期刊文献+

移动互联网环境下的云计算安全技术体系架构 被引量:11

Secure Cloud Computing Architecture for Mobile Internet
下载PDF
导出
摘要 文章在研究分析云计算安全风险和安全技术体系架构的基础上,结合移动互联网的特点,设计了一个多层次、多级别、弹性、跨平台和统一用户接口的移动互联网通用云计算安全技术体系架构。该架构可实现不同等级的差异化云安全服务,其中跨层的云安全管理平台可对整个系统的运维安全情况进行跨安全域和跨安全级别的监控。 In this paper, we emphasize the necessity of designing a secure cloud computing architecture for mobile Internet. We analyze cloud computing security risks and secure architectures and propose a general secure cloud computing architecture that takes into account the characteristics of mobile Internet, This architecture has a multihierarchy, multilevel, elastic, cross-platform, unified user interface that can provide cloud services with different levels of security. The cross-layer cloud security management platform can be used to monitor the whole system and maintain different security domains and levels.
出处 《中兴通讯技术》 2012年第3期45-48,共4页 ZTE Technology Journal
基金 国家重点基础研究发展"(973")规划(2012CB315905) 高等学校博士学科点专项科研基金(20091102110004)
关键词 移动互联网 云计算 安全体系架构 mobile internet cloud computing secure architecture
  • 相关文献

参考文献12

  • 1MELL P, GRANCE T. The NIST Fefinition of Cloud Computing(draft) [R]. NIST Special Publication 800-145.Gaithersbung, MD,USA: NIST,2011.
  • 2BRODKIN J. Gartner: Seven Cloud-Computing Security Risks [EB/OL]. (2008-07-02). http://folk.ntnu,no/oztarman/tdt60/cloud% 20computing/3% 20Cloud Computing_Security_Risk.pdf, july 2008.
  • 3Top Threats to Cloud Computing V1.0 [Rl,San Francisco, CA, USA: Cloud Security Alliance, 2010.
  • 4MEIER J D. Windows Azure Security Notes[R]. Microsoft,2011.
  • 5ARMBRUST M, FOXA, GRIFFITH R, etal. A View of Cloud Computing[J].Communications of the ACM, 2010,53(4): 50-58.
  • 6Security Guidance for Critical Areas of Focus in Ctoud Computing V2.1[R].San Francisco, CA, USA: Cloud Security Alliance, 2009.
  • 7ENISA Cloud Computing Risk Assessment[R]. European Network and Information Security Agency, 2009.
  • 8MOTAHARI-NEZHAD H, STEPHENSON B, SINGHAL S. Outsourcing Business to Cloud Computing Services: Opportunities and Challenges [R].HPL-2009-23. Palo Alto ,CA, USA:HP Labs, 2009.
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 10LI L E, WOO T. VSITE: A Scalable and Secure Architecture for Seamless L2 Enterprise Extension in the Cloud[C],Proceedings of the 6th IEEE Workshop on Secure Network Protocols (NPSec' 10), Oct 5, 2010, Kyoto, Japan. Piscataway, N J, USA: IEEE,2010:31-36.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1065

同被引文献35

引证文献11

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部