期刊文献+

云存储安全分析 被引量:5

Cloud Storage Security
下载PDF
导出
摘要 文章认为云存储是社会发展、技术发展的必然趋势,但其安全问题是云存储普及最大的障碍。基于云存储系统架构、安全分析及安全保护机制,文章给出了一种云存储服务应用支撑系统架构。该架构应用于云存储服务系统,是基于互联网应用的新型服务化存储模式,分为业务应用层、应用接口层、平台软件层和基础设备层,提供信息服务管理、运营统计分析和多种安全措施。 Cloud storage is an inevitable trend, but security is the biggest obstacle. In this paper, we discuss the safety and protection mechanism in the architecture of a cloud storage system. This architecture is divided into business application layer, application interface layer, platform software layer, and infrastructure layer. These provide information services management, operational statistical analysis, and a variety of safety measures.
出处 《中兴通讯技术》 2012年第6期30-33,共4页 ZTE Technology Journal
基金 国家高技术研究发展("863")计划(2012AA012606)
关键词 云存储安全 加密存储 访问控制 cloud storage security encrypted storage access control
  • 相关文献

参考文献12

  • 1金海.吴松,廖小飞,等云计算的发展与挑战[M].中国计算机学会学术工作委员会2009中国计算机科学技术发展报告.北京:清华大学出版社,2009.
  • 2SNIA Cloud [EB/OL]. [2011-10-15]. http:// www.snia,org/cloud. 2011.
  • 3SNIA. Cloud Data Management Interface (Version 1.0)[EB/OL]. [2011-10-15]. http:// cdmi.sniacloud.com. 2011.
  • 4王庆波,金涬,何乐.等虚拟化与云计算[M].北京:电子工业出版社.2009.
  • 5BOWERS K D, JUELS A, OPREA A. HAIL: A high availability and integrity layer for cloud storage [C].Proceedings of the 16th ACM Conference on Computer and Communications Security(CCS' 09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY USA: ACM. 2009: 489-501.
  • 6CACHIN C, KEIDAR I, SHRAER A. Trusting the cloud [J]. ACM SIGACT News, 2009, 40 (2):455-461.
  • 7ALl T, NAUMAN M, HADI F E, et al. On usage control of multimedia content in andthrough cloud computing paradigm [C]. Proceedings of the 5th International Conference on Future Information Technology (FutureTech ' 10), May 21-23, 2010, Busan, Republic of Korea. Los Alamitos, CA, USA: IEEE Computer Society, 2010:5p.
  • 8LOU X, HkA/ANG K. Co(lusive piracy prevention in P2P content delivery networks [J].IEEE Transactions on Computers, 2009, 58(7): 970-983.
  • 9HWANG K, LID Y. Trusted cloud computing with secure resources and data coloring [J]. IEEE Internet Computing, 2010, 14(5): 14-22.
  • 10THARAUD J, WOHLGEMUTH S, ECHIZEN I et al. Privacy by data provenance with digita watermarking [C].Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP' 10), Oct 15-17, 2010, Darmstadt. Germany, Piscataway. NJ USA: IEEE. 2010:510-513.

共引文献1

同被引文献43

  • 1林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 2卓继亮,蔺慧丽,李先贤.具有可信第三方的认证协议的安全性[J].计算机应用研究,2004,21(12):109-112. 被引量:4
  • 3王飞,康晓博.基于第三方支付平台的银行卡网上支付模式研究[J].华南金融电脑,2006,14(10):56-59. 被引量:3
  • 4Amazon. Amazon Simple Storage Service [EB/OL]. [2013-05-08]. http://aws.amazon.com/cn/s3/.
  • 5Microsoft. Microsoft Windows Azure [EB/OL]. [2013- 05-08]. http://www.windowsazure.com/en-us/.
  • 6Google. Google Cloud Storage [EB/OL]. [2013-05-08]. http://en.wikipedia.org/wiki/Google_Storage.
  • 7SNIA. Cloud Data Management Interface Version 1.0.2[EB/ OL]. [2013-05-08]. http://wvv.snia.org/cdmi.
  • 8Microsoft. BitLocker [EB/OL]. [2013-05-08]. http:// en.wikipedia.org/wiki/BitLocker.
  • 9EMC. EMC Products & Solutions [EB/OL]. [2013-05- 08]. http://www.emc.com/products-solutions/index. html.
  • 10Lam C.Hadoop实战[M]北京:人民邮电出版社,2011.

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部