期刊文献+

云计算安全研究 被引量:1

Research on Cloud Computing Security
下载PDF
导出
摘要 为解决云计算平台的安全问题,对云计算的安全架构进行了系统的研究.针对云计算平台跨区域模糊边界、虚拟化服务、数据保密的安全威胁特点,从虚拟化技术、可信云计算、可信访问控制机制三个层面深入分析云计算安全框架,并提出云计算平台的安全策略与建议,满足云计算安全框架的建设需求. This paper systematically studied the security architecture of cloud computing, so as to solve the security problem of cloud computing platform. Security threats of cloud computing platform are characterized by the fuzzy boundary across the region, virtualization service and data security. According to the above characteristics, this thesis analyses detailedly the cloud computing security framework from the virtualization technology, the trusted cloud computing and the trusted access control mechanism, and puts forward the security strategies and suggestions of cloud computing to meet the construction demand of cloud computing security framework.
出处 《泉州师范学院学报》 2014年第2期96-99,共4页 Journal of Quanzhou Normal University
基金 龙岩学院校立服务海西面上项目(LYXY2011071)
关键词 云计算 虚拟化 可信云计算 可信访问控制 云计算安全框架 cloud computing virtualization trusted cloud computing trusted computing access controlcloud computing securily framework
  • 相关文献

参考文献8

  • 1郑昌兴.云模式下的信息安全探讨[J].信息网络安全,2011(10):13-14. 被引量:5
  • 2BRAIMI L,PETKOVIC M,NIKOVA S,et al.Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes[R].Technical Report,Centre for Telematics and Information Technolo-gy,University of Twente,2009:309-323.
  • 3GOLDMAN K,SAILER R,SRINIVASAN D.Scalable Integrity monitoring in virtualized environments[C].Proc of the 15th ACM Workshop on Scalable Trusted Computing.Chicago,USA:ACM Press,2010.
  • 4BARI M,BOUTABA R.Data center network vitualization:a survey[J].IEEE Communication Surveys & Tutorials,2012,15(2):909-928.
  • 5JIANXIN L,BO L,TIANYU W,et al.Cyber guarder:a virtualization security assurance architecture for green cloud computing[J].Future Generation Computer Systems,2012,28:379-390.
  • 6SANTOS N,GUMMADI K P,RODRIGUES R.Towards trusted cloud computing[C].Proc of Conference on Hot Topics in Cloud Computing,[s.l.].ACM Press,2009.
  • 7CRAMPTON J,MARTIN K,WlLD P.On key assignment for hierarchical access control[C]//GUTTAN J.Proc of the 19th IEEE Comp LLter Security Foundations Workshop CSFW 2006.
  • 8Venice:IEEE Computer Society Press,2006:5-7.ROY S,CHUAH M.Secure data retrieval based on ciphertext policy attribute-based encryption(CP ABE)system for the DTNs[R].Technical Report,2009.

二级参考文献5

共引文献4

同被引文献20

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部