期刊文献+

云计算联盟式安全模型

Cloud Computing Security Confederation Model
下载PDF
导出
摘要 云计算是把数据存放或运行在互联网的设备上,必然存在隐私和安全性问题,尤其是政府或企业重要或敏感数据。文章提出一种联盟式的安全模型来减小或消除云计算的安全隐患,并试着用联盟式安全模型解决云计算出现的安全问题,证实安全模型的可行性和提出实现建议。 Cloud computing impacts the data security and privacy because it puts and operates the data in the internet,especially the important data from governments and companies.This paper provides a cloud computing security confederation model in order to resolve the security threats of cloud computing.The paper describes and evaluates cloud computing security confederation model and provides the way to carry it out.
作者 王渊明
机构地区 浙江万里学院
出处 《浙江万里学院学报》 2012年第6期72-76,共5页 Journal of Zhejiang Wanli University
基金 浙江省教育技术研究规划课题"基于私有云的计算机机房教学平台研究与实现"(JB122)
关键词 云计算 云安全 安全联盟 Cloud computing Cloud security Security confederation
  • 相关文献

参考文献14

  • 1Sanjay Ghemawat,Howard Gobioff,and Shun-Tak. The google file system[A]. 19th ACM Symposium on Operating Systems Principles[ C ]. New York : ACM Press, October, 2003.
  • 2Mike Burrows. The Chubby lock service for loosely-coupled distributed systems[A]. OSD Ip06:Proceedings of the 7 th Symposi2um on Operating System Design and Imp lementation[C]. New York:ACM Press,November,2006.
  • 3DEAN J,GHEMAWAT S. MapReduce:Simp lied data processing on large clusters [A]. OSD IpO4:Proceedings of the 6 th Symposi2um on Operating System Design and Imp lementation[C]. New York:ACM Press,December,2004.
  • 4CHANG F,DEAN J,GHEMAWAT S,et al. BigTable:A distributed storage system for structured data[A]. Proceedings of 7th USENIX Symposium on Operating Systems Design and Implementation [ C ]. Seattle, WA, November, 2006 : 335-350.
  • 5Guilherme Sperb Machado,David Hausheer,Burkhard Stiller. Considerations on the Interoperability of and between Cloud Computing Standards [ EB / OL ]. http ://citeseerx ist psu edu/viewdoc/summary ? doi= 10.1.1.155.51.
  • 6Christian Cachin,Idit Keidar Alex,Er Shraer. Trusting the Cloud[J]. ACM SIGACT News,June,2009,40(20):1-6.
  • 7孙磊,戴紫珊,郭锦娣.云计算密钥管理框架研究[J].电信科学,2010,26(9):70-73. 被引量:13
  • 8F. John Krautheim. Private Virtual Infrastructure for Cloud Computing[EB/OL]. http://citeseerx.ist.psu.edu/viewdoc/ summary? doi= 10.1.1.149.2794.
  • 9仝建刚,彭昭,周洲,吴江.云计算在电信运营商中的应用研究[J].电信科学,2010,26(S1):28-32. 被引量:14
  • 10Amit Goyal, Sara Dadizadeh. A Survey on Cloud Computing[ EB / OL]. http ://citeseerx.ist.psu.edu/viewdoc/summary ? doi= 10.1.1.173.686.

二级参考文献29

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing, http://www.ibm.com/press/us/en/pressrelease/22613.wss,2007.
  • 3Amazon.Amazon elastic compute cloud (Amazon EC2), http:// aws.amazon.com/ec2/,2009.
  • 4John Rittinghouse, James Ransome. Cloud computing:implementation,management,and security,March 2009.
  • 5Heiser J,Nicolett M. Assessing the security risks of cloud computing, http://www.gartner. Om/DisplayDocument? id = 685308, 2008.
  • 6Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 7Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 8Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 9Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 10Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.

共引文献1091

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部