期刊文献+

云计算数据安全问题与对策研究 被引量:11

The Study of the Data Security Problem and Strategy in Cloud Computing
下载PDF
导出
摘要 在云计算环境里,云计算的安全问题涉及信息资产的存储、处理及传输的保密性、完整性以及可用性。对于云计算服务提供商和用户,数据安全包括技术层面、管理层面、流程和法规层面等。云计算服务向众多的客户开放,安全威胁不仅来自外部互联网,也来自内部的安全隐患,这种互通性向云计算系统提出了新的挑战。论文从技术手段和非技术手段两个方面讨论如何保证数据的访问受到合理控制,保证数据不被人为或者意外的损坏、泄露或更改。 In the circumstance of cloud computing, the safety of cloud computing involves the storage and disposal of information assets, and the confidentiality, iategrality and usability of tremsmission. In terms of service suppliers and users of cloud computing, the safety of data includes the technical, managerial, process, statute aspects. The cloud computing service is accessible to numerous clients, the threat of safety not only comes from the outside cyberspace, but also from the inner hidden safety trouble. This kind of intercommunity presents new challenges to the system of cloud computing. This paper discusses how to assure the access of data can be controlled properly from technological and non-technological aspects, assuring the date not to be destroyed, revealed, altered on purpose or accidentally.
作者 刘志强
出处 《中国科技信息》 2012年第5期62-62,67,共2页 China Science and Technology Information
关键词 云计算 数据安全 问题与对策 Cloud computing data security Problem andStrategy
  • 相关文献

参考文献3

二级参考文献14

  • 1ENISA. Benefits, Risks and Recommendations for Information Security [ EB/OL]. [2010-05-10]. http://www. enisa, europa, eu/act/rm/files/deliverables/cloud-computing-risk-assessment? scarchterm = cloud + computing.
  • 2MATHER T, KUMARASWAMY S, LATIF S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance[ M]. [ s. l. ] :O'Reilly Media, Inc., 2009.
  • 3MELL P, GRANCE T. The NIST Definition of Cloud Computing [ EB/OL ]. [ 2010-05-10 ]. http ://csrc. nist. gov/groups/SNS/cloud-computing/.
  • 4CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 [ EB/OL]. [ 2010-05-10]. http: //www. cloudsecurityalliance, org/guidance/.
  • 5赵粮 裘晓峰.云计算环境的安全威胁和保护.中国计算机学会通讯,2010,6(5):47-50.
  • 6FORUM J. Cloud cube model: selecting cloud formations for secure collaboration [ EB/OL]. [ 2010-05-10 ]. http: //www. opengroup, org/jericho/cloud_cube_model_v1. 0. pdf.
  • 7GARTNER. Assessing the Security Risks of Cloud Computing[ EB/OL]. [ 2010-05-10 ]. http: //www. gartner. com/DisplayDocument? id = 685308.
  • 8WEI Jin-peng, ZHANG Xiao-lan. Managing Security of Virtual Machine Images in a Cloud Environment [ C ] //Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago : [ s. n. ] ,2009:91-96.
  • 9KANDUKURI B R, PATURI V R, RAKSHIT A. Cloud Security Issues [ C ] //IEEE International Conference on Services Computing ( SCC '09 ), Bangalore : [ s. n. ], 2009 : 517-520.
  • 10ISACA. Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives [ EB/OL]. [2010-05-10 ] . http: //www. isaca, org/Template, cfm? Section = Nederlands&Template =/Search/SearchDisplay. cfm.

共引文献57

同被引文献52

  • 1虞慧群,范贵生.云计算技术的应用及发展趋势综述[J].微型电脑应用,2011(10):1-3. 被引量:26
  • 2曹寿慕.计算机信息安全的新特点[J].吉林省教育学院学报(下旬),2010,26(10):142-143. 被引量:22
  • 3房秉毅,张云勇,徐雷.21云计算的安全问题和技术隐沈[J].硅谷,2011(22).
  • 4牛元立,李献伟,李燕斌,等.智能电网信息安全风险分析及对策研究[C]//中国智能电网学术研讨会论文集,2011.
  • 5Chen C.T., Hsu C.C., Wu J.J., et aI.GFS: A Distributed File System with Muhi-source Data Access and Replication for Grid Computing,2009.
  • 6Germain R.G., Rana O.F.. The Convergence of Clouds, Grids, and Autonomics. IEEE Internet Computing,2009.
  • 7Foster I, Zhao Yong, Raicu I, et-al. Cloud Computing and Grid Computing 360-degree Compared,2008.
  • 8Armbrust M., Fox A., Griffith R., et al. Above the Clouds: A Berkeley View of Cloud Computing.2009.
  • 9E. Pinheiro, W.D. Weber, L.A. Barroso. Failure trends in a large disk drive population,2007.
  • 10Yang Xiao-qiang,,Deng Yue-jin.Exploration of Cloud Compu-ting Technologies for Geographic Information Services[].Geoinformaticsth International Conference on.2010

引证文献11

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部