期刊文献+

面向云的数据安全解决方案

Cloud-Oriented Data Security Solution
原文传递
导出
摘要 云计算发展面临许多关键性问题,安全问题首当其冲,并且随着云计算的不断普及,数据安全成为制约云计算发展的重点因素。文中针对云计算中的数据安全风险,结合虚拟化的资源管理方式和多租户的运营模式,提供针对云计算环境下非结构化数据与结构化数据的加密保护,实现"云+端"的数据安全一体化管理,确保云数据保密、完整、可用。 Cloud-computing development is encountered with many critical issues, and among which the security issue bears the brunt. With the unceasing popularization of cloud computing, data security becomes an important factor in restricting cloud-computing development. The risks related to cloud-computing data security are studied, and in combination of virtual resource management and multi-tenant model, encryption protection to achieve "cloud + client" data security is provided, and this could ensure the seeurity, integrity and availability of cloud data.
出处 《信息安全与通信保密》 2013年第9期95-97,共3页 Information Security and Communications Privacy
关键词 云数据安全 多租户数据隔离 虚拟安全网络 cloud data security muhi-tenant data isolation virtual security network
  • 相关文献

参考文献3

  • 1赛迪顾问股份有限公司.中国云计算产业发展白皮书[EB/OL].(2011-6-30)[2011-09-26]//http://tech.ccidnet.com/zt/cwb/images/cloudbook.pdf.
  • 2云安全联盟.云计算9大威胁报告[EB/OL].https://downloads.cloudsecurityalliance.org/initiatives/top-threats/The-Notorious_Nine-Cloud_Computing_TopJhreats-in_2013.pdf.
  • 3王正飞,汪卫,施伯乐.基于B^+树的索引字段加密[J].中南大学学报(自然科学版),2009,40(6):1660-1665. 被引量:3

二级参考文献16

  • 1朱静波.一种高安全和易共享的数据库加密方案[J].计算机应用研究,2007,24(3):128-131. 被引量:5
  • 2李亚秀,刘国华.数据库中字符数据的加密方法[J].计算机工程,2007,33(6):120-122. 被引量:5
  • 3Bertino E, Sandhu R. Database security concepts approaches and challenges[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 2-19.
  • 4Gabriel G, Panos K, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. Vancouver: ACM Press, 2008: 121-132.
  • 5Ateniese G, Kcvin F, Matthew G, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security, 2006, 9(4): 1-30.
  • 6Awadelkarim A M, Idris N B. An effective security interoperability archetype for secure multilevel databases[J]. Asian Journal of Information Technology, 2006, 5(4): 418-428.
  • 7Ahitub N, Lapid C, Neumann S. Processing encrypted data[J]. Communications of the ACM, 1987, 30(9): 777-780.
  • 8Hacigumus H, Lyer B, Mehrotra S. Providing database as a service[C]//Proeeedings of the ICDE. San Jose: IEEE Press, 2002: 29-38.
  • 9Hacigumus H, Lyer B, LI Chen, et al. Executing SQL over encrypted data in the database server provider model[C]//Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison. Wisconsin: ACM Press. 2002:216-227.
  • 10Agrawal R, Kirenan J, Srikant R, et al. Order-preserving encryption for numeric data[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data. Paris: ACM Press, 2004: 563-574.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部