期刊文献+

云存储在数字图书馆应用中的安全与防范研究 被引量:9

On the Application Security and Precautions of Cloud Storage in Digital Library
下载PDF
导出
摘要 提出了云存储的概念,总结了云存储在数字图书馆信息资源存储中的优势。通过研究和分析云存储在数字图书馆应用中存在的安全问题,主要有数据传输安全、存储安全、访问安全等。提出了改进技术、建立行业标准和规范、引入第三方审计等防范措施。改进了云存储在数字图书馆信息资源存储中数据的安全与稳定性。 This paper put forward the concept of cloud storage,summed up the advantage of cloud storage in digital library information resources.It researched and analized the security problems of cloud storage in digital library application,such as data transmission security,storage security,access security,etc.Then put forward some preventive measures,such as technology improvement,the establishment of industry standards and specifications,the third party audits,etc.So we will improve the security and stability of the digital library’s data in cloud storage.
作者 徐国兰
出处 《现代情报》 CSSCI 2012年第4期57-59,共3页 Journal of Modern Information
关键词 云存储 数字图书馆 数据 数据安全 防范 cloud storage; digital library; data; data security; precautions;
  • 相关文献

参考文献6

二级参考文献28

  • 1宋蕾,李俊莉.云计算环境下的计算机取证[J].河南科技,2011,30(1):56-57. 被引量:6
  • 2Michael Miller. Cloud computing: Web - based applications that change the way you work and collaborate online [ M ]. Que Publishing, 2008.
  • 3Mesnier M, Ganger G R, Hiedel E. Object - based storage: Pushing more functionality into storage[J] . Potentials, IEEE, 2005,24(27:31 - 34.
  • 4Garth A Gibson, David F Nagle, William Courtright, et al. NASD scalable storage systems [ M ]. Monterey, CA, America : USENIX, Linux Workshop. 1999.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control[M]. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcingIM]. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Cone Sandton: Springer-Verlag,2007. 385-396.
  • 7Goyal V, Pandey A, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data[M]. In: Juels A, Wright RN, Vimercati SDC, eds. Proc. of the 13th ACM Conf. on Computer and Communications Security, CCS 2006. Alexandria: ACM Press, 2006. 89-98.
  • 8Bowers KD, Juels A, Oprea A. implementation[C]. In: Sion R, ed. Proofs of retrievability: Theory and Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009.43-54.
  • 9Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid[C]. In: Karp B, ed. USENIX Association Proc. of the 2nd Workshop on Real, Large Distributed Systems. San Francisco, 2005.7-12.
  • 10Gartner. Cloud Computing Will Be As Influential As E-business[EB/ OL]. Gartner.com, 2010-08-22/2011-07-01.

共引文献87

同被引文献87

引证文献9

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部