期刊文献+

云计算信息安全问题探讨 被引量:2

Research on information security issues of cloud computing
下载PDF
导出
摘要 云计算是继个人计算机、互联网之后的第三次信息化革命,给整个信息产业带来巨大的推动力。但是,安全性已经成为云计算面临的最大挑战,它关系着用户对云计算应用的信心。针对目前云计算存在的诸多安全问题,文中提出信息安全风险链条主要包括终端用户、服务商和网络传输3个环节,并着重分析各环节存在的安全问题,最后给出云计算的信息安全框架,以期引起人们对于云计算信息安全问题的重视,并为更好地推进云计算应用提供有效保障。 Cloud computing is the third informationization revolution after personal computer and internet,bring the huge driving force for the whole information industry.But,security has become the greatest challege faced by Cloud computing,which is related to the user's confidence on the cloud computing applications.Aiming at information security issues of cloud computing,firstly ,the paper presents that the risk chain of the information security include of three links which are the teminal users,service providers and network transmission. Secondly,it emphatically analyzes the security issues existing in the each link. Lastly,in order to let the people pay attention to information security issues of cloud computing,it provides the frame of the information security of cloud computing, which can provide effective protection for promoting the applications of cloud computing.
机构地区 大连科技学院
出处 《电子设计工程》 2012年第22期60-62,共3页 Electronic Design Engineering
关键词 云计算 信息安全 风险 框架 cloud computing information security risk frame
  • 相关文献

参考文献6

二级参考文献46

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2郭乐深 张乃靖 尚晋刚.云计算环境安全框架.博士之窗理论研究,2009,(7):1671-1122.
  • 3Cloud computing, Web-Based Applications That Change the Way You Work and Collaborate Online.
  • 4中国云计算网,http://www.chinacloud.cn/defauh.aspx.
  • 5张帅.安全云计算您准备好了吗[EB/OL].IT专家网.http://security.ctocio.com.cn/securitycomment/435/8221435.shtml.
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1117

同被引文献15

  • 1Chowdhury A, Tripathi P. Enhancing Cloud Computing Reliabi- lity Using Efficient Scheduling by Providing Reliability as a Service[C] // 2014 Internatior/al Conference on Parallel, Distri- buted and Grid Computing. 2014:99-104.
  • 2Marozzo F, Talia D, Trunfio P. A Cloud Framework for Parame- ter Sweeping Data Mining Applications[C]//2011 Third IEEE International Conference on Cloud Computing Technology and Science. 2011 : 367-374.
  • 3Yang Hang, Fong S. Countering the Concept-drift Problem in Big Data Using iOVFDT[C] // 2013 IEEE International Con- gress on Big Data. 2013:126-132.
  • 4Wang Zhen-qi, Li Hai-long. Research of Massive Web Log Data Mining Based on Cloud Computing [C]//2013 International Conference on Computational and Information Sciences. 2013: 591-594.
  • 5Dev H, Sen T, Basak M, et al. An Approach to Protect the Pri- vacy of Cloud Data from Data Mining Based Attacks[C]//2012 SC Companion: High Performance Computing, Networking Stor- age and Analysis. 2012:1106-1115.
  • 6Abuhussein A, Bedi H,Shiva S. Evaluating Security and Privacy in Cloud Computing Services: A Stakeholder' s Perspective[C]// The 7th International Conference for Internet Technology and Secured Transactions. 2012:388-395.
  • 7华蓓,钟诚.数据挖掘中的隐私保护技术进展分析[J].微电子学与计算机,2009,26(8):38-41. 被引量:10
  • 8吴吉义,平玲娣,潘雪增,李卓.云计算:从概念到平台[J].电信科学,2009,25(12):23-30. 被引量:190
  • 9李玲娟,郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,21(3):94-97. 被引量:10
  • 10丁静,杨善林,罗贺,丁帅.云计算环境下的数据挖掘服务模式[J].计算机科学,2012,39(B06):217-219. 被引量:29

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部