期刊文献+

可信计算技术在云计算安全中的应用 被引量:13

Application of Trusted Computing Technology in Cloud Computing Security
下载PDF
导出
摘要 安全问题是制约云计算发展的关键.分析了云计算环境下的安全需求,根据可信计算平台的关键部件TPM和可信网络连接,以及可信存储提供的功能,从认证、访问控制、数据安全、用户行为追踪、合规性支持、虚拟化安全支持,以及应急响应和法律监管支持等方面研究了可信计算技术对云计算安全的支持,以期为云计算的安全提供保障. The security problem is the key to the development of cloud computing. The security requirements of cloud computing environments are analyzed. According to the functionalities provided by the key component of the TPM, the Trusted Network Connect and Trusted Storage, the trust computing technology can support cloud computing security from certification, access control, data security, user behavior tracking, compliance support, virtualization security support, emergency response and legal regulation. In this way, trust computing technology can provide protection for cloud computing security.
出处 《上海电力学院学报》 CAS 2013年第1期83-86,共4页 Journal of Shanghai University of Electric Power
基金 上海市教育委员会科研创新项目(11YZ194 12YZ146 12YZ147) 上海市自然科学基金(11ZR1414300) 上海市科学技术委员会科技攻关计划(10dz1501000)
关键词 云计算 云计算安全 可信平台模块 可信网络连接 cloud computing cloud computing security trust platform module trusted network connection
  • 相关文献

参考文献6

  • 1ARMBRUSH Michael,ARMANDO Fox. Above the clouds:a berkley view of cloud computing Tech Rep UCBEECS200928[R].EECS Department University of California Berkeley,2009.25.
  • 2MELLPeter,GRANCE Timothy. NIST special publication 800-145,the NIST definition of cloud computing[S].Gaithersburg,MD:NIST,2011.
  • 3冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 4SINGH Amardeep,VERMA Monika. Attacks and security in cloud computing[J].International Journal of Advanced Engineering & Application,2011,(01):300-302.
  • 5SHEN Zhi-dong,LI Li,YAN Fei. Cloud computing system based on trusted computing platform[A].2010.942-945.
  • 6AHAMED B Bazeer,MOHAMED S Syed Sabir. Implementation of trusted computing technologies in cloud computing[J].International Journal of Research and Reviews in Informarion Sciences,2011,(01):7-9.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1065

同被引文献76

引证文献13

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部