期刊文献+

云计算的安全挑战分析

An Analysis of Security Challenges in Cloud Computing
下载PDF
导出
摘要 通过云计算网络,用户可以得到大量的共享资源,云计算以其资源池、存储容量等优势得到迅猛发展,但同时也存在很多安全缺陷,如敏感数据丢失,数据泄漏,数据克隆等。随着对云计算安全问题的逐渐重视,针对云计算模型的威胁,很多研究者进行了大量的研究。论文首先展示了云计算领域存在的安全问题,同时阐述了面对云计算安全威胁时采取的安全措施。 Nowadays, cloud has boomed high for its advantages like multi-tenancy, resource pooling, storage capacity etc. In spite o[ its vitality, it exhibits various security flaws including loss of sensitive data, data leakage and few others related to cloning, resource pooling and so on. As far as security issues are concerned, a very wide study has been reviewed which signifies threats with service and deployment mod- els of cloud. This study is presented so as to effectively refine the crude security issues under various areas of cloud. It also aims at revealing different security threats under the cloud models as well as network concerns to stagnate the threats within cloud.
作者 孙欣
机构地区 海军装备部
出处 《计算机与数字工程》 2013年第10期1664-1667,共4页 Computer & Digital Engineering
关键词 安全威胁 浏览器安全 恶意攻击 数据泄漏 security threats, browser security, malicious attacks, data leakage
  • 相关文献

参考文献31

  • 1Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing[S]. U.S. National Institute of Standards and Technology(NIST), Special Publication 800-145,2011,9.
  • 2Rajnish Choubey, Rajshree Dubey, Joy Bhattacharjee. A Sur- vey on Cloud Computing Security, Challenges and Threats[J]. International Journal on Computer Science and Engineering, ISSN: 0975-3397,2011,3(3) :1227-1231.
  • 3Zhiguo Wan, Jun'e Liu, Robert H. Deng. HASBE: A Hier- archical Attribute Based Solution for Flexible and Scalable Ac- cess Control in Cloud Computing[J]. IEEE Transactions on Information Forensics and Sccurity,2012,7(2):743-754.
  • 4Intel IT Center. Preparing your Virtualized Data Center for the Cloud: 1-20.
  • 5Steve Kirsch, et al. The Future of Authentication[R]. 1540- 7993/12, IEEE, January-February,2012:22-27.
  • 6Kandukuri BR, Paturi VR, Rakshit A. Cloud security issues [C]//IEEE international conference on services computing, 2009 ; 517-20.
  • 7Jamil, D. , Zaki, H. Security issues in cloud computing and counter measures [J]. International Journal of Engineering Science and Technology(I JEST), 3(4) :2672-2676.
  • 8Marios D. Dikaiakos, George Pallis, Dimitrios Katsaros, et al. Cloud Computing-Distributed Internet Computing for IT and Scientific Research[J]. IEEE Internet Computing, 2009:10-13.
  • 9Amit Sangroya, Saurabh Kumar, Jaideep Dhok, et al. To- wards Analyzing Data Security Risks in Cloud Computing En- vironments[M]. Springer-Verlag Berlin Heidelberg,2010:255- 265.
  • 10Lori M. Kaufman, Bruce Potter. Monitoring Cloud Compu- ting by Layer, Part 1[R]. 1540-7993/11, IEEE:66 68.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部