and effi-cient key management for access hierarchies[J]. ACM TransInf Syst Secur 2009 , 12(3) : 1-43.
  • 6Damiani E,di Vimercati S D C,Foresti S, et al. Key man-agement for multi-user encrypted databases[C]//In Proceed-ings of the ACM Workshop on Storage Security and Surviva-bility, 2005 : 74-83.
  • 7Wang W,Li Z,wens R,et al. Secure and efficient access tooutsourced data[C]//Proceedings of the2009 ACM workshopon cloud computing security Chicago, Lllinois,USA,2009:55-66.
  • 8Kallahalla M, Riedel E,Swaminathan R, et al. Plutusscal-able secure file sharing on untrusted storage //Proc of the2nd USENIX Conf on File and Storage Technologies(FAST). Berkeley: USENIX, 2003:29-42.
  • 9Xujin'song,Huang Ru-cheng, Huang Wan-ming,et al. Se-cure document service for Cloud computing[C], In Cloud-Com’09 : Proceedings of the 1st International Conference onCloud Computing,Beijing,China,2009 : 541-546.
  • 10Francis Hsu, Chen Hao. Secure file system services forWeb 2.0 applications[C]//In CSW,09: Proceedings of the2009 ACM Workshop on cloud computing Security, NewYork,NY, USA, 2009:11-18.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部